JSLess: A Tale of a Fileless Javascript Memory-Resident Malware

11/25/2019
by   Sherif Saad, et al.
0

New computing paradigms, modern feature-rich programming languages and off-the-shelf software libraries enabled the development of new sophisticated malware families. Evidence of this phenomena is the recent growth of fileless malware attacks. Fileless malware or memory resident malware is an example of an Advanced Volatile Threat (AVT). In a fileless malware attack, the malware writes itself directly onto the main memory (RAM) of the compromised device without leaving any trace on the compromised device's file system. For this reason, fileless malware presents a difficult challenge for traditional malware detection tools and in particular signature-based detection. Moreover, fileless malware forensics and reverse engineering are nearly impossible using traditional methods. The majority of fileless malware attacks in the wild take advantage of MS PowerShell, however, fileless malware are not limited to MS PowerShell. In this paper, we designed and implemented a fileless malware by taking advantage of new features in Javascript and HTML5. The proposed fileless malware could infect any device that supports Javascript and HTML5. It serves as a proof-of-concept (PoC) to demonstrate the threats of fileless malware in web applications. We used the proposed fileless malware to evaluate existing methods and techniques for malware detection in web applications. We tested the proposed fileless malware with several free and commercial malware detection tools that apply both static and dynamic analysis. The proposed fileless malware bypassed all the anti-malware detection tools included in our study. In our analysis, we discussed the limitations of existing approaches/tools and suggested possible detection and mitigation techniques.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/05/2021

Advances In Malware Detection- An Overview

Malware has become a widely used means in cyber attacks in recent decade...
research
11/27/2021

Assessing the Effectiveness of YARA Rules for Signature-Based Malware Detection and Classification

Malware often uses obfuscation techniques or is modified slightly to eva...
research
02/11/2023

Sequential Embedding-based Attentive (SEA) classifier for malware classification

The tremendous growth in smart devices has uplifted several security thr...
research
05/06/2023

Bypassing antivirus detection: old-school malware, new tricks

Being on a mushrooming spree since at least 2013, malware can take a lar...
research
08/10/2023

Analysis of the LockBit 3.0 and its infiltration into Advanced's infrastructure crippling NHS services

The LockBit 3.0 ransomware variant is arguably the most threatening of m...
research
08/09/2021

Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification

Malware is a piece of software that was written with the intent of doing...
research
04/29/2019

Technical Report: A Toolkit for Runtime Detection of Userspace Implants

This paper presents the Userspace Integrity Measurement Toolkit (USIM To...

Please sign up or login with your details

Forgot password? Click here to reset