Anti-Forensic Malware Widens Cyber-Skills Gap

Written by

The rise of attacks that use file-less malware and other anti-forensics measures is creating a greater-than-ever skills gap in the cybersecurity industry.

Increasingly, bad actors are using techniques that leave little trace on physical disks. And unfortunately, the white hats aren’t keeping up: There’s a shortage of digital forensics practitioners able to investigate these types of offensives.

According to Alissa Torres, founder of Sibertor Forensics and former member of the Mandiant Computer Incident Response Team (MCIRT), “Attackers know how forensics investigators work and they are becoming increasingly more sophisticated at using methods that leave few traces behind—we are in an arms race where the key difference is training.”

In the last year, Torres said that she has seen a rise in file-less malware, which exists only in volatile memory and avoids installation on a target’s file system.

“Five years ago, to see sophisticated anti-analysis and acquisition techniques in the wild was like seeing a unicorn but that is no longer the case,” she said. “As techniques for detecting trace artefacts on a compromised system have improved, the more sophisticated attackers have adapted quickly.”

The SANS Institute estimates that possibly one in four digital forensics and incident response (DFIR) professionals has the level of training to successfully analyze the new types of self-defense techniques that include more sophisticated rootkit and anti-memory analysis mechanisms.

“The memory forensics field exploded around 2005 when a lot of the parsing tools started to become available and its use in forensics has been growing ever since,” explained Torres. “An incredible advantage this analysis method has is speed—a skilled expert in memory forensics can discover insights a lot quicker and pick up on information that is missed in traditional disk imaging.”

Although the tools have improved, Torres also pointed out that “owning a hammer and saw doesn’t make you a carpenter—a deeper understanding of the operating system internals to include memory management allows the examiner to access target data specific to the needs of the case at hand.”

What’s hot on Infosecurity Magazine?