03.12.2021 Views

Cyber Defense eMagazine December Edition for 2021

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge! Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Will you stay one step ahead of Cyber Scrooge this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is here...Defeat Cyber Scrooge!

Cyber Defense Magazine December Edition for 2021 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Why do you need a malware sandbox?<br />

It is not always possible to detect malicious code in static analysis. The sandbox allows you to deploy a<br />

sample, examine its work and behavior in dynamics. The tool helps to build protection against any<br />

malicious objects: backdoors, downloaders, bankers, ransomware, etc. Websites, applications, and<br />

operating systems – the service landscape is huge. The sandbox is often placed in the DMZ segment,<br />

between the perimeter firewall and the core.<br />

What is the difference between a sandbox and an antivirus?<br />

A malware sandbox dynamically analyzes objects in an isolated network environment that has no<br />

connection to the company's network and allows the object to reveal itself as much as possible. Hostbased<br />

antivirus works another way around, it aims to block malware and its actions. Antivirus or EDR is<br />

the next tier of protection. Most importantly, the malicious object should not reach the workstation.<br />

What types of objects are handled by the sandbox?<br />

It can be links, binaries, word or excel files, images, any customer objects. It is worth mentioning that<br />

there is no sense in analyzing files larger than 300 MB. There are separate specific solutions <strong>for</strong> analyzing<br />

large files, this is very rarely needed.<br />

Malicious objects get to sandbox from several sources like Firewalls, mail gateway, WAF. And many<br />

standard protocols are supported <strong>for</strong> the exchange: Syslog, ICAP, SMTP, NFS. You can integrate the<br />

sandbox via an API into almost any environment, so all kinds of organizations can benefit from this tool.<br />

Does the sandbox help protect against an APT attack?<br />

Yes, the sandbox helps in defending against advanced persistent threats, APT attacks because it allows<br />

you to analyze events in depth. A malicious object can have different signatures and bypass the antivirus,<br />

but the behavior stays about the same, which the sandbox shows. One of the main goals is to make the<br />

sandbox the most attractive <strong>for</strong> malware so that it can expose itself as much as possible in a controlled,<br />

secure environment. For example, the interactive approach of ANY.RUN sandbox triggers malware that<br />

requires direct human actions. Drag a mouse, tap keys, create specific files and folders, open documents<br />

– do everything to trick malware.<br />

Of course, you can create your own isolated environment <strong>for</strong> malware analysis from scratch. But it takes<br />

a lot of ef<strong>for</strong>t and time in preparation. And still, there is a chance that your sandbox will not be secure<br />

enough, invisible <strong>for</strong> malware, and provide the necessary in<strong>for</strong>mation. To speed up the process we<br />

recommend using ready-made solutions like ANY.RUN. It is an online service, so you can run a sample<br />

from anywhere and get results right away.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>December</strong> <strong>2021</strong> <strong>Edition</strong> 77<br />

Copyright © <strong>2021</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!