The Best Protection at Every Level: Check Point Sandblast Zero-Day Protection
The Best Protection at Every Level: Check Point Sandblast Zero-Day Protection
White Paper
UNKNOWN
MALWARE
DOWNLOADS
JUMPED FROM
2.2 PER HOUR
IN 2013
TO 106 PER HOUR
IN 2014
Malware. Its a term that is getting a lot of attention in todays connected world from
reporters, business owners, and IT experts. In the network security world, malware is
malicious software that falls into one of these categories: adware, spyware, virus,
worm, Trojan, rootkit, backdoors, keyloggers, ransomware, and browser hijackers.
1
While different types of malware affect systems differently , they often share common
objectives, whether that is to steal sensitive data, gain access to unauthorized
applications or privileges, and/or disrupt business.
In early 2014, news organizations around the world hailed 2013 as the Year of
Breaches. That was until 2014 came to a close. According to a January 2015 report
2
from AV-Test , an independent IT security research firm, malware incidents increased
72% between 2013 and 2014. More malware was found in the past two years than in
3
the previous 10 years combined.
Malware complexity is increasing as cybercriminals refine their intrusion techniques,
masking malware signatures and varying attack methods. Hardest to stop are what we
call zero-day attacks, which exploit previously unknown vulnerabilities, as well as new
variants of existing malware that have not yet been seen. Because antiviruses
typically do not recognize nor catch new or unknown malware, this malware often
bypasses even the most up-to-date antivirus and intrusion prevention protections.
According to the 2015 Check Point Annual Security Report, the rate of unknown
4
malware downloads jumped from 2.2 per hour in 2013 to 106 per hour in 2014 .
According to Internet Live Stats, more than 2.4 million emails are sent every second.
6
In the first 3 months of 2015 alone, about 59.2% of these emails were spam. With
email attachments becoming the preferred method to transfer files, and the false belief
many hold that email attachments from known senders in their inbox are safe to open
makes the inbox a prime target for attacks. The old prescription for scanning email
used to be: install a good antivirus program, keep it up to date, and avoid suspicious looking files and sites. Unfortunately, that sage advice in todays world is necessary
but not sufficientto protect against modern malware.
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
Malware can hide in executables, in regular documents, and in web pages. The
dangers of attacks embedded in executable have been well publicized for many years.
Because of this awareness, the majority of users delete emails with executable
attachments. In addition, many organizations have network security policies that strip
executable attachments from emails. The latest attacks are through seemingly safe
documents, containing active elements such as macros, dynamic objects and scripts,
making them much more likely to be opened. Therefore, documents now pose one
of the greatest risks to organizations today.
DOCUMENTS NOW
POSE ONE OF THE
GREATEST RISKS TO
ORGANIZATIONS
TODAY
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
Inspecting files and clearing them before they enter into a network should be a best
practice, but is actually relatively recent. Ease of implementation and minimal impact
on the user experience; have made sandbox technologies popular among many
companies, with more and more considering adding it to their future security
strategies. As sandboxing solutions are deployed more widely, cybercriminals
continue to develop evasion techniques, sometimes simple and other times intricate,
to prevent their malware from being detected. Today, the some of the more common
8
sandbox bypassing techniques include :
DOES YOUR
SANDBOX:
Detect AND block attacks?
Have advanced capabilities such as
evasion-resistant protection?
Provide fast and accurate detection?
Support inspection of a wide range of
file types, including archive files?
Support web objects such as Flash?
Delayed launch where the payload has a timer that prevents start of the actual
malicious code for minutes/hours from initial opening of the file
Identifying the sandbox by looking for virtual machine indicators, such as
scanning registry keys, running processes, or disk size, and not deploying except
on physical devices
Checking for human interaction activities such as page scrolling, mouse clicks,
mouse movement that are difficult to replicate in a virtual environment
Sandboxing vendors are constantly creating new ways to prevent the latest evasions
from being successful and to block the malware from entering the network. However,
protections against evasion techniques are still often detectable by the malware and
the battle to stay ahead of hackers continues. Once the cybercriminals know that they
are being watched, no matter how good the traditional sandboxing technology is
there are even smarter cybercriminals working to evade it. Therefore, an even more
advanced approach to threat defense is needed.
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
MIERCOM TESTING
SHOWED THAT
CHECK POINT
OS-LEVEL THREAT
EMULATION WAS
ABLE TO IDENTIFY
MALWARE AND
UPDATE
SIGNATURES IN
APPROXIMATELY
3 MINUTES
Check Point SandBlast OS-level Threat Emulation completed in four minutes with the
best catch rate of unknown malware
Other vendors ranged from eight minutes up to nineteen minutes to complete
sandboxing. Their catch rate ranged from 27% to 70% of the unknown malware samples.
An industry assessment from Miercom on Advanced Persistent Threats (APTs) in
12
2014 found similar results.
Although the conclusion of the evaluations showed that Check Point traditional
OS-level sandbox techniques were the best, this is a cat-and-mouse game with
cybercriminals. No matter how good the traditional sandboxing technology, a smart
cybercriminal will find some innovative way to bypass it. To counter such attacks,
Check Point SandBlast Zero-Day Protection introduces CPU-level detection for
maximum evasion resistance.
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
The pioneer of Internet Security, Check Point innovates again with SandBlast
Zero-Day Protection, introducing evasion resistant CPU-level detection alongside the
industrys best OS-level sandboxing, and combining it with Threat Extraction into an
integrated solution.
The core capabilities of SandBlast include:
Threat Extraction converts reconstructed files to PDF for best security, or keeps original
format removing active content such as macros and scripts
Deep malware inspection at the CPU-level, identifies exploits before they can hide
Additional sandboxing techniques protect a full range of documents and file-types
Works with existing infrastructure, reducing the need to install new equipment
FOR MORE
INFORMATION ON
CHECK POINT
SANDBLAST, PLEASE
CLICK HERE
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015
White Paper
REFERENCES:
1
2
3
4
Ilyin, Yuri. Spam and Phishing in Q1, 2015: Banks and Banking Trojans, Kaspersky Lab
Business, June 24, 2015. https://business.kaspersky.com/spam-and-phishing-in-q1-2015banks-and-banking-trojans/4113/
Check Point Software Technologies. 2015 Check Point Security Report, 2015.
www.checkpoint.com/resources/2015securityreport/
Calhoun, Pat. A Glimpse at the Latest Sandbox Evasion Techniques, Security Week, January
15, 2015. http://www.securityweek.com/glimpse-latest-sandbox-evasion-techniques
10
11
12
2015 Check Point Software Technologies Ltd. All rights reserved. [Protected] Non -confidential content
October 26, 2015