Drawing the line

The so-called ‘malware obfuscation contest’ proposed by the folks at Race to Zero is already generating contradictory discussions.

IMHO – either something is ethical or not…and I firmly hold that creating new malware to bypass security products ‘for fun’ is not!

We anti-virus researchers have always opposed the creation of new malware under any circumstances. The only excuse for creating malware in test environments that ever sounded vaguely reasonable was the old “we need to create new samples in order to study attack methods in detail”.

Let’s get real folks – we are seeing new samples by the thousands today – we have more than enough ‘live’ malware to study in order to improve our technologies. So even if this excuse was “sort-of-maybe one-time-only almost-acceptable” once upon a time, it is NOT acceptable in 2008.The assertion that “signature-based antivirus is dead, people need to look to heuristic, statistical and behavior based techniques to identify emerging threats” is just a cheap publicity stunt. Nobody, but nobody in the AV industry depends only on signatures – we haven’t for years. In fact, it sounds as if most (read all) AV scanners will fail the ‘tests’ in the ‘contest’ because it’s easy to cheat signature-based scanners and static heuristics.

This will send a clear message to thousands of e-criminals: “do more obfuscation”. So, this ‘contest’ will only stimulate e-criminals to research and develop new obfuscation technologies. Since they are busy doing this anyway – they just will do it more and more. Thanks, but no thanks, virus labs don’t need such stimulation – we have enough work as it is.

The most positive public responses are calling the contest a form of product testing. Wrong!!

Antivirus testing, like any other product testing, must be done by trained professionals, for instance Andreas Clementi, Andreas Marx or Virus Bulletin, in a fair, ethical and scientific manner. This is how things work in a reputable industry.

The Race to Zero/DefCon ‘contest’ is:

  • NOT done by professional testers – no comment
  • NOT fair – no public contacts with AV vendors to date
  • NOT scientific – the test bed is not delineated
  • And, last, but not least, it is 100% NOT ethical! Writing malware is a crime. End of story.

Finally – what about the US Federal Computer Act?? And other legislation? Is this ‘contest’ even legal in the US? Is the agency responsible for monitoring e-crime aware of it?

So, it all boils down to… should we have public and unstructured ‘contests to test’ criminal technologies run by uncertified/unproven people? What about a ‘live robbing a bank contest’ to test bank security systems? Or maybe a ‘drugs distribution trial in a school’ – to test the narcotics police?

Anything can be taken to a ridiculous extreme – code analysis included. Let’s all take a deep breath and focus on developing protection technologies, not ‘modifying malcode for fun’.

Drawing the line

Your email address will not be published. Required fields are marked *



The leap of a Cycldek-related threat actor

The investigation described in this article started with one such file which caught our attention due to the various improvements it brought to this well-known infection vector.

Lazarus targets defense industry with ThreatNeedle

In mid-2020, we realized that Lazarus was launching attacks on the defense industry using the ThreatNeedle cluster, an advanced malware cluster of Manuscrypt (a.k.a. NukeSped). While investigating this activity, we were able to observe the complete life cycle of an attack, uncovering more technical details and links to the group’s other campaigns.

Sunburst backdoor – code overlaps with Kazuar

While looking at the Sunburst backdoor, we discovered several features that overlap with a previously identified backdoor known as Kazuar. Our observations shows that Kazuar was used together with Turla tools during multiple breaches in past years.

Subscribe to our weekly e-mails

The hottest research right in your inbox