How to defend against malware distributed by network worms

How to defend against malware distributed by network worms

Malware   /   Oct 30th, 2018   /  A+ | a-
“A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers.[1] Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it”.*

* Definition Wikipedia

Malware spread by worm mechanisms remain a potent threat. Worms allow infections to spread faster than many other malware payload delivery methods. Hackers use this tactic to amass a large number of victims very quickly. Analysis by the “Center for Interet Security” shows the worm is still a top mechanism for malware delivery:

“Top 10 Malware in September 2018
  1. Emotet is a modular infostealer that downloads or drops banking trojans. It can be delivered through either malicious download links or attachments, such as PDF or macro-enabled Word documents. Emotet also incorporates spreader modules in order to propagate throughout a network. In September 2018, Emotet was observed dropping Zeus Panada, a remote access Trojan (RAT)
  2. WannaCry is a ransomware cryptoworm that uses the EternalBlue exploit to spread via SMB. Version 1.0 has a “killswitch” domain, which stops the encryption process
  3. Kovter is a fileless click fraud malware and a downloader that evades detection by hiding in registry keys. Reporting indicates that Kovter can have backdoor capabilities and uses hooks within certain APIs for persistence
  4. ZeuS is a modular banking trojan which uses keystroke logging to compromise victim credentials when the user visits a banking website. Since the release of the ZeuS source code in 2011, many other malware variants have adopted parts of its codebase, which means that events classified as ZeuS may actually be other malware using parts of the ZeuS code
  5. CoinMiner is a cryptocurrency miner that uses Windows Management Instrumentation (WMI) and EternalBlue to spread across a network. CoinMiner uses the WMI Standard Event Consumer scripting to execute scripts for persistence
  6. NanoCore is a RAT spread via malspam as a malicious Excel XLS spreadsheet. As a RAT, NanoCore can accept commands to download and execute files, visit websites, and add registry keys for persistence
  7. Gh0st is a RAT used to control infected endpoints. Gh0st is dropped by other malware to create a backdoor into a device that allows an attacker to fully control the infected device
  8. Mirai is a malware botnet known to compromise Internet of Things (IoT) devices in order to conduct large-scale distributed denial of service (DDoS) attacks. Mirai is dropped after an exploit has allowed the attacker to gain access to a machine
  9. Trickbot is a modular banking trojan that is known to be dropped by Emotet as well as spread via malspam campaigns. Trickbot is known to download the IcedID banking trojan
  10. AZORult is an infostealer that is known to be dropped by IcedID banking trojan as well as spread via malspam campaigns. The malware is known to both steal information and install Hermes ransomware”

Reproduced from:

Rebasoft recommends two key approaches to reducing the likelihood of malware infection:
  1. Ensure all your infrastructure is covered. Coverage should be the basis for any cyber security defence strategy. After all if you only have malware defence on 75% your PC’s, then 25% remain at risk. Rebasoft helps you identify and protect the extra 25% in a way that your existing asset management systems cannot
  2. Implement a network based malware detection system. This is the only way to identify malware worms across the network; especially when you have systems where it is not possible to install traditional virus software agents

Tags:  malware · worm · wannacry