August 16, 2016 By Larry Loeb 2 min read

Symantec’s Blue Coat security firm recently announced some worrying trends regarding the use of SSL by malware. Specifically, the company discovered two major trends.

To start, the number of malware samples increased to more than 29,000 in November and December 2015, up from only 500 per month before October 2015. Additionally, the number of C&C servers using SSL increased to 200,000 per quarter in Q3 2016, up from 1,000 in Q1 2015.

Huge Spike in Malware Samples Using SSL

Blue Coat noted that it had discovered a significant jump in SSL deployment since the end of 2015. The firm studied data from the SSL Blacklist site, which monitors bad SSL certificates often used by cybercriminals.

Malware such as Dridex, Gozi, Tinba, Gootkit, CryptoWall, CryptoLocker, TeslaCrypt, URLZone and Shylock are known to use SSL to protect their operations from observation or detection.

Blue Coat explained that, starting in October 2015, the malware families known to utilize SSL saw a “rapid and dramatic surge in distribution and usage.” The firm posited that the spike, which coincided with the holiday season, may have been due to the launch of several large-scale cybercrime campaigns with infrastructure based on those malware families.

The trend, according to Blue Coat, exemplifies the widespread use of SSL/TLS as an obfuscation technique, “making the threat even more relevant than ever.”

Cybercriminals Get Proactive

During the same time frame as the increase in SSL C&C servers — January 2014 through December 2015 — the firm found that overall monthly malware occurrences were roughly stable, with just a slight upward trend. Comparing the two, Blue Coat found no single large-scale trend of rising malware use that would account for the growth in the SSL C&C method.

The firm also noted the timing of the increase in C&C servers came earlier than the appearance of associated malware, Softpedia stated. This is consistent with the idea of the bad guys building up a C&C framework in advance of launching a campaign for the holiday season. Indeed, the massive jump in C&C servers can be attributed to the malware utilizing domain generating algorithms (DGA) for short-living domains to build out a C&C infrastructure.

Whatever the reasons for this spread of this technique, however, malware is adopting SSL cloaking at an alarmingly high rate.

More from

SoaPy: Stealthy enumeration of Active Directory environments through ADWS

10 min read - Introduction Over time, both targeted and large-scale enumeration of Active Directory (AD) environments have become increasingly detected due to modern defensive solutions. During our internship at X-Force Red this past summer, we noticed FalconForce’s SOAPHound was becoming popular for enumerating Active Directory environments. This tool brought a new perspective to Active Directory enumeration by performing collection via Active Directory Web Services (ADWS) instead of directly through Lightweight Directory Access Protocol (LDAP) as other AD enumeration tools had in the past.…

Smoltalk: RCE in open source agents

26 min read - Big shoutout to Hugging Face and the smolagents team for their cooperation and quick turnaround for a fix! Introduction Recently, I have been working on a side project to automate some pentest reconnaissance with AI agents. Just after I started this project, Hugging Face announced the release of smolagents, a lightweight framework for building AI agents that implements the methodology described in the ReAct paper, emphasizing reasoning through iterative decision-making. Interestingly, smolagents enables agents to reason and act by generating…

4 ways to bring cybersecurity into your community

4 min read - It’s easy to focus on technology when talking about cybersecurity. However, the best prevention measures rely on the education of those who use technology. Organizations training their employees is the first step. But the industry needs to expand the concept of a culture of cybersecurity and take it from where it currently stands as an organizational responsibility to a global perspective.When every person who uses technology — for work, personal use and school — views cybersecurity as their responsibility, it…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today