What is Code-Signed malware and how to avoid this malware?
Code signing is a method of using certificate-based digital signatures for a software for the operating system and users to determine its safety. Only the right software can use its corresponding digital signature.
Users can download, install software safely and developers protect their product reputation with Code signing. However, hackers and malware distributors are using that exact system to malicious code through antivirus software and other security programs. So what is Code-signed malware and how does it work?
- Remove root malware (malware) on Windows 10 computers
- Top 10 most dangerous malware types with bank accounts
- Learn about polymorphic malware and super polymorphism
What is Code Signed malware?
When the software is digitally signed, it has an official digital signature. The Certificate Authority certifies a software to identify software that is legitimate and safe to use.
Users will not have to worry because the operating system will check the certificate and verify the digital signature. For example, Windows uses a certificate chain that contains all the certificates needed to ensure legitimate software.
The certificate chain contains all the certificates needed to certify the object identified by the last certificate. In fact, it includes the end certificate, the intermediate CA certificate, and the root CA certificate trusted by all parties in the chain. Each intermediate CA certificate in the string contains a certificate issued by the CA on it. The root CA issues the certificate for itself.
When the system works, you can trust the software, Code signing system and CA. Malware is malicious, unreliable and has no access to the Certificate Authority or Code signing.
Hacker steals certificates from the Certificate Authority
Antivirus software knows malware is malicious because it adversely affects your system. It activates alerts, users reporting incidents and antivirus software can create malware signatures to protect other computers using the same antivirus engine.
However, if malware creators can sign malicious code using official digital letters, the process will not happen. Instead, Code-singed malware can penetrate the system by official means because your anti-virus software and operating system do not detect anything dangerous.
According to Trend Micro's research, the entire malware market is focused on supporting Code-signed malware development and distribution. Malware operators have access to valid credentials used to sign malicious code. The following table shows the number of malware using Code signing to evade antivirus software since April 2018.
Trend Micro's research also shows that about 66% of malware has digital signatures. In addition, there are specific types of malware that have many digital signature versions such as Trojans, droppers and ransomware.
Where does the Code signing certificate come from?
Malware distributors and developers have two ways to create code-signed malware. They steal certificates from the Certificate Authority by directly or redeeming or forging a legitimate organization and requesting certificates from CA.
As you can see, CA is not the only place hackers target. Distributors who have access to legal certificates can sell trusted digital signature certificates to malware developers and distributors.
A Masaryk University security research team in the Czech Republic and the Maryland Cybersecurity Center found four organizations selling Microsoft Authenticode certificates to anonymous buyers. When a malware developer has a Microsoft Authenticode certificate, they can sign any malware that can be via certificate and Code signing protection.
In some cases, instead of stealing certificates, hackers will hack into the server to build the software. When the new software version is released, it will have a legitimate certificate, hackers take advantage of this process to add malicious code.
Example of Code-signed malware
So, what does Code-signed malware look like? Here are three examples of this type of malware.
- Stuxnet malware : This malicious software destroys Iran's nuclear program using two stealing certificates and 4 zero-day vulnerabilities. These certificates are stolen from the companies JMicron and Realtek. Stuxnet uses stolen certificates to avoid the need for a new Windows introduction, but all drivers require verification.
- Asus server breach: Between June and November 2018, hackers hacked into an Asus server that companies use to push software updates to users. Research at Kaspersky Lab revealed that about 500,000 Windows devices received this malicious update before being detected. Without stealing the certificate, these hackers sign the Asus digital certificate for their malware before the software server distributes the system update.
- Flame malware: The variant of the malware module Flame targets Middle Eastern countries, using fraudulent certificates to avoid detection. Flame developers have used a weak encryption algorithm to sign fake digital certificates signing, making it appear as if Microsoft signed them. Unlike Stuxnet for destructive purposes, Flame is a spy tool, looking for PDF files, AutoCAD, text files and other important industrial documents.
How to avoid Code-signed malware?
This malware uses Code signing to avoid anti-virus software and detection systems, so it is extremely difficult to protect against Code-signed malware. Always updating antivirus software, the system is necessary, avoid clicking on unknown links and carefully check where the link comes from before following it. Refer to the article Risks from malware and prevention.
You should read it
- Fileless malware - Achilles heel of traditional antivirus software
- Discover a new kind of malicious code that can record the phone call to extort money
- Researchers create malware based on artificial intelligence
- Microsoft's source code signature control system is easily bypassed by Zloader malware
- The US government network is infected with malware by employees watching adult movies during the hour
- Malicious Code EvilGnome attacks Linux systems with many rare tricks
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replaced
- 2022 could be the year of Linux malware
May be interested
- Researchers create malware based on artificial intelligencedeeplocker is unrecognized and 'performs malicious behavior as soon as this ai code detects the target via face detection, location or voice'.
- FBI 'eliminates' malware that affected 2.5 million PCsa piece of malware originating from china has now been contained after the fbi obtained a court order to remove the malicious code from thousands of windows computers.
- The US government network is infected with malware by employees watching adult movies during the houraccording to the survey results, the us geological survey network (usgs) in the eros satellite image storage center in south dakota recently got into malware by an employee accessing thousands of adult video websites. his working computer, one of them contains malware.
- 5 things to do to avoid malwarestaying safe and online security is simple, as long as you have the right precautions. besides installing security suites or online antivirus software, follow these steps to keep your computer safer.
- Malicious Code EvilGnome attacks Linux systems with many rare tricksthis backdoor implant is named evilgnome, and is still not recognized by any anti-malware tool on virustotal.
- The malware detection is extremely dangerous, unable to destroy even if the operating system is reinstalled and the hard drive is replacedan extremely dangerous malware called lojax has just been discovered by eset security firm. this malware is infecting a victim computer with malicious code.
- 2022 could be the year of Linux malwarethe number of malware (malicious code) detected on linux environments is increasing alarmingly, along with the popularity of internet of things (iot) devices.
- Microsoft's source code signature control system is easily bypassed by Zloader malwareafter bypassing microsoft's protection system, the zloader malware deployed and stole the personal information of thousands of victims from 111 countries.
- Malware WSL appeared with the ability to steal browser authentication cookieswindows subsystem for linux (wsl) has not been released for a long time, but there is already malicious code targeting this system.
- Threats and risks from malware on USB Flashin addition to the undisputed benefits, usb flash drives sometimes contain risks that cannot be underestimated if not used properly.