Page 27 - Cyber Warnings December 2015
P. 27








What is Apoc@lypse Technique?

We call the first autoimmune cyber disease, because the Apoc@lypse technique is a trigger for start
the autoimmune disease in computer. Autoimmune disease in human is a disease in which a
person’s immune system wrongly attacks its own healthy tissues. The Apoc@lypse technique is a
generic and extremely efficient way to bypass the protection of the anti-malware system. The
technique explore a vulnerability that exist in the signature-based technology of the anti-malware
and it allows infecting in the furtive form a machine target. We injected tens and hundreds of
malware pieces of DNA known benign files in the system itself without any action of anti-malware.
All file types are susceptible to action infection the Apoc@lypse technique, such as file system, user
system or software. We can use any part of the malicious DNA and some antivirus will be affected
and others not. However, a special DNA affects all antivirus. This is EICAR Anti-Malware Testfile,
because all antivirus recognize it as a virus or malware but this is not a virus. The test file simply
displays a text message and returns the control to the operating system. After infection, the anti-
malware system started autoimmune cyber disease and all files infected was deleted from system.

The signature and hash identify and distinguishes the appearance, and not the attitude, of software.
Even the heuristic concept carries with it the detection of several indicators of a signature or
stereotype of a threat. The Apoc@lypse Technique is implemented in software and it allows
choosing between several existent forms of infection.



Apoc@lypse Technical Potential

Anti-malware system are inefficient when we use Apoc@lypse Technique against system. The
Apoc@lypse Technique undoubtedly will contribute to bring the system into more disrepute and
discouraged users from using it. According to, The Global State of Information Security® Survey
2014 of PWC , the companies have invested in cyber security, but they are not accompanying the
evolution of his current adversaries. Nowadays, we are trusting in model security created in the past
to struggle present threats.


Proof of concept


We demonstrated that is possible to take control of anti-malware system and to command operating
system destruction. The Apoc@lypse Technique proof of concept is more effective in Windows
Operational System, but for the other operational systems (Linux, Android, UNIX e Mac) the effects
can be less catastrophic. The Apoc@lypse technique explore undisclosed vulnerability in the anti-
malware systems. Technical efficiency of Apoc@lypse were successfully tested in 157 anti-malware
system existing in the international market. In figure 1, we present the geographical distribution of
anti-malware companies in the world used in Apoc@lypse test bed. The technique Apoc@lypse is
efficient in various versions of Operational System Windows 32 and 64 bits.






27 Cyber Warnings E-Magazine – December 2015 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   22   23   24   25   26   27   28   29   30   31   32