Security

Microsoft uses its expertise in malware to help with fileless attack detection on Linux

Aw, how generous

By Richard Speed

34 SHARE

Hey, Linux fans! Microsoft has got your back over fileless threats. Assuming you've bought into the whole Azure Security Center thing.

Hot on the heels of a similar release for Windows (if by "hot" you mean "nearly 18 months after") comes a preview aimed at detecting that breed of malware that inserts itself into memory before attempting to hide its tracks.

A fileless attack tends to hit via a software vulnerability, inject a stinky payload into an otherwise fragrant system process and then lurk in memory. The malware also attempts to remove any trace of itself on disk, which makes disk-based detection tricky.

Since the malware hides in RAM, a reboot generally gets rid of the thing. However, Linux servers tend to not to be rebooted as frequently as certain other operating systems and so, once infected, the malware can linger in memory, performing its nefarious activities.

An example of such an infection would be an attacker spotting a vulnerable service on an exposed port, copying a malware package and executing it. A few hops, skips and jumps later, and the malware could be listening for TCP instructions, having ensured any trace of itself in the file system has been removed.

A properly locked-down server would, of course, also mitigate things somewhat.

Only security-relevant metadata

Microsoft's detection feature scans the memory of all processes for the tell-tale footprint of a fileless toolkit, shrieking a warning in the Azure Security Center along with some details of the nasty. An admin can then decide what action to take (and what further investigation is needed).

The scan, according to the Windows giant, is not invasive and the "vast majority" take less than five seconds to run. More importantly for the those fearful of slurpage, memory analysis is performed on the host itself and the results only contain "security-relevant metadata and details of suspicious payloads".

Unsurprisingly, once signed up for the preview, you'll need the Log Analytics Agent for Linux installed, along with a supported distribution (the usual suspects: Red Hat Enterprise Server, SUSE, Ubuntu and Debian are all included in the list). You will also need to be in Standard or Standard Trial Pricing tier to play.

Microsoft isn't the only outfit squaring up to fileless threats. Kaspersky has been quick to trumpet its effectiveness and Trend Micro points to some alarming statistics concerning the surge in threats as criminals seek different means to compromise systems.

However, as its continued love-in with Linux continues (heck, a large chunk of Azure is running the OS), Microsoft has decided that maybe, just maybe, the lessons learned monitoring its proprietary OS could be extended elsewhere. ®

Sign up to our NewsletterGet IT in your inbox daily

34 Comments

Keep Reading

Canary-build Microsoft browser blocks Microsoft extension from inflicting Microsoft search engine

Virtue is its own reward

Microsoft: 14 January patch was the last for Windows 7. Also Microsoft: Actually...

Wallpaper-stripping bug will be fixed

Microsoft's Cortana turns its back on consumers as skills are stripped from Windows 10

Unloved assistant to smarten up its act in Microsoft 365. US only, naturally

It's a Bing thing: Microsoft drops plans to shove unloved search engine down throats of unsuspecting enterprises

Default-hijacking browser extension pulled from Office Pro Plus installations

WindiLeaks: 250 million Microsoft customer support records dating back to 2005 exposed to open internet

Quickly shuttered partially redacted leaky DB included 'internal notes marked as confidential'

Buzzwords ahoy as Microsoft tears the wraps off machine-learning enhancements, new application for Dynamics 365

Introducing Project Operations

Microsoft to bravely defend US democracy for a slack handful of voters in Fulton, Wisconsin

ElectionGuard guards real-life election

It's official: In May, Microsoft will close the door, lock the vault, brick over the entrance of dreaded Windows 10 1809

Now let us never speak of this again

Load of Big Green for Microsoft: Lloyds Banking Group inks company-wide Managed Desktop deal

Bankers ring in 2020 by thwacking employees with the Windows stick

Hey, remember Microsoft's IoT Linux gear? After two years, Azure Sphere is finally here

Internet of Security is the name of the game, instead of that other 'S' word

Tech Resources

8 ways Legacy ERP Harms Businesses

Download this white paper to learn the 8 ways by which legacy ERP systems hold back your business and how “version-less” cloud ERP can help eliminate costly upgrades, reduce IT infrastructure management, and drive value with rapid implementation.

2018 User Risk Report

What do today’s employees really know about cybersecurity topics and best practices that protect data and network security?

How to Stop Data Breaches & Prevent GDPR Fines

It's time to prepare yourself against data breaches.

Directeurs Financiers: Le Guide Des Echanges Transversaux Pour Les Entreprises En Croissance

Ce nouveau guide NetSuite aide les responsables financiers d’entreprises en croissance à explorer les tenants et les aboutissants des échanges transversaux