As malware writers continue to develop anti-forensic techniques to keep their malicious payload from being analyzed, Kaspersky Lab releases the first, and so far only, anti-malware product for UEFI. Microsoft Malware Protection Center recently discovered a sneaky Trojan that deletes its components to stop forensic investigators and researchers from analyzing it. The downloader was the payload.On the MMPC blog, Jonathan San Jose wrote about TrojanDownloader:Win32/Nemim.gen!A:This particular malware is a trojan downloader, and is capable of deleting its downloaded component files in a way that makes them essentially unrecoverable. This prevents the files from being isolated and analyzed. Thus, during analysis of the downloader, we may not easily find any downloaded component files on the system; even when using file recovery tools, we may see somewhat suspicious deleted file names but we may be unable to recover the correct content of the file.Although the purpose of most downloaders is to deliver the main malware, he noted that “this downloader is a bit different in the way that it is the medium and also the main component.” In other words, the downloader is the payload. Despite the malware’s “hidden agenda,” Microsoft managed to nab some components that were being downloaded from a remote server. One piece attempts to infect executable files in removable drives. It might “arrive on your computer as the file name ‘igfxext.exe’ that appears as part of a display graphics driver, in an effort to look inconspicuous.” The other component steals passwords for email accounts, Windows Messenger/Live Messenger, Gmail Notifier, Google Desktop and Google Talk.San Jose advised users who have been infected to change all account passwords after cleaning their system. CSO pointed out that this particular Trojan highlights how malware authors are continually evolving “sophisticated techniques” to protect their own kind of malicious “intellectual property.” Paul Henry, a forensic analyst for Lumension, told CSO Online, “Malware that covers its tracks to prevent the security community from developing quick defensive signatures is the norm today. Your grandfather’s security solutions will leave you utterly defenseless against today’s evolving threats.”Henry explained, “For sometime, criminals have developed malware that can sense when it is in a virtualized workstation commonly used by researchers to isolate and study malicious code. When it is in such an environment, the malware will enter a dormant state, so it cannot be easily discovered. Other malware inserts its malicious code in system memory, never leaving a trail in the infected computer’s registry or hard drive.” Jaime Blasco, labs manager at Alien Vault Labs, told Dark Reading that more and more malware has “built-in anti-forensics features as well as the ability to deter investigators.”In the case of Nemin, it is a clever idea since the analysts won’t be able to determine the origin of the infection, and the infrastructure used to infect the systems will remain undiscovered for a longer period,” he says. “In addition, most of the security companies rely on automatic environments that execute and emulate malicious programs. We have seen how more and more malware families are beginning to add capabilities to detect these environments and deter emulation. We have also seen some malware samples that only get activated if they detect human clicking activity on the system.”As malware writers become increasingly more anti-forensic sneaky, wouldn’t it be great to be a step ahead of the bad guys? Well, Kaspersky Lab has released a new anti-malware product that is meant to beat deeply embedded rootkits and bootkits that manage to stay hidden.World’s First Anti-Malware Product for UEFIThere’s been plenty of ruckus raised since Microsoft decided to require UEFI (Unified Extensible Firmware Interface), which is like an updated BIOS that lets an OS access hardware. Kaspersky Lab has come out with the “world’s first anti-malware product for UEFI.” It is currently the only UEFI-compliant anti-malware product and is meant for “organizations with the most stringent IT security requirements, such as state agencies, military organizations, power plants, industrial companies, and any other entities where the malware-related data loss, data leakage or corruption poses the greatest threat.”Rootkits and bootkits can embed themselves deeply into the system and manage to hide by loading before conventional anti-virus. Kaspersky’s solution “will be able to scan selected system files and memory addresses before the operating system even starts loading.” Nikolay Grebennikov, CTO of Kaspersky Lab, said, “Previously, our enemies always had the advantage – they were the first to find loopholes, weaknesses, or zero-day vulnerabilities, and we had to find a cure after the fact. But now they simply won’t be able to hide their malicious stuff anymore, as KUEFI will run at the lowest level possible and make sure that your system is clean and safe.”Like this? Here’s more posts:Law professor makes a case for legally recognizing the Dangers of SurveillancePETA plans to spy on hunters with dronesHackers steal photos, turn Wi-Fi cameras into remote surveillance deviceMicrosoft Phones, tablets as gaming controllers that detect gritting teeth, blinking?Refuse to be terrorized after Boston Marathon bombs; stay calm, stay freeHacks to turn your wireless IP surveillance cameras against youDOJ, DHS rejecting law school grads based on online commentsMicrosoft may not scan your email for keywords like Google, but your boss canMicrosoft: Facebook Home is a copycat, Windows Phone is the ‘real thing’AV-Test issues first Windows 8 antivirus solution ratingsFollow me on Twitter @PrivacyFanatic Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe