August 16, 2016 By Larry Loeb 2 min read

Symantec’s Blue Coat security firm recently announced some worrying trends regarding the use of SSL by malware. Specifically, the company discovered two major trends.

To start, the number of malware samples increased to more than 29,000 in November and December 2015, up from only 500 per month before October 2015. Additionally, the number of C&C servers using SSL increased to 200,000 per quarter in Q3 2016, up from 1,000 in Q1 2015.

Huge Spike in Malware Samples Using SSL

Blue Coat noted that it had discovered a significant jump in SSL deployment since the end of 2015. The firm studied data from the SSL Blacklist site, which monitors bad SSL certificates often used by cybercriminals.

Malware such as Dridex, Gozi, Tinba, Gootkit, CryptoWall, CryptoLocker, TeslaCrypt, URLZone and Shylock are known to use SSL to protect their operations from observation or detection.

Blue Coat explained that, starting in October 2015, the malware families known to utilize SSL saw a “rapid and dramatic surge in distribution and usage.” The firm posited that the spike, which coincided with the holiday season, may have been due to the launch of several large-scale cybercrime campaigns with infrastructure based on those malware families.

The trend, according to Blue Coat, exemplifies the widespread use of SSL/TLS as an obfuscation technique, “making the threat even more relevant than ever.”

Cybercriminals Get Proactive

During the same time frame as the increase in SSL C&C servers — January 2014 through December 2015 — the firm found that overall monthly malware occurrences were roughly stable, with just a slight upward trend. Comparing the two, Blue Coat found no single large-scale trend of rising malware use that would account for the growth in the SSL C&C method.

The firm also noted the timing of the increase in C&C servers came earlier than the appearance of associated malware, Softpedia stated. This is consistent with the idea of the bad guys building up a C&C framework in advance of launching a campaign for the holiday season. Indeed, the massive jump in C&C servers can be attributed to the malware utilizing domain generating algorithms (DGA) for short-living domains to build out a C&C infrastructure.

Whatever the reasons for this spread of this technique, however, malware is adopting SSL cloaking at an alarmingly high rate.

More from

FYSA – Adobe Cold Fusion Path Traversal Vulnerability

2 min read - Summary Adobe has released a security bulletin (APSB24-107) addressing an arbitrary file system read vulnerability in ColdFusion, a web application server. The vulnerability, identified as CVE-2024-53961, can be exploited to read arbitrary files on the system, potentially leading to unauthorized access and data exposure. Threat Topography Threat Type: Arbitrary File System Read Industries Impacted: Technology, Software, and Web Development Geolocation: Global Environment Impact: Web servers running ColdFusion 2021 and 2023 are vulnerable Overview X-Force Incident Command is monitoring the disclosure…

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today