Experts dispute sandboxing would have stopped Flame

By Antone Gonsalves, CSO |  Security, Flame malware

At least one vendor is making the argument that sandboxing technology would have protected computer systems against Flame, but some experts are not convinced it would have caught theÃ'Â highly sophisticated malware package believed to be built for cyber-espionage.

Julian Waits, vice president of the Advanced Technology Group at GFI Software, argued this week in the company's blog that sandboxing would have been the backstop for antivirus software, which was unable to detect the stealthy Flame. GFI sells sandboxing technology, so the post was self-serving. Nevertheless, Waits' arguments, which other experts dispute, are worth considering in the context of a layered approach to security.

Sandbox technology runs on a virtual machine along with operating systems and business applications, watching files for unusual activity. When a suspicious file is spotted, the technology alerts security pros while logging unusual behavior, such as application changes and unusual network traffic. It is then up IT staff to decide what to do.

While sandboxing doesn't actually quarantine the file, the technology does spot threats before they can do significant damage, Waits argues. Some sandboxing technology can also generate signatures for the malware, which can be inserted in intrusion detection systems and even some anti-virus systems to prevent future infections.

Flame had evaded detection for four years, before Microsoft discovered it. Such malware can't be discovered by AV software because no signatures exist for it. "Most perimeter-based security technology can't catch it," Waits told CSO on Friday. "Those are all based on the what we know."

Despite the logic in Waits' arguments, other experts disagreed that sandboxing would have caught Flame, which Kaspersky Lab said had a command-and-control infrastructure built by people with a "world-class understanding of how to exploit software and cryptography."

"It seems to be one of the most sophisticated Windows-affecting malware, and I'm afraid sandboxing may not be effective in containingÃ'Â it due to the way it infects systems," Xuxian Jiang, an assistant professor in the Computer Science Department at North Carolina State University, said in an e-mail interview.

Scott Crawford, managing research director for Enterprise Management Associates, said sandboxing in general has its limitations. If applications in the sandbox-protected virtual environment have access to outside directories, file systems or other resources, then the malware can spread without detection.

"If that leads to enabling attack capabilities, then sandboxing would not be as effective, and may, in fact, be irrelevant," Crawford said by email.

Originally published on CSO |  Click here to read the original story.
Join us:






Answers - Powered by ITworld

ITworld Answers helps you solve problems and share expertise. Ask a question or take a crack at answering the new questions below.

Ask a Question