Bashware Technique Demonstration

Subscribers:
79,900
Published on ● Video Link: https://www.youtube.com/watch?v=fwEQFMbHIV8



Duration: 2:26
10,001 views
77


Check Point researchers recently found a new and alarming method that allows any known malware to bypass even the most common security solutions, such as next generation anti-viruses, inspection tools, and anti-ransomware. This technique, dubbed Bashware, leverages a new Windows 10 feature called Subsystem for Linux (WSL), which recently went out of Beta stage and is now a fully supported Windows feature. This feature makes the popular bash terminal available for Windows OS users, and by that allows users to natively run Linux operating system executables on the Windows operating system.

Existing security solutions are still not adapted to monitor processes of Linux executables running on Windows OS, a hybrid concept which allows a combination of Linux and Windows systems to run at the same time. This may open a door for cyber criminals wishing to run their malicious code undetected, and allow them to use the features provided by WSL to hide from security products that have not yet integrated the proper detection mechanisms.

To clarify – the problem is that most security solutions aren't adapted for this feature, it isn't something a problem with the Microsoft version itself.




Other Videos By Check Point Software


2017-10-30Upgrading from R77.3O to R80.10 Via CPUSE
2017-10-25LG HomeHack – Secure Your IoT
2017-10-25Bad Rabbit Ransomware Attack Blocked by Check Point SandBlast Anti-Ransomware
2017-10-16Step-By-Step Guide for Securing a Web Server on Azure using Check Point CloudGuard IaaS (prev. vSEC)
2017-10-12Check Point Software’s vSEC Cloud Security featured in Globb TV Interview at VMWorld 2017
2017-10-03Check Point Defeats Mobile Cyberattacks
2017-10-03Check Point SandBlast Mobile: How It Works
2017-10-03Secure your Mobile Phone Now | Introducing Check Point SandBlast Mobile
2017-10-02Advanced Cyber Attack Business Protection
2017-09-20Check Point's Avi Rembaum: Shedding Light on the Dark Web
2017-09-13Bashware Technique Demonstration
2017-09-11[Part 4] Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11[Part 3] Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11Protect Your Mobile Workforce with SandBlast Mobile & Microsoft Intune
2017-09-11Protecting Your Mobile Workforce with SandBlast Mobile & Microsoft Intune Pt.1
2017-08-17Securing Data Exchange with Check Point SandBlast and Safe-T HDS
2017-07-26CyberTalk: Conversations on the Cloud with ESG's Jon Oltsik | Cloud Security | CyberTalk
2017-07-24Continuing Policy Work-in-Progress with R80.10 Session Take Over | Tech Bytes
2017-07-20Managing Security Policy Changes with R80.10 | Tech Bytes
2017-07-19Converting Another Vendor's Security Policy to Check Point is a SmartMove | Tech Bytes
2017-07-17SandBlast Agent Protects From Advanced Zero-day Malware



Tags:
check point
checkpoint
check point software
check point software technologies
security research
bashware technique
demo
demonstration
cyber security
cyber attack
network security
web security
internet security
malware
ransomware
malware detection
mobile security
threat prevention
firewall
cloud security
anti-ransomware
anti-virus
cyber criminals
phishing
virus
data breach
data privacy
data protection
data security
advanced threat protection