NOTA BENE

Notes, comment and buzz from Eugene Kaspersky – Official Blog

October 28, 2011

Number of the Month: 70K per Day.

Anti-malware: it’s a dirty job, but someone’s got to do it. Or at least it used to be… but I’ll get to that later…

For your average Joe it can be hard to understand all the finer details of the work of an anti-malware company. But oh how we want to tell everyone about them! So we’re trying as best we can to translate them all into understandable, non-gobbledygook language – not to mention also in the English language!

The tip of the malware-fight iceberg one gets a peek at from collections of facts and figures, which illustrate the basic ins and outs of anti-malware. For example, here we have the kinds of infographics we issue on a regular basis:

anti-malware infographicanti-virus inforgraphicmalware infographicinfographic on malwareAnti-virus and malware infographicAnti-virus and malware software infographic
 

[click on the image to see the details]

One of the most frequently asked questions we get is: “How many viruses do you find every day?“.

At first you may laugh – but you shouldn’t. No. Here I should remind you (forgotten your better schoolteachers’ words?) that there’s no such thing as a stupid question! So what do I do with this question – simple though it seems? Answer with a simple answer. Right? But I thought that the answer was the much bandied about figure that we’ve had for a while – 35,000 viruses a day. Or somewhere in that vicinity, on average, and without going into mind-numbing detail about malware families, polymorphism, vector patterns, peculiarities of counting database records, etc.

But since for several months now the answer to this question has normally been followed up by further enquiries seeking clarifications, as it is thought that this figure is too small, we decided to get to the bottom of this once and for all. We got down to some sums and, well, were rather astonished at what we discovered. The result necessitated an update: 70,000 daily! Just a 100% increase, but there you go.

Again, I won’t get into all the gritty details (if anyone is interested – please ask in the comments section below). I’d do better telling you how generally we get to shovel up these 70,000 samples in a day.

Kaspersky Labs TailsmanMany of you will know that our “family’s” talisman is a woodpecker. And this is no accident.

Back in the day our anti-virus lab worked like a woodpecker! Like on a conveyor – we sat there and pecked away at viruses. Speaking of which, it was a very difficult, fatiguing, albeit respected profession – the dirty job that someone had to do. And guess who was the first woodpecker in the company? You guessed right: for too for many years I was pecking away daily!

However, those days are long gone. With the current high-volume streams of malware we discover every day, to peck is just unrealistic and ineffective, or rather, simply daft.

Already for years, as if on red-alert combat status… we’ve been auto-woodpecking! For human input is left just the most intellectual work – examining the trickiest samples, investigating botnets and targeted attacks, and making sure that the auto-woodpeckers don’t give any false positives, and of course, to train and develop these little helpers of ours.

There are several sources from which we receive samples of malware for analysis: self-propelling ones (which get caught in special traps), “submits” (sent by users), collection exchanges with other anti-virus companies, and our cloud-based KSN service (video, details). And in terms of the contributions towards protection of users, the latter is in the lead. So here let’s have a quick look at KSN and see how it drives our automation of malware processing.

The participating computers in KSN (currently more than a cool 50 million) send to the cloud statistics (anonymously, of course – no Big Brother participation here!) on how our products operate. Specifically, the cloud collects information about detected malicious programs and infected sites and much more besides to help reveal new outbreaks – for example, suspicious activity of programs, downloaded file checksums, and more.

Let’s say a user launches a previously unknown file. The anti-virus checks it with all the tools it has – and determines the file to be clean. Then the AV asks the cloud, and the response – no data. Ok, so we give the all-clear for the launch. But then it turns out that the file somehow strangely positions itself in the system registry, tries to access system services, sets up suspicious connections, has a double extension (e.g., jpg.exe), or does something else fishy.

A signal arrives at KSN, where the system automatically evaluates the reputation of the file (based on all the signs of trouble), and then takes a decision as to detection as “bad” or “good” or “not sure – best be careful”. If “bad”, to the protected computer is sent an “attack” command, the file is blocked, and its actions are rolled back. Of course, the more messages about a file from different computers, the higher the priority of processing and the higher the accuracy and criticality of the verdict. And if a suspicious file turns up on other users’ computers plugged into KSN – they get told straight away that it’s suspect, and advised they should not take any chances.

Let’s take another example:

Several users simultaneously download a file from one and the same link. But each time the file has a different checksum. Smells not like Teen Spirit, smells like malicious polymorphism! KSN starts to untangle the nitty-gritty and sees that, for example, the site was registered just a few days earlier, there’s some kind of iframe on it, and maybe it had even sent out infected files earlier (well, that’s a lot of signals that something ain’t right). And again, the cloud gives marks out of ten for reputation and, if not so good, sends a command to block not only the file itself and everything else originating from it, but also access to the site.

Thanks to this approach, on average between detection and verdict there are just 40 seconds!

Kaspersky Labs WoodpeckerBut our auto-woodpeckers don’t stop there. Another system pumps from the network the most suspicious files and hands them over for analysis to an automatic handler.

There’s an array of all sorts of patented and yet-to-be patented technologies related to all this, so I won’t dig deeper here – I’ll save that for another day. For now just let me say that this handler develops and tests the familiar-to-everyone updates and sends them to the server so that all of us can download them and stay optimally protected.

I remember eight years ago how competitors enviously admired how we had the knack of doing things right and getting results with the few resources we had to conduct such a huge amount of work. The answer: automation! But it’s only competent automation that’s able to cope with today’s crazy flow of malware! And btw, though the “battlefront” in anti-malware work is constantly expanding, we have for a year now not increased the number of employees in the anti-virus lab.

So how do small anti-virus companies survive, you may ask. For example how can an AV company with as few as just two virus analysts – there is such a company! – handle this avalanche of new malware?

It’s taken as read that to run a good anti-virus lab you need not only money but also brains. So how do they find the resources to keep afloat, while spending little on R&D?

This is a big topic.

For several years in the anti-virus industry “detection adoption” has been flourishing. Instead of analyzing malware, developing home-grown expertise and nourishing new technologies, some (that is, around ten) companies simply peep at the results of the hard work of others and blindly add to their databases detections based on infected files’ checksums.

And they are helped along by incompetent tests that don’t reflect protection levels in real-world conditions. As a result, coming out top of the class is not the very best software, though the quantity of its installations increases as a result of the bogus gold medals, and the overall global level of protection falls. Honest companies dedicated to genuine, painstaking anti-malware research may lose motivation to conduct research as the effectiveness of investment in R&D falls, but sales of the copy-cats’ products rise, and cybercriminals rejoice.

But this is a topic for another post…

Despite this gloomy picture we still continue our work and keep investing in anti-malware R&D. And we’re planning a lot of new technologies in next year’s releases. At the same time, I’ve no idea at the moment how to protect our investments and avoid detection adoption, which naturally thwarts the fight against cybercrime.

To finish on a merrier note, here are some pics of what some of our woodpeckers look like (some of them are still available in our merchandizing store!):

Kaspersky Labs woodpecker stress ball Kaspersky Labs woodpecker keychainKaspersky Labs woodpecker portable hard drive

And even a #kozmo woodpecker:

Kaspersky Labs woodpecker mascot

BTW, if anyone has more KL branded woodpeckers I missed here, please send me links below in the comments or use the contact form. I will be regularly updating my collection, available here.

Do svidaniya, comrades! Have a nice weekend!

comments 1 Leave a note

Ryan

70,000 viruses a day isn’t as big as I thought the number would be. Are all of these new numbers? Are you counting derivatives of existing viruses? I apologize that I don’t know the correct word, but viruses that are, oh, so similar to 1000 other viruses, but are just tweaked a little, so they’re given a new number like exampletrojanname33333333.trojan. Do you report your polymorphism findings on websites to
Search engines so the sites can be de-indexed? I’d appreciate a reply, because my site is going to write an article on this, so specifics are very important.

0
Reply to conversation
Trackbacks 7

Features You’d Normally Never Hear About – Part Three. | Nota Bene

SecureConnect Blog

Kaspersky internet security 2012 cause multiple BSOD on windows 7

Crowdsourcing in Security. | Nota Bene

Online Security: Three Best Ways to Maintain Your Online Security

卡巴斯基2015版各产品功能介绍。 | Nota Bene | Eugene Kaspersky Official Blog China

2015 en el punto de mira- Echamos un vistazo al 2015 / Una mirada al 2015 | Nota Bene | El blog oficial de Eugene Kaspersky en español

Leave a note
May 26, 2015

My Gabon–Israel–France–Monaco Grand Prix.

Haven’t been posting here for a while. The reason being that last week turned out to be horrendously hectic – without a single minute to spare for putting fingers to keyboard. Now for a bit of catch-up… From last Monday to Saturday I managed to visit four countries on three continents: Gabon, Israel, France and […]

May 15, 2015

A province by the sea.

“Should you happen to be born in an empire, It’s best to live in a remote province by the sea.” – Joseph Brodsky, Letters to a Roman Friend Top of the day to you all, dear readers of my blog. Been away for a bit. Over the May holidays I was lucky enough to spend […]

May 11, 2015

The aquapark in Atlantis: not to be missed.

Beach-resort holidays (‘vegging out’) are not my thing. At all. Sand, sun-loungers, parasols, ‘refreshing’ drinks and sunblock – I can survive that torture for two or three hours tops. Then I have to start strolling along the beach, sometimes a few kilometers at a time, oftentimes with camera. It beats lounging about any day. You […]

May 7, 2015

AV boost: exorcising the system-straining ghost.

Around the turn of the century we released the LEAST successful version of our antivirus products – EVER! I don’t mind admitting it: it was a mega-fail – overall. Curiously, the version also happened to be mega-powerful too when it came to protection against malware, and had settings galore and all sorts of other bells […]

May 5, 2015

Four tickets to Aogashima – part 2. Hachijo-jima.

A summary of part 1: 07:00. Flight from Tokyo (Haneda) to Hachijo-jima, then a tight connection – helicopter flight to Aogashima, a day there trekking and climbing about, and looking at and taking pictures of every nook and cranny. Beautiful! The next morning I had a vague sense of déjà-vu: waking up at the impossible […]

April 30, 2015

Four tickets to Aogashima.

The other day as I was browsing the Internet I came across a story about a most unusual place in Japan. It’s hard to get to but really worth the effort as it’s both beautiful and interesting. It’s the island of Aogashima, several hundred kilometers south of Tokyo, on the border between the Philippine Sea and […]

More