Menu
Google-owned VirusTotal starts analyzing Mac malware in a sandbox

Google-owned VirusTotal starts analyzing Mac malware in a sandbox

The service now extracts behavioral information from scanned Mac executable files

VirusTotal, the most widely used online file-scanning service, is now executing suspicious Mac apps submitted by users inside a sandbox to generate information that could improve the analysis and detection of Mac malware.

This comes at a time when, according to security vendors, the number of potentially unwanted Mac OS X applications, especially adware programs, is at an all time high.

VirusTotal, a Google-owned service, allows users to upload suspicious files and scan them with 54 different antivirus products. However, its scan results are not perfect and should not be taken as guarantees that files are safe.

For many years, the service only performed a static scan of user-submitted files without executing them and this left out an important component of modern malware testing -- behavioral analysis.

Many antivirus products might not detect a file as malicious if it's simply stored on disk, especially if it's well obfuscated or part of a new threat. However, they might detect and block it if it tries to do something suspicious when executed.

Since VirusTotal only used static scanning, its reports never were an accurate reflection of a malicious file's detection rate across antivirus products, even though many people interpreted them as such.

In reality, if a VirusTotal scan report shows no detection for a file it doesn't mean that it's clean and should be executed without worries. However, if a VirusTotal scan returns one or more positive results, especially from well-known antivirus products, then the file that triggered them should definitely not be be executed. So, there's still value in the system.

In an attempt to complement their static analysis reports with more information that could help users, security teams and researchers make better decisions about suspicious files, VirusTotal added behavioral information for Windows executables in 2012.

This information is extracted by running the file inside a controlled environment -- a sandbox -- and monitoring what actions it performs, like what files it creates, reads, or moves and what processes it spawns.

The same capability was added in 2013 for Android apps and, as of Tuesday, is also available for Mach-O executables, DMG files, or ZIP files containing Mac apps.

"Users may scan these file types directly on www.virustotal.com, with our OS X Uploader app, or via the API," VirusTotal team member Karl Hiramoto said in a blog post.

David Harley, a senior research fellow at antivirus vendor ESET and a vocal critic of using VirusTotal scans to make claims about the performance of antivirus products, feels that the addition of sandbox testing to the service is an improvement.

"This perhaps blurs the distinction slightly between VirusTotal’s service and other security services in a way that might cause further confusion among pseudo-testers," he said in a blog post. "But that’s not VT’s fault, and I think the value added to its services more than compensates."

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Slideshows

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise

Ingram Micro completed its nationwide roadshow in Auckland last month, kicking off its Innovation Hour series with Hewlett Packard Enterprise. Uncovering the latest in storage, networking and servers, the event outlined key market trends for resellers in 2016 and beyond.

IN PICTURES: Ingram Micro Innovation hits Auckland with Hewlett Packard Enterprise
IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference

FireEye welcomed 143 channel partners and distributors to FireEye's 2016 annual Partner Conference, FireEye A/NZ Momentum - held at Establishment in Sydney. Delegates heard from senior trans-Tasman channel leaders, marketing and the product divisions in the morning, with FireEye customers, incident responders and threat intelligence analysts sharing knowledge during the afternoon.

IN PICTURES: FireEye celebrates channel at 2016 Partner Conference
​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​

With New Zealand businesses now open to innovation, the industry sits on the cusp of significant disruption in the data centre. Driven by software-defined networking, the future of the data centre is fast becoming reality, as the channel seeks to keep up, keep innovating and keep growing. APC by Schneider Electric, Lenovo and key partners outlined how the channel can capitalise at The Grill restaurant in Auckland.

​IN PICTURES: Disruption in the data centre - Can the Kiwi channel capitalise?​
Show Comments