Wednesday, May 7, 2014

Everybody is Kung Fu Fighting...

Technology leaps have been dominating our culture for the past 10 years, and arguably even more than that.  However, with the good, comes the bad?  Unfortunately, developments in the malicious cryptology arena have paced with technology innovations with equal leaps and strides.  Please don’t take our word for it, just look at the data presented by Kapersky Labs…

Since 2006, malware has been an ever present reality; however, from 2008, the issues has been doubling almost every year to the point even technology cannot keep up.

This issue is that Malware is no longer a single entity program with discernable patterns of code or behavior that would allow us to readily identify this.

Enter The Dragon


Looking at the graph reminds of the very Nemesis we are trying to protect against, a dragon.  Mythical by nature, defying logic and sense; however, deadly in its silent approach and quick in its attack. 


Like the dragon, malware has taken on a new life itself in innovation to keep itself concealed.  Originally, conventional wisdom thought that malicious mathematics would be limited to cases of extortion where the perpetrators would capture your data with an encryption algorithm holding your system hostage with an asymmetric key to recover the encrypted data. However, this is no longer a consideration, for the introduction of malicious cryptography and mathematics; the results become unlimited, according to Eric Filiol, Laboratoire de Cryptologie et De Virologie Opérationnelles ESIEA, France in their paper, “Malicious Cryptology and Mathematics”:

A Virtual Candy Store for Evil Doers

Use of cryptography and mathematics to develop “super malware” (über-malware) which evade any kind of detection by implementing:
        Optimized propagation and attack techniques (e.g. by using biased or specific random number generator) Filiol et al. (2007).
        Sophisticated self-protection techniques. The malware code protects itself and its own functional activity by using strong cryptography-based tools Filiol (2005b).
        Sophisticated auto-protection and code armoring techniques. Malware protect their own code and activity by using strong cryptography.
        Partial or total invisibility features.  The programmer  intends to make his code to become invisible by using statistical simulability Filiol & Josse (2007).
Use of complexity theory or computability theory to design undetectable malware.

Use of malware to perform  cryptanalysis operations (steal secret keys or passwords), manipulate encryption algorithms to weaken them on the fly in the target computer memory. The resulting encryption process will be easier to be broken Filiol (2011).
Design and implementation of encryption systems with hidden mathematical trapdoors.
The knowledge of the trap (by the system designer only) enables to break the system very efficiently.  Despite the fact that the system is open and public, the trapdoor must remain undetectable. This can also apply to the keys themselves in the case of asymmetric cryptography Erra & Grenier (2009).

One could  define malicious  cryptology/mathematics as the interconnection of computer virology  with cryptology and mathematics for their mutual benefit. The number of potential applications is almost infinite. In the context of this chapter, we could also define it or a part of it as the different mathematical techniques enabling to modify or manipulate reality and to reflect a suitable but false image of reality to the observer (may it be a human being or an automated system).

So what do you do?  First, just know that old school “Signature Database Technology” is no longer sufficient to protect your systems.  Perhaps “back in the day…”; however, like car covers, and windshield sun screens, they too have outlived their welcome.  Today’s protection has to be equally inventive.  In other words, we no longer can rely on known families of malware and their derivatives to be the domain of the perceived threat.  If you do, you shall become a victim and not even know that you are one.  Oh yes, another trend of our evil-doers is not claiming, nor revealing their deeds; as a result, once a victim always a victim.  Today, if a breach occurs, it’s used for a sustainable stream of access for profit; hence, disclosing it would be bad business. 

What to do?


A different approach is to fight fire with fire.  There is a manufacturer that has a jump on this precept of Malicious Cryptography.  They abandoned the signature based model and embraced Artificial Intelligence, Big data analytics, and, you guessed it, Mathematics.  Combined they thwart the  impending code by identifying it through thousands of other identifying parameters and make a decision of “good” or “bad”.  As for the science behind it, its’ way beyond the scope of this magazine; however, if you do want more, contact those folks at Continuity Focus
(sales@continuityfocus.com)
and they will walk you through it. However, regardless of you actions, you can't say you weren't warned. 


Source(s):

  • http://www.cs.sandia.gov/~dmdunla/publications/SAND2009-0805.pdf
  • http://cdn.intechopen.com/pdfs-wm/29700.pdf
  • http://archive.hack.lu/2008/Malware%20of%20the%20Future.pdf
So “Once more unto the breach, dear friends, once more;”
____________________________________________________________

About Rick Ricker

An IT professional with over 22 years experience in Information Security, wireless broadband, network and Infrastructure design, development, and support.

For more information, contact Rick at (800) 399-6085 x502

No comments:

Post a Comment

Thanks for your input, your ideas, critiques, suggestions are always welcome...

- Wasabi Roll Staff