What do you think about the concept of developing a "pressure chamber" for malware within which an organization...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
runs all new or incoming content through a system that's designed to safely trigger any executable malcode. Is this practical and cost-effective? If so, under what circumstances?
Ask the expert!
Have questions about enterprise information security threats for expert Nick Lewis? Send them via email today! (All questions are anonymous.)
There are many benefits to running an organization’s executable files through a “pressure chamber” to see what "blows up" when executed in a safe environment; it's a much better alternative than blowing up on your network. However, it is necessary to understand how to use it and its limitations.
An antimalware pressure chamber typically works by running or opening a file in a controlled environment, monitoring all resulting network or system behavior, and analyzing the data to identify malicious activity. Antimalware companies and security researchers have used virtual environments or syscall monitors like Systrace to analyze malware and standard tools such as Process Monitor on Windows can perform many of the same functions. There are other commercial tools that offer similar and even augmented functionality. One potential issue to note is that some malware authors have added functionality to their wares to determine if they are being executed in a virtual environment or a sandbox. They have added this functionality to make it more difficult for antimalware companies and security researchers to reverse-engineer them and create signatures to enable automated malware containment; this may limit the effectiveness of a pressure chamber.
There are some network antimalware devices that are equipped with pressure chamber functionality to help enterprises with malware containment, but it requires the purchasing of another device that potentially sits inline on an enterprise network along with a firewall, IPS, etc. Security professionals may want to evaluate if the pressure chamber functionality is contained within an IPS or firewall prior to buying or deploying a new device. Using a standalone pressure chamber for analyzing new potential malware would require significant expertise and labor in the analysis.
Dig Deeper on Real-time network monitoring and forensics
Related Q&A from Nick Lewis
The CIA Vault 7 cache exposed the Brutal Kangaroo USB malware, which can be spread to computers without an internet connection. Learn how this is ...continue reading
Kaspersky Lab recently accused Windows 10 of acting as an antivirus block to third-party antimalware software. Discover how your software is being ...continue reading
QakBot malware triggered hundreds of thousands of Microsoft Active Directory account lockouts. Discover the malware's target and how these attacks ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.