This allows the malware to evade several common detection mechanisms, including sandboxing, virtual machine execution and automated malware analysis systems. The malware then downloads a malicious .JPG file to compromise the end-user device and open up communication with the command and control center in order to steal sensitive data.
This is another example of a targeted attack that exploits the biggest enterprise weakness – vulnerable endpoint applications. The attack exploits vulnerabilities in endpoint applications to introduce malware, which then enables the attack progression. By blocking the exploit, the entire attack can be stopped.
But that can't be done with blacklisting solutions, as we have seen with the recent New York Times, Washington Post and Wall Street Journal breaches. Since most targeted attacks exploit zero-day vulnerabilities, an effective solution must be able to block the attack without knowing anything about the vulnerability targeted or the malware used.
A new endpoint malware protection paradigm
An endpoint protection approach that provides both effectiveness and manageability must begin with an understanding of the attack vectors that require mitigation. Malware can compromise end-user devices in several ways. For example, malware can silently install through the exploitation of an application or operating system vulnerability, it can be downloaded by the end-user via social engineering or it may be pre-installed on the device. Therefore, enterprises need to take the preventative steps to avoid information-stealing malware from reaching the endpoint device in the first place. Enterprises also need to prevent information-stealing malware from successfully functioning when it does end up on the endpoint through other methods.
Two new layers of security
Stateful Application Control is a new approach to protect endpoint devices from advanced data-stealing malware. It combines two important components: the first is designed to prevent malware from installing on the device and the second is designed to prevent malware from executing on the device. The first layer, application exploit prevention, applies whitelisting to application states instead of the applications themselves. This method prevents application exploits from leveraging vulnerabilities and introducing malware onto the computer file system.
By analyzing application memory states during normal operations, this approach maps the legitimate states of the targeted applications, such as browsers, Adobe, Flash and Java, when these applications write to the file system. For example, a legitimate application state occurs when a user saves a spreadsheet to disk or when the application updates its code. The creation of executable files that occur outside of a legitimate application state, as happens when exploits attempt to install malware, are prevented.
Application exploit prevention allows for more stable, effective and manageable endpoint security than the traditional application control approaches. This is because there are far fewer and more static application states to analyze and maintain, as compared to the multitude of application files that other application control approaches must inspect and manage.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.