In "The anti-virus age is over," Graham Sutherland argues that the targeted, hard-to-stop attacks used by government-level hackers and other "advanced persistent threats" are now so automatable that they have become the domain of everyday script-kiddie creeps. Normally, the advanced techniques are only used against specific, high-value targets -- they're so labor-intensive that it's not worth trying them on millions of people in order to get a few more machines for a spam-sending botnet, or to extract a few credit-card numbers and passwords with a key-logger.
But all attacks tend to migrate from the realm of hand-made, labor-intensive and high-skill techniques to automated techniques that can be deployed with little technical expertise against millions of random targets.
Signature-based analysis, both static (e.g. SHA1 hash) and heuristic (e.g. pattern matching) is useless against polymorphic malware, which is becoming a big concern when you consider how easy it is to write code generators these days. By the time an identifying pattern is found in a particular morphing engine, the bad guys have already written a new one. When you consider that even most browser scripting languages are Turing complete, it becomes evident that the same malware behaviour is almost infinitely re-writeable, with little effort on the developer’s part. Behavioural analysis might provide a low-success-rate detection method, but it’s a weak indicator of malintent at best.
We’ve also seen a huge surge in attacks that fit the Advanced Persistent Threat (APT) model in the last few years. These threats have a specific target and goal, rather than randomly attacking targets to grab the low-hanging fruit. Attacks under the APT model can involve social engineering, custom malware, custom exploits / payloads and undisclosed 0-day vulnerabilities – exactly the threats that anti-malware solutions have difficulty handling.
This was the premise and theme of my novella Knights of the Rainbow Table (also available as a free audiobook). It's a funny old world.
The anti-virus age is over.
Since the earliest days of ecommerce, analysts have predicted that retailers would use their estimations of their customers’ willingness to pay to invisibly, instantaneously reprice their goods, offering different prices to each customer.
The Intercept publishes a previously-unseen set of Snowden docs detailing more than $500,000,000 worth of secret payments by the Japanese government to the NSA, in exchange for access to the NSA’s specialized surveillance capabilities, in likely contravention of Japanese privacy law (the secrecy of the program means that the legality was never debated, so no […]
Midge is a semi-disavowed character in the Barbieverse, created in 1963 to counter claims that Barbie was oversexualized; weirdly, in 1982, Mattel made the decision to release a version of the doll, who appeared to be a young teen, as a pregnant lady, with a detachable bump containing an articulated foetus.
All moms are different. But all moms like getting flowers on Mother’s Day, and that’s a fact (not, however a fact we can document in any fashion.) Instead of getting chewed out for forgetting to call her on the second Sunday of May, you can take care of it ahead of time with Teleflora’s flower […]
Yeah, Bluetooth audio is pretty common these days, so why should you care about these earbuds? Look how happy that woman up above looks. She’s got FRESHeBUDS in. Boom. There’s your reason. She’s also at the beach and it appears to be a very nice day.But for the sake of promotion, wireless earbuds are fast becoming the […]
“Gets stuff done,” is a good way to be described by anybody. Especially by coworkers or bosses. Because whether you’re in finance or a children’s librarian, stuff needs to get done. But how do you make sure stuff gets done? You definitely can’t do all the stuff yourself, unless your company/organization/government office consists entirely of you. And […]