КућаСајбер БалканHackers Utilizing Polyglot Files Are On The Rise, Introducing PolyConv for Detection

Hackers Utilizing Polyglot Files Are On The Rise, Introducing PolyConv for Detection

Објављено на

spot_img

Polyglot files are causing a stir in the cybersecurity world as they pose a significant risk to endpoint detection and response (EDR) systems and file uploaders. These files are designed to fit into multiple file format specifications, which can lead to confusion and evasion of detection by security tools.

Recent research conducted by experts from Oak Ridge National Laboratory and Assured Information Security revealed that polyglots are indeed a threat to commercial EDR tools. Shockingly, during the tests conducted by some vendors, there was a 0% detection rate of malicious polyglots. This highlights the severity of the issue and the urgent need for better detection mechanisms.

The reason why polyglots are such a challenge for malware detection systems is that they can bypass feature extraction routines and signature comparisons. Their ability to masquerade as valid files in multiple formats makes them incredibly elusive and dangerous. This puts a spotlight on the vulnerabilities in our current cybersecurity defenses and calls for enhanced strategies to combat this evolving threat.

A critical gap in computer security research has been identified due to the lack of extensive studies on how threat actors utilize polyglot files and how they can be effectively detected. It has been observed that polyglot files play a significant role in the tactics of Advanced Persistent Threat (APT) groups in malware campaigns. To address this issue, researchers have developed tools like Fazah, which mimic real-life polyglot creation methods.

One of the key findings from the research is the development of PolyConv, a deep learning model that has achieved an impressive over 99% F1 score for both binary and multi-label classifications of polyglots. Despite the existence of other tools for identifying files, PolyConv has shown promise in enhancing detection capabilities.

Threat actors are increasingly using polyglots to evade detection and bypass commercial security tools. Common combinations such as JAR+JPG and HTA+CHM have been employed by groups like Lazarus and IcedID in cyber-attack chains. Detecting polyglots requires innovative approaches, and tools like PolyConv and MalConv demonstrate encouraging results by utilizing byte-level features and format-agnostic methods.

Adding mime-type and n-gram features further improves the performance of detection tools like PolyCat. These advancements are crucial in strengthening our cybersecurity defenses against evolving threats. By enhancing our abilities to detect polyglots, we can better protect our systems and data from malicious actors.

In conclusion, the rise of polyglot files presents a significant challenge for cybersecurity professionals. With the increasing sophistication of threat actors, detecting and mitigating polyglots is essential for safeguarding our digital infrastructure. By leveraging cutting-edge tools and techniques like PolyConv and MalConv, we can stay ahead of the curve and protect our systems from this advanced form of cyber threat.

Извор линк

Најновији чланци

CISA Strategies for Combatting Cyber Risks

In the realm of election security, Jen Easterly, the director of the Cybersecurity and...

Assessing API Security Posture through API Security Maturity Model

In the current digital landscape, the use of APIs by organizations is on the...

When health tech meets ethical hacking

In a bold move to prioritize patient safety and strengthen security practices, Medtronic recently...

Russia Detains 100 in Cryptex Crypto Exchange Crackdown

In a sweeping crackdown on cybercrime, Russian authorities have arrested nearly 100 individuals allegedly...

Више овако

CISA Strategies for Combatting Cyber Risks

In the realm of election security, Jen Easterly, the director of the Cybersecurity and...

Assessing API Security Posture through API Security Maturity Model

In the current digital landscape, the use of APIs by organizations is on the...

When health tech meets ethical hacking

In a bold move to prioritize patient safety and strengthen security practices, Medtronic recently...
sr_RSSerbian