What is encrypted malware?

Encrypted malware is a type of malicious software that uses encryption to evade detection by security solutions. Malware authors employ encryption to conceal malicious code, prevent analysis, and thwart detection by antivirus software and other cybersecurity defenses.

What is malware?

Malware, short for “malicious software,” refers to programs designed to infect, damage, or gain unauthorized access to computer systems. Malware comes in many forms, including viruses, worms, trojans, ransomware, spyware, adware, and more. Malicious actors create and distribute malware to steal data, extort money, or cause disruption.

What is encryption?

Encryption is the process of encoding data or information in such a way that only authorized parties can access it. Encryption converts plaintext data into ciphertext that appears scrambled and unreadable to unauthorized viewers. Decryption reverses the encryption process to convert the scrambled ciphertext back into readable plaintext. Legitimate reasons to encrypt data include protecting confidentiality and securing sensitive information.

How does encrypted malware work?

Encrypted malware uses cryptographic techniques to conceal its malicious code and prevent analysis or detection. Some ways encrypted malware leverages encryption include:

Encrypting malicious payloads

One of the most common uses of encryption by malware authors is to encrypt the core malicious payload. The payload might contain viruses, worms, trojans, ransomware, or other harmful code. By encrypting this payload, the malware can evade antivirus software or other defenses that rely on inspecting code.

Encrypting communications

Many modern malware variants communicate with command and control servers operated by attackers. Encrypting this communication makes it harder for security solutions to detect suspicious traffic or block malicious commands.

Encrypting malicious scripts

Some malware distributes malicious scripts that get downloaded onto infected computers. Encryption prevents inspection of these scripts, hiding their malicious intent.

Encrypting files and data

Ransomware and other malware may encrypt files or data on compromised systems. Without access to decryption keys, victims cannot recover their files and data.

What are the advantages of encrypted malware?

From the attacker’s perspective, encrypting malware offers several advantages:

Avoids detection

Encryption allows malware to evade antivirus and other signature-based defenses that rely on inspecting code. By encrypting payloads, malware can conceal itself.

Defeats analysis

Encrypted code cannot be analyzed or reverse engineered. This slows down security researchers trying to understand how the malware works.

Enables command and control

Encrypted C2 communications allow malware to resist blocking and takeover attempts. The malware can only be controlled with the decryption keys.

Prevents fingerprinting

Each malware sample has a fingerprint or signature that can be used to identify it. Encryption makes fingerprinting malware more difficult.

Facilitates extortion

In the case of ransomware, encryption without the victim having the decryption keys enables extortion of money. Victims must pay the ransom to regain access.

Common types of encrypted malware

Cybercriminals today employ encryption in many types of malware, including:

Encrypted ransomware

Ransomware such as WannaCry and NotPetya use encryption to hold files and systems hostage until ransom demands are paid. Victims cannot access their data.

Encrypted worms

Worms like Conficker spread encrypted copies of themselves across networks. Encryption prevents security tools from finding and stopping these worms.

Encrypted trojans

Trojans such as njRAT and ZeusVM use encryption to hide malicious payloads and evade detection as they infect systems.

Encrypted spyware

Spyware masquerades as legitimate software but gathers data without permission. Encryption helps spyware conceal data exfiltration and surveillance behavior.

Encrypted viruses

Viruses infect files while remaining undetected. Encryption obscures viruses from antivirus software.

Key challenges of encrypted malware

Encrypted malware poses several unique challenges for cybersecurity:

Evading detection

Traditional signature-based defenses struggle to detect encrypted malware they cannot properly inspect. New methods are needed.

Blocking communications

The encrypted C2 communications used by malware can be difficult to identify as malicious and stop.

Preventing infections

With encrypted viruses and worms, blocking initial infections is key, since encryption prevents analysis after infection.

Recovering encrypted files

Restoring access to encrypted files, especially with ransomware, is challenging without paying ransom demands.

Shutting down botnets

Botnets using encrypted C2 channels are resilient to traditional botnet takedown approaches.

Detection methods for encrypted malware

Security researchers have developed several promising techniques specifically designed to detect encrypted malware:

Behavior-based detection

Looks at a program’s behavior and actions, such as network activity, system calls, and changes, rather than solely its code. Encryption cannot hide behavioral anomalies.

Analytics and machine learning

Advanced analytics and machine learning algorithms identify patterns, such as communication fingerprints, closely associated with malware.

Deception technology

Uses decoys and lures to trick malware into revealing itself. When malware interacts with a decoy, its presence is confirmed.

Memory forensics

Looks at active malware behavior and code in a computer’s RAM to overcome encryption hiding the code on disk.

Hardware enhancers

Special hardware capabilities offload and accelerate encryption, allowing practical analysis of encrypted malware samples.

Combining multiple techniques

Often the most effective approach against advanced malware combines behavioral, analytical, technical, and human-centered cyber defenses.

Examples of encrypted malware

Several infamous pieces of encrypted malware demonstrate the evolution and sophistication of threats using encryption:

Storm Worm botnet

Emerging in 2007, this encrypted botnet lasted for years and distributed massive amounts of spam. Its encrypted C2 communications helped it avoid takedown.

Reveton ransomware

Active around 2012, Reveton pioneered the “ransomware-as-a-service” model still used today. It used encryption to extort money from victims.

Gameover ZeuS banking trojan

Discovered in 2011, this trojan stole banking credentials and financially ruined many victims. Encryption hid its network traffic and payloads.

Locky ransomware

First seen in 2016, Locky ransomware utilized strong encryption coupled with phishing campaigns to extort large ransom payments.

WannaCry ransomware

This 2017 worm ransomware attack disrupted global organizations by rapidly spreading infection using potent NSA exploitation tools. Its code and communications were encrypted.

Best practices for combating encrypted malware

Enterprises and individuals can take several steps to improve defenses against encrypted malware:

Implement behavior-based detection

Stop threats based on suspicious behaviors instead of just scanning code. Monitor for unusual network traffic, unauthorized changes, and shady process activities.

Use analytics and machine learning

Unlock the power of advanced analytics and AI to identify sophisticated encrypted malware. Train systems on known threat behaviors.

Leverage deception technology

Deploy decoys and breadcrumbs to detect malware when it interacts with fakes. This quickly confirms malware is present.

Perform rapid memory forensics

Examine RAM for signs of active malware before encryption hides evidence written to disk. Capture volatile system memory for inspection.

Combine solutions into layers

Blend signature-based, behavior-based, analytical, deception, and memory forensic defenses into a comprehensive detection web.

Keep systems patched and updated

Prevent initial infections by patching vulnerabilities and keeping software updated. Don’t let malware get a foothold.

Develop incident response plans

Have an action plan ready for when malware evades preventative defenses. Include steps like isolating infected systems, eradicating malware, restoring data, and applying lessons learned.

The future of encrypted malware

Looking ahead, several trends suggest encrypted malware threats will continue evolving:

Ransomware innovation

Expect ransomware tactics and technology to grow more sophisticated, utilizing unbreakable encryption, cryptocurrency, and anonymous payment systems.

Increase in evasive malware

Evasion, including encryption, will become standard in malware as authors battle improved detection capabilities powered by AI and machine learning.

Growth of cryptojacking

Malware secretly using victim computers to mine cryptocurrency for profit presents challenges when encryption hides mining payloads and activities.

New attack vectors

Innovative attack strategies like encrypted wireless or edge computing threats may circumvent traditional defensive measures.

Shorter attack lifecycles

Agile development and automation will enable hackers to produce new encrypted malware variants faster than ever.

Conclusion

Encrypted malware represents the next frontier in the ongoing cybersecurity arms race between attackers and defenders. As malware authors increasingly leverage encryption to hide malicious payloads, establish resilient command and control channels, disable defenses, move laterally, and extort victims, organizations must prioritize developing innovative capabilities for detecting and responding to this serious threat. By combining multiple detection approaches, maximizing threat intelligence sharing, automating rapid response, and adapting defenses powered by advanced analytics and machine learning, the cybersecurity community can rise to meet the challenge of encrypted malware. But effort and continued innovation will be required to keep pace with determined, creative adversaries constantly probing defenses. Encrypted malware will likely remain a chief cyber-danger for the foreseeable future.

Type Description
Encrypted ransomware Uses encryption to extort ransom payments by preventing access to files and data
Encrypted trojans Malicious programs concealed inside benign-looking files, using encryption to hide payloads
Encrypted worms Self-replicating malware spreading encrypted copies across networks to maximize infection