We won’t stop until we have caught all of the malware around the world. With this in mind, we made some developments again in the Anti-Malware Module.
Let’s see what has changed!
Refreshed Anti-Malware Section on the Console
It is now much easier to start a Malware Scan. Just go to the Anti-Malware section on the Console, and you will find the “Start New Malware Scan” button. Click on it, choose the server you want to scan and write in the path below.
Malware signatures are displayed in the same section with the new, improved table layout. Suspicious files validation can be reached from here, so there is no need for a page reload anymore. You can also check those signatures that had the most malware catches.
And from now on, the started and finished scans can be examined on the Anti-Malware Overview page.
New Type of Malware Signature: Source Analysis Snippet
As time goes by, malware injection techniques are getting more and more sophisticated, with different encrypting and forms of malware. These new methods required a new approach to the way we eliminate them, introducing: the SA-Snippets.
SA stands for Structure Analysis, which you can read more in-depth about here.
We only remove the infected, harmful part from a file, leaving the good bits untouched with this method. The great thing about this is that even if the malware tries to disguise itself by using different characters, our signatures can still recognize harmful code and clean the files.
We have cleaned over 400,000 injected malware with the new technique.
Malware Hunting
Our malware hunting Ninjas are tireless and did an absolutely fantastic job this year.
We have seven times more global blacklisted published signatures than we had at the end of the last year. This result is also reflected in the number of our malware catches.
In 2021 Q1, we caught 38,8 million malware, and in the third quarter of the year, this number went up to 130,5 million.
What Has Changed in the Anti-Malware Module So Far?
It creates a special structure-based signature from the source code and then does the matching on the structure. This way, no matter how hackers alter the source, the structure will be the same.
We realized that you need a more simple validation process, so we developed a new feature on the Console that closely resembles a well-known online dating service. It shows the source of the signature syntax highlighted, and you can decide whether or not it’s malware or if you are unsure about it. This way, you can publish malware and quarantine the files in one step!
Next, we also added a new module to the BitNinja system we named Sandbox Simulator. It’s a PHP emulator that runs the PHP files on the server in a safe environment and automatically analyses the file’s behavior.
It also analyzes the old PHP files on the servers. We can easily discover the most recent zero-day malware with the Sandbox Simulator, even if they are obfuscated.
We keep on going to have you the world’s best cybersecurity tool!
Do you have ideas for new features or some suggestions on how we could improve BitNinja? Don’t hesitate to share it with us.
Cybersecurity is not optional anymore. It is a must! If you haven’t tried BitNinja yet, don’t forget to register for the 7-day free trial! No credit card needed!
Proactive Linux server protection from a centralized, easy-to-use console. Secure your web servers and customers’ websites against all kinds of cyber threats with our multi-layered security tool
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookies
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.