Poster: The State of Malware Loaders

Conference Paper (2024)
Author(s)

Cristian Munteanu (Max Planck Institut für Informatik)

G. Smaragdakis (Max Planck Institut für Informatik, TU Delft - Cyber Security)

Anja Feldmann (Max Planck Institut für Informatik)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1145/3646547.3689659
More Info
expand_more
Publication Year
2024
Language
English
Research Group
Cyber Security
Pages (from-to)
745-746
ISBN (electronic)
9798400705922
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

Malware is recognized as one of the most severe cybersecurity threats today. Although malware attacks are as old as the Internet, our understanding of which part of the Internet infrastructure is used to distribute malware software is still rather limited.
In this work, we analyze more than 3 million sessions established with honeypots deployed in 55 countries that are associated with the download and execution of malware binaries. We identify two main tactics to load malware to infected machines: injection of malware by hosts initiating the connection (clients) and downloading malware from third parties (loaders). The latter tactic contributes to more than 80% of this class of sessions but involves a smaller number of cloud and content delivery servers with very different profiles than that of the clients. Our analysis also shows that it is not uncommon for different malware families to rely on the same hosting infrastructures for downloading malware. Further investigation into the code executed to download and activate malware shows that criminals tend to hide their traces by deleting their history and modifying logs and files on the compromised machines.

Files

3646547.3689659.pdf
(pdf | 1.44 Mb)
License info not available