Sunday, April 27, 2025
HomeCVE/vulnerabilityHackers Using Polyglot Files In the Wild, Here Comes PolyConv For Detection

Hackers Using Polyglot Files In the Wild, Here Comes PolyConv For Detection

Published on

SIEM as a Service

Follow Us on Google News

Polyglot files have to fit in several file format specifications and respond differently depending on the calling program.

This poses a significant risk to endpoint detection and response (EDR) systems and file uploaders, which mainly rely on format identification for analysis.

By evading correct classification, polyglots can leap over feature extraction routines or signature comparisons found in malware detection systems.

- Advertisement - Google News

Research by the following researchers from Oak Ridge National Laboratory and Assured Information Security indicates that polyglots are threats to commercial EDR tools, with 0% detection of malicious polyglots recorded during tests by some vendors:-

  • Luke Koch
  • Sean Oesch
  • Amul Chaulagain
  • Jared Dixon
  • Matthew Dixon
  • Mike Huettal
  • Amir Sadovnik
  • Cory Watson
  • Brian Weber
  • Jacob Hartman
  • Richard Patulski

The dependence on standard formats for efficient malware detection makes it vulnerable to this kind of attack whereby files can be created that are valid in multiple formats.

"Is Your System Under Attack? Try Cynet XDR: Automated Detection & Response for Endpoints, Networks, & Users!"- Free Demo

Polyglot Files Used In Wild

There is a critical gap in computer security research because no one has done an extensive study on how threat actors use these artifacts and how they are detected.

Polyglot files in malware campaigns were found to play a significant role in the tactics of APT groups.

To carry out an analysis, they developed Fazah, a tool imitating real-life polyglot creation methods.

Researchers trained PolyConv, a deep learning model that attained over 99% F1 score for both binary and multi-label classifications of polyglots.

These were not very effective compared to already existing tools used to identify files.

Functionality of a polyglot (Source – Arxiv)

For image-based polyglots, the most popular means was via custom CDR tool (ImSan) which is more efficient than YARA rules in sanitizing it with 100% efficacy.

This research fills essential gaps within cybersecurity defenses against this advanced threat by providing useful information on techniques of detecting and mitigating them as well as awareness of polyglot format detection strategies.

Malware detector (Source – Arxiv)

Threat actors often use polyglots to avoid detection and bypass commercial security tools.

Out of the 30 different polyglot samples found in these cyber-attack chains 15 instances were detected.

Common combinations are JAR+JPG and HTA+CHM, which are used by groups such as Lazarus and IcedID.

MalConv Architecture (Source – Arxiv)

PolyConv based on MalConv and PolyCat using CatBoost machine learning models demonstrate encouraging results in the detection of polyglots through byte-level features and format-agnostic approaches.

PolyConv Architecture (Source – Arxiv)

With mime-type and n-gram features added, the performance of PolyCat improved.

For this reason, detecting polyglots becomes an important way of increasing our cybersecurity defenses against advancing dangers.

Recommendations

Here below we have mentioned all the recommendations:-

  • Polyglot Detection
  • Existing Signature-based Tools
  • File-format Specifications

Are you from SOC/DFIR Teams? - Sign up for a free ANY.RUN account! to Analyse Advanced Malware Files

Tushar Subhra
Tushar Subhra
Tushar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Latest articles

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

How To Use Digital Forensics To Strengthen Your Organization’s Cybersecurity Posture

Digital forensics has become a cornerstone of modern cybersecurity strategies, moving beyond its traditional...

Building A Strong Compliance Framework: A CISO’s Guide To Meeting Regulatory Requirements

In the current digital landscape, Chief Information Security Officers (CISOs) are under mounting pressure...

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...