Command & Control

Malware Update

Malware Update

Detection overview

The "Malware Update" detection focuses on identifying instances where malware within a network is attempting to update itself. Malware often includes mechanisms to connect to command and control (C&C) servers to download updated code, configurations, or additional payloads. Detecting these updates is crucial to prevent the malware from gaining new capabilities, avoiding detection, or executing additional malicious actions.

Triggers

  • An internal host is downloading and installing software from the Internet
  • The downloads are over HTTP, appear to be machine- driven, and follow a suspicious pattern of checking for availability of files before downloading them

Possible Root Causes

  • The initial exploit on this host may be loading malware to continue the attack
  • Malware installed on the host may be updating itself to enhance its functionality
  • Malware installed on the host may be updating itself to a new version of its software

Business Impact

  • An infected host can attack other organizations (e.g. spam, DoS, ad clicks) thus causing harm to your organization’s reputation, potentially causing your IP addresses to be black listed and impacting the performance of business-critical applications
  • If this is a targeted attack, it can spread further into your network and ultimately exfiltrate data from it
  • The malware which infected the host can create nuisances and affect user productivity

Steps to Verify

  • Look up the domain and IP address to which the communication is being sent via reputation services to see if this is known malware; such lookups are supported directly within the UI
  • Search for the domain + “virus” via a search engine; this is effective for finding references to known adware or spyware
  • Download the supplied PCAP and look at the HTTP payload being sent to see if any data is being leaked in clear text or whether the identity of the program is visible
Malware Update

Possible root causes

Malicious Detection

  • An attacker is using C&C servers to update malware on compromised systems.
  • Use of automated malware update mechanisms to avoid detection and enhance capabilities.
  • Insider threat where an employee has intentionally installed or is updating malware

Benign Detection

  • Legitimate software updates that resemble malware activity.
  • Security assessments or penetration tests involving controlled malware deployment and updates.
  • Misconfigured systems or software causing unusual update behaviors.
Malware Update

Example scenarios

Scenario 1: An internal host starts downloading large files from an external IP address. Further investigation reveals that the files are malware updates downloaded from a command and control server to enhance the malware's capabilities.

Scenario 2: A sudden spike in outbound HTTPS traffic is detected from a server that is normally inactive. Analysis shows that the traffic involves downloading encrypted payloads, indicating an update to an existing malware strain.

Malware Update

Business impact

If this detection indicates a genuine threat, the organization faces significant risks:

Enhanced Malware Capabilities

Updated malware can introduce new functionalities, making it more difficult to detect and remove, and potentially increasing its destructive impact.

Persistent Threat

Regular updates can enable malware to maintain a foothold within the network, continuously evolving to avoid detection and carry out malicious activities.

Data Exfiltration

Updated malware might include new data exfiltration techniques, leading to potential data breaches and loss of sensitive information.

Malware Update

Steps to investigate

FAQs

What is a malware update?

How can I detect malware updates in my environment?

What are the common signs of a malware update?

Why is a malware update a significant threat?

Can legitimate activities trigger the detection of malware updates?

What steps should I take if I detect a malware update?

How does Vectra AI detect malware updates?

What tools can help verify the presence of malware updates?

What is the business impact of a malware update?

How can I prevent malware updates?