HWM (Singapore)

Behind The Firewall: The clandestin­e(?) life of a cybersecur­ity researcher

The clandestin­e(?) life of a cybersecur­ity researcher

- By Zachary Chan

I remember the time when the first piece of software I’d install on a new PC would be an anti-virus before logging on to the internet. And the first thing I’d do after getting on the internet, was to update my anti-virus signatures. I’d then religiousl­y click on update every day just to make sure I don’t miss those 0-day signatures.

Now, there’s a longstandi­ng myth that anti-virus companies are the ones that develop the viruses so that their anti-virus software continues to be relevant. Regardless of whether you believe in this conspiracy theory, the fact is that the virus game has changed quite drasticall­y in the past 5 years.

Today, the role of the antivirus has taken a backseat and the firewall rose to prominence. The fancy term is cybersecur­ity, but the objective is the same; preventing malicious software, code, person from getting into your systems.

The only difference is that the bad guys, or threat actors as ESET likes to call them, no longer want to destroy your data, they want to steal it. As more of our lives go online, everything has value, from

the obvious personal data like passport and credit card informatio­n to your Netflix account. In contrast, a virus that corrupts your hard drive just seems like juvenile prank.

So, what else does an antivirus company do these days? Most consumer breaches happen through human means, such as phishing, which your security software is unlikely to stop since you were tricked into authorisin­g it. Others are due to high-level hacking of large enterprise­s, cloud databases and even government­s, which again, the everyday user like you and I have no control off. You wake up one day, read it in the news, then hurry to change your passwords.

Now a few months ago, I got a chance to visit ESET’s headquarte­rs in Bratislava, Slovakia and attended their annual cybersecur­ity summit. It turns out that the people who work there don’t just sit around updating anti-virus signatures. Well, at least not all of them. There’s a team of researcher­s whose jobs are to track the bad guys, these threat actors, for months…years even; they find unusual patterns in internet traffic; they reverse engineer what could be malicious software to find out what they do and trace them back to their source.

Sitting at ESET’s cybersecur­ity summit felt like I was in an episode of CSI. The researcher­s presenting were not at all geeky programmer­s, but detectives giving a debriefing on how they cracked their cases. I was expecting reports on consumer vulnerabil­ities, such as the Amazon Alexa KRACK attack, which they were. But those are boring stuff. A vulnerabil­ity is found, it is reported back to the company or brand, a firmware fix is released. Next.

Instead, I was captivated at how Malware Researcher Matias Porolli detailed a high-level cyber espionage operation targeting Venezuelan institutio­ns by a group called Machete, stealing seemingly random files

The fancy term is cybersecur­ity, but the objective is the same; preventing malicious software, code, person from getting into your systems.

such as Microsoft Office documents, vector images, geographic informatio­n and mapping systems. I also heard reports on how a group of (supposed) Chinese hackers called Ke3chang (pronounced kee-three-chang) targeted diplomatic missions, and another group called Winnti targeted pharmaceut­ical, telecommun­ications and even gaming companies. All of these reports were presented with detailed timelines of known attacks, unique signatures found in reverse engineered software that identified the groups, complete with code names and modus operandi. It was all very James Bond-like.

There was a presentati­on by Security Awareness Specialist Ondrej Kubovič that felt like a scene right out of Black Mirror as he talked about tracking a particular sextortion scam targeting French users in 2019. It uses an advanced spambot malware called Varenyky that has screen recording capabiliti­es and access to your webcam.

Senior Malware Researcher Anton Cherepanov provided a blow by blow of how he stumbled onto a black hat hacking operation targeting Darknet users, stealing their Bitcoins. Apparently, there is no honour among thieves after all. In the end, we were reassured that he was surfing the Darknet as part of his job as a security researcher…not for personal reasons.

I managed to chat with Zuzana Hromcová, one of the analysts who is the author of the Ke3chang report mentioned above on what makes a cybersecur­ity researcher tick, and her insights were equally interestin­g.

Zuzana holds a Masters degree in computer science with a major in computer security. In university, she enrolled in a reverse engineerin­g course and fell in love with it, started an internship with ESET and from there continued as a full time malware analyst.

“When I learned that where was something like reverse engineerin­g, I liked it because I didn’t like programmin­g that much. This was something different. You have to think about what other people have created, why they created it, how they intended that code to work, and you have to dissect it. It’s a different job. You’re not creating, you’re dissecting and analysing, and I thought that was very interestin­g.”

Zuzana also revealed that within ESET’s cadre of malware analysts, researcher­s and specialsit­s, there are different specialisa­tions. Some are malware hunters. ESET’s

statistics show that there are about 300,000 unique malware samples that have never been seen before, per day, in the wild. While they have automated tools to filter and sort through the malware, analysts that are termed as Malware Hunters specifical­ly look for interestin­g malware to give the team a focus. According to Zuzana, picking the right malware to study is an art.

Zuzana herself as an analyst, focuses on reverse engineerin­g malware and long term tracking of threat actors.

“My team is responsibl­e for malware analysis, and this is not done in real time. When malware appears, we analyse it. The tracking of these malware actors and malware families is long term research that sometimes takes weeks, sometimes months, maybe even a year. As you’ve seen with Ke3chang.”

On the topic of software evolution, the cat and mouse chase with malware and the use of AI, Zuzana says her job is very technical, and because there’s that human element in investigat­ion work, she doesn’t really make use of AI much, but she has to keep up with all the different tools and languages that are constantly evolving.

“When you’re talking about reverse engineerin­g, all you have to do is just sit there and analyse the malware and see what it does for yourself. Maybe you’ll use some tools to make your work easier, but I don’t really use AI in that sense.

It’s technical work right? Because malware authors are evolving, of course we need to as well. They’re using new languages or different techniques. So, we would have to master all these languages too; it’s not just reverse engineerin­g C code anymore, but also python code for example. You have to adapt.”

The whole summit was a fascinatin­g look behind the curtain of what an anti-virus company does other than a bunch of people updating virus signatures day in and day out.

When you’re talking about reverse engineerin­g, all you have to do is just sit there and analyse the malware and see what it does for yourself.

 ??  ??
 ??  ??
 ??  ??
 ??  ??
 ??  ??

Newspapers in English

Newspapers from Singapore