Dell Endpoint Security Suite Enterprise Threat Simulation Testing

Summary: This article provides information about threat simulation testing.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Symptoms

Note:

Affected Products:

  • Dell Endpoint Security Suite Enterprise

Many threat simulators seek to emulate the behavior of ransomware by performing some actions similar to what ransomware would do if allowed to run on the computer. These tools contain no malware in a Portable Executable format that Dell Endpoint Security Suite Enterprise scans. The primary detection mechanism in Dell Endpoint Security Suite Enterprise is pre-execution: the agent would scan any potential malware and prevent bad behavior from occurring. In other words, Dell Endpoint Security Suite Enterprise does not decide whether a file is good or bad based on the behavioral characteristics of the sample, instead it looks at the static (pre-execution) characteristics of the sample. Malware generally looks different statically than legitimate software. These are the characteristics that Dell Endpoint Security Suite Enterprise analyzes, not any patterns of behavior generated after execution.

Cause

Not Applicable

Resolution

A typical workflow for these applications would be that the application makes a test directory in which to perform the following operations as a check:

  1. Replace the content of encrypted files.
  2. Encrypt test files w/ strong encryption and safely deletes original.
  3. Encrypt test files w/ strong encryption and forcibly deletes original.
  4. Delete original files, encrypts, and simulates key generation and handshake.
  5. Encrypts files with weak encryption and deletes originals

As you can see, none of these indicators are static indicators. Except for certain aspects of Memory Protection and Script Control, Dell Endpoint Security Suite Enterprise does not use the behavior of a program to attempt to identify it as malware. Memory Protection does not identify any of the actions that are mentioned above, as they are not attempting to directly exploit memory; they are performing legitimate actions (for example, encrypting a file) which happen to share this form of malware.

Keep in mind that many of these malware simulator vendors are IT security training firms that have a vested interest in their tools returning scary results to the user, prompting them to request training. Dell Endpoint Security Suite Enterprise performs well against real malware, but unfortunately, this tool does not correctly emulate the static attributes of malware enough to be an authoritative test of the product.

Example products include:

RanSim
Note: Version 2.0.1451.6 and 2.0.1452.9 of Dell Endpoint Security Suite Enterprise have an updated Math Model that has been modified to catch these ransom simulators.

To contact support, reference Dell Data Security International Support Phone Numbers.
Go to TechDirect to generate a technical support request online.
For additional insights and resources, join the Dell Security Community Forum.

Affected Products

Dell Endpoint Security Suite Enterprise
Article Properties
Article Number: 000129793
Article Type: Solution
Last Modified: 09 Dec 2024
Version:  10
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.