Aerosol Posted January 22, 2015 Report Posted January 22, 2015 For many years, different types of malware rank among the biggest IT securitythreats both in the business and the private domain. In order to protect oneselffrom the dangers of malware, numerous software manufacturers offer ITsecurity products like antivirus and endpoint protection software. But theseproducts alone offer no sufficient protection from malware that knows sometricks, as the results of our recent research with the topic antivirus evasionshow.In the recent past, there were several computer-basedattacks against IT networks thatbecame public and raised a lot of media attention.Especially the attacks against the NewYork Times [1] and the Washington Post [2] atthe beginning of 2013 had a world-wide mediacoverage and also heated the debate about suchcyber threats with manufacturers of IT securityproducts like antivirus and endpoint protectionsoftware. In both mentioned cases, attackers wereable to install malware on computer systems ofemployees in order to literally spy on the affectedcompanies – and this probably undetected forseveral months.Once more, incidences like these have pointedout that in spite of the use of IT security productslike antivirus software or host intrusion detection/preventionsoftware (HIDS/HIPS) suchattacks cannot be entirely prevented. This kindof threat illustrates that enterprises and also governmentagencies require a master plan with aworking information security management andsecurity awareness of all employees.This paper discusses how developers of malwarelike trojan horses (in short trojans), viruses, andworms proceed to hide their malicious intentionsfrom antivirus software. Thereby, current resultsof our recent research are presented and recommendationsare given for dealing with threats andsecurity risks caused by malware.How Antivirus Software WorksCurrent antivirus software, no matter if a standalonesoftware product or a component of a softwaresuite (host intrusion detection/preventionsoftware, endpoint protection software, etc.), usesdifferent methods to detect known and unknownthreats by means of malware.In general, these methods used for protectingcomputer systems from unwanted, malicioussoftware can be assigned to the following twostrategies:1. Blacklisting2. WhitelistingIn the context of antivirus software, the twoterms blacklisting and whitelisting simply meanthat the execution of a program is either explicitlyforbidden (being on a black list) or explicitlyallowed (being on a white list). Thus, by followingthe blacklisting approach antivirus softwarewill prevent the execution of programs that areRead more: http://dl.packetstormsecurity.net/papers/general/outsmarted-malware.pdf Quote