What do you think about the concept of developing a "pressure chamber" for malware within which an organization...
runs all new or incoming content through a system that's designed to safely trigger any executable malcode. Is this practical and cost-effective? If so, under what circumstances?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
There are many benefits to running an organization’s executable files through a “pressure chamber” to see what "blows up" when executed in a safe environment; it's a much better alternative than blowing up on your network. However, it is necessary to understand how to use it and its limitations.
An antimalware pressure chamber typically works by running or opening a file in a controlled environment, monitoring all resulting network or system behavior, and analyzing the data to identify malicious activity. Antimalware companies and security researchers have used virtual environments or syscall monitors like Systrace to analyze malware and standard tools such as Process Monitor on Windows can perform many of the same functions. There are other commercial tools that offer similar and even augmented functionality. One potential issue to note is that some malware authors have added functionality to their wares to determine if they are being executed in a virtual environment or a sandbox. They have added this functionality to make it more difficult for antimalware companies and security researchers to reverse-engineer them and create signatures to enable automated malware containment; this may limit the effectiveness of a pressure chamber.
There are some network antimalware devices that are equipped with pressure chamber functionality to help enterprises with malware containment, but it requires the purchasing of another device that potentially sits inline on an enterprise network along with a firewall, IPS, etc. Security professionals may want to evaluate if the pressure chamber functionality is contained within an IPS or firewall prior to buying or deploying a new device. Using a standalone pressure chamber for analyzing new potential malware would require significant expertise and labor in the analysis.
Related Q&A from Nick Lewis
As the Angler exploit kit evolves and adopts new functionality, it's becoming harder to detect and defend against. Enterprise threats expert Nick ...continue reading
A proof-of-concept attack on Apple's Siri allowed researchers to steal data from iOS. Learn more about the iStegSiri attack and how to defend against...continue reading
A new global email scam has cost enterprises millions. Expert Nick Lewis explains how to defend against man-in-the-email attacks with proper training...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.