{"id":7397,"date":"2017-04-20T06:00:35","date_gmt":"2017-04-20T14:00:35","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1188\/"},"modified":"2017-04-20T06:00:35","modified_gmt":"2017-04-20T14:00:35","slug":"news-1188","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2017\/04\/20\/news-1188\/","title":{"rendered":"Combating a spate of Java malware with machine learning in real-time"},"content":{"rendered":"<p><strong>Credit to Author: msft-mmpc| Date: Thu, 20 Apr 2017 13:02:00 +0000<\/strong><\/p>\n<p>In recent weeks, we have seen a surge in emails carrying fresh malicious Java (.jar) malware that use new techniques to evade antivirus protection. But with our research team\u2019s automated expert systems and machine learning models, Windows 10 PCs get real-time protection against these latest threats.<\/p>\n<p>Attackers are constantly changing their methods and tools. We know from many years of research into malware and cybercriminal operations that cybercriminals have go-to programming languages for their malicious activities, but they switch from time to time to slip past security solutions. For instance, we recently tracked how cybercriminals have <a target=\"_blank\" href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/03\/15\/ransomware-operators-are-hiding-malware-deeper-in-installer-packages\/\">changed how they use NSIS installers<\/a> in order to evade AV and deliver ransomware.<\/p>\n<p>To help deliver real-time protection, our researchers use the Microsoft intelligent security graph, a robust automated system that monitors threat intelligence from a wide network of sensors. This system includes machine learning models, which drive proactive and predictive protection against fresh threats.<\/p>\n<h2>Tracking malicious email campaigns<\/h2>\n<p>Our sensors first picked up signs of the Java spam campaigns at the start of the year. Our automated tools, which can sort and classify massive volumes of malicious emails, showed us actionable intelligence about the surge of Java malware-bearing emails.<\/p>\n<p>These emails use various social engineering techniques to lure recipients to open malicious attachments. Many of the emails are in Portuguese, but we\u2019re also seeing cases in English. They pretend to be notifications for billing, payment, pension, or other financial alerts.<\/p>\n<p>Here are the most popular subject line and attachment file name combinations used in the email campaigns:<\/p>\n<table style=\"border: 2px solid #cccccc;width: 100%;background-color: #fafafa\">\n<tbody>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\"><strong>Subject<\/strong><\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\"><strong>Attachment file name<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">Segue em anexo Oficio Numero: &lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">Decis\u00c3\u00a3o-Judicial.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">Servi\u00e7os de Cobran\u00e7as Imperio adverte, Boleto N&lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">2Via_Boleto_N&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">\u201cCobran\u00e7a Extrajudicial\u201d Imperio Servi\u00e7os de Cobran\u00e7as<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">2Via_Boleto_N&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">Payment Advice<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">Payment Advice.rar<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">Curriculum Vitae &lt;Date&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">Curriculum_&lt;name&gt;&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">FGTS Inativo &#8211; &lt;number&gt; &#8211; Disponivel para saque em &lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">SALDO_FGTS_MP_&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">FGTS Inativo &#8211; &lt;number&gt; &#8211; Disponivel para saque em &lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">FGTS_-_MP_&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">Extrato_FGTS_disponivel_em_sua_conta_inativa_de_N&lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">FGTS_Disponivel_N&lt;number&gt;.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">NEW PURCHASE ORDER (TOP URGENT)<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">BLUERHINETECHNOLOGY_EXPORT_PURCHASE_ORDER.zip<\/td>\n<\/tr>\n<tr>\n<td width=\"408\" style=\"border: 1px solid #cccccc;text-align: center\">NF-e &lt;number&gt;. Emitente &lt;number&gt; &#8211; GLOBECALL DO BRASIL LTDA. &lt;number&gt;<\/td>\n<td width=\"216\" style=\"border: 1px solid #cccccc;text-align: center\">NF-e-&lt;number&gt;.zip<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em>Figure 1. Most popular subject line and attachment file name combinations in email campaigns<\/em><\/p>\n<p>The attachments are usually .zip or .rar archive files that contain the malicious .jar files. The choice of .jar as attachment file type is an attempt by cybercriminals to stay away from the more recognizable malicious file types: MIME, PDF, text, HTML, or document files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1168\" height=\"720\" class=\"alignnone size-full wp-image-12025\" alt=\"java-malware-sample-email\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/java-malware-sample-email.jpg\" \/><\/p>\n<p><em>Figure 2. Sample malicious email carrying Java malware in a .zip file<\/em><\/p>\n<h2>Tracking updates in malicious code<\/h2>\n<p>In addition to information about the email campaigns, our monitoring tools also showed another interesting trend: throughout the run of the campaigns, an average of 900 unique Java malware files were used in these campaigns every day. At one point, there were 1,200 unique malicious Java files in a single day.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"966\" height=\"448\" class=\"alignnone size-full wp-image-12115\" alt=\"daily-volume-of-unique-java-malware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/daily-volume-of-unique-java-malware1.png\" \/><\/p>\n<p><em>Figure 3. Volume of unique Java malware used in email campaigns<\/em><\/p>\n<p>These Java malware files are variants of old malware with updated code that attempt to evade detection by security products.<\/p>\n<p>The most notable change we saw in these new variants of Java malware is in the way they obfuscate malicious code. For instance, we saw the following obfuscation techniques:<\/p>\n<ol>\n<li>Using a series of append operators and a string decryption function<br \/> <img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"590\" class=\"alignnone size-full wp-image-12075\" alt=\"sample-obfuscated-java-malware-code\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/sample-obfuscated-java-malware-code.png\" \/><br \/> <em>Figure 4. Sample obfuscated Java malware code<\/em><\/li>\n<li>Using overly long variable names, making them effectively unreadable<br \/> <img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"528\" class=\"alignnone wp-image-12085\" alt=\"sample-obfuscated-java-malware-code-2\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/sample-obfuscated-java-malware-code-2.png\" \/><br \/> <em>Figure 5. Sample obfuscated Java malware code<\/em><\/li>\n<li>Using excessive codes, making code tracing more difficult<br \/> <img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"492\" class=\"alignnone wp-image-12086\" alt=\"sample-obfuscated-java-malware-code-3\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/sample-obfuscated-java-malware-code-3.png\" \/><br \/> <em>Figure 6. Sample obfuscated Java malware code<\/em><\/li>\n<\/ol>\n<p>Obfuscated codes can make analysis tedious. We use automated systems that detonate the attachments, effectively bypassing obfuscation. When malware is detonated, we see the malicious intent and gain intelligence that we can use to prevent attacks.<\/p>\n<p>Our tools log malicious behaviors observed during detonation and use these to detect new and unknown attachments. These malicious behaviors include:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"786\" height=\"606\" class=\"alignnone size-full wp-image-12095\" alt=\"java-malware-tracer-logs\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/java-malware-tracer-logs1.png\" \/><\/p>\n<p><em>Figure 7. Sample Java malware trace logs<\/em><\/p>\n<h2>From threat intelligence to real-time protection<\/h2>\n<p>Through automated analysis, machine learning, and predictive modeling, we\u2019re better able to deliver protection against the latest, never-before-seen malware. These expert systems give us visibility and context into attacks as they happen, allowing us to deliver real-time protection against the full range of threats.<\/p>\n<p>Context-aware detonation systems analyze millions of potential malware samples and gather huge amounts of threat intelligence. This threat intelligence enriches our cloud protection engine, allowing us to block threats in real-time. In addition to the Java malware, we also detect the payloads, which are usually online banking Trojans like <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Banker\">Banker<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Win32\/Banload\">Banload<\/a>, or Java remote access Trojans (RATs) like <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Backdoor:Java\/Jrat\">Jrat<\/a> and <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Trojan:Java\/QRat\">Qrat<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"1366\" height=\"768\" class=\"alignnone size-full wp-image-12135\" alt=\"combating-java-malware-automation-machine-learning\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/combating-java-malware-automation-machine-learning2.png\" \/><\/p>\n<p><em>Figure 8. Automated systems feed threat intelligence to cloud engines and machine learning models, which result in real-time protection against threats<\/em><\/p>\n<p>Threat intelligence from the detonation system constantly enhances our machine learning models. New malicious file identifiers from the analysis of the latest threats are added to machine learning classifiers, which power predictive protection.<\/p>\n<p>This is how we use automation, machine learning, and the cloud to deliver protection technologies that are smarter and stronger against new and unknown threats. We automatically protect Windows PCs against more than 97% of Java malware in the wild.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"738\" height=\"419\" class=\"alignnone size-full wp-image-12125\" alt=\"detecting-java-malware\" src=\"https:\/\/msdnshared.blob.core.windows.net\/media\/2017\/04\/detecting-java-malware1.png\" \/><\/p>\n<p><em>Figure 9. Breakdown of Java malware detection methods<\/em><\/p>\n<h2>Conclusion: Real-time protection against relentless threats<\/h2>\n<p>The email campaigns distributing Java malware account for a small portion of cybercriminal operations that deliver new malware and other threats. Cybercriminals are continuously improving their tools and modus operandi to evade system protections.<\/p>\n<p>Our research team is evolving how we combat cybercrime by augmenting human capacity with a combination of sensors, automated processes, machine learning, and cloud protection technologies. Through these, we are better able to monitor and create solutions against these threats.<\/p>\n<p>These protections are available in the security technologies that are built into <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/windows\/windows-10-upgrade\">Windows 10<\/a>. And with the\u00a0 <a target=\"_blank\" href=\"https:\/\/blogs.windows.com\/windowsexperience\/2017\/03\/29\/windows-10-creators-update-coming-april-11-surface-expands-markets\/\">Creators Update<\/a>, <a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/portal\/mmpc\/help\/updatefaqs.aspx\">up-to-date<\/a> computers get the latest security features and proactive mitigation.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/en-us\/itpro\/windows\/keep-secure\/windows-defender-in-windows-10\">Windows Defender Antivirus<\/a> provides real-time protection against threats like Java malware and their payloads by using automation, machine learning, and heuristics.<\/p>\n<p>In enterprise environments, <a target=\"_blank\" href=\"https:\/\/products.office.com\/en-us\/exchange\/online-email-threat-protection\">Office 365 Advanced Threat Protection<\/a> blocks malicious emails from spam campaigns, such as those that distribute Java malware, using machine learning capabilities and threat intelligence from the automated processes discussed in this blog.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/technet.microsoft.com\/itpro\/windows\/keep-secure\/device-guard-deployment-guide\">Device Guard<\/a> locks down devices and provides kernel-level virtualization-based security, allowing only trusted applications to run.<\/p>\n<p><a target=\"_blank\" href=\"https:\/\/www.microsoft.com\/en-us\/WindowsForBusiness\/windows-atp\">Windows Defender Advanced Threat Protection<\/a> alerts security operations teams about suspicious activities on devices in their networks.<\/p>\n<p>It is also important to note that Oracle has been enforcing stronger security checks against legitimate applications using Java. For instance, starting with Java 7 Update 51, <a target=\"_blank\" href=\"https:\/\/www.java.com\/en\/download\/help\/java_blocked.xml\">Java does not allow Java applications that are not signed, are self-signed, or are missing permission attributes<\/a>. Oracle will also start <a target=\"_blank\" href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/oracle-to-block-jar-files-signed-with-md5-starting-with-april-2017\/\">blocking .jar files signed with MD5<\/a>, requiring instead signing with SHA1 or stronger.<\/p>\n<p>However, the Java malware discussed in this blog are equivalent to executable files (as opposed to Java applet). Here are some additional tips to defend against Java malware in enterprise environments:<\/p>\n<ul>\n<li>Remove JAR in file type associations in the operating system so that .jar files don\u2019t run when double-clicked; .jar files must be manually executed using command line<\/li>\n<li>Restrict Java to <a target=\"_blank\" href=\"http:\/\/stackoverflow.com\/questions\/14304771\/restrict-java-to-only-execute-signed-jars\">execute only signed .jar files<\/a><\/li>\n<li>Manually <a target=\"_blank\" href=\"http:\/\/docs.oracle.com\/javase\/tutorial\/deployment\/jar\/verify.html\">verify signed .jar files<\/a><\/li>\n<li>Apply email gateway policy to block .jar as attachments<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em>Duc Nguyen, Jeong Mun, Alden Pornasdoro<\/em><br \/> <em> Microsoft Malware Protection Center<\/em><\/p>\n<p><a href=\"https:\/\/blogs.technet.microsoft.com\/mmpc\/2017\/04\/20\/combating-a-wave-of-java-malware-with-machine-learning-in-real-time\/\" target=\"bwo\" >https:\/\/blogs.technet.microsoft.com\/mmpc\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: msft-mmpc| Date: Thu, 20 Apr 2017 13:02:00 +0000<\/strong><\/p>\n<p>In recent weeks, we have seen a surge in emails carrying fresh malicious Java (.jar) malware that use new techniques to evade antivirus protection. But with our research team\u2019s automated expert systems and machine learning models, Windows 10 PCs get real-time protection against these latest threats. Attackers are constantly changing their methods and tools. We&#8230;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10759,10378],"tags":[10760,6148,12037,11137,9748,12036,12038,12039,10510,10518,12040,10761,11056,11774],"class_list":["post-7397","post","type-post","status-publish","format-standard","hentry","category-microsoft","category-security","tag-antimalware-research-for-it-pros-and-enthusiasts","tag-automation","tag-cloud-protection","tag-creators-update","tag-java","tag-java-malware","tag-machine-learning","tag-obfuscation","tag-social-engineering","tag-spam","tag-threat-intelligence","tag-windows-10","tag-windows-10-creators-update","tag-windows-defender-antivirus"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=7397"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/7397\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=7397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=7397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=7397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}