So our security team has raised a concern with Go and malware. The link that was sent to me was https://securityboulevard.com/2021/09/behavior-based-detection-can-stop-exotic-malware/.
I reached out to Bill Kennedy on Twitter who disagreed that Go was a problem. Said it was worth posting here to hear people's thoughts.Thanks!
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/ed1966c2-675b-4030-911b-7fa618291985n%40googlegroups.com.
--
I think the concern is in using the language to wrap malware that would otherwise be detected. So not the outcome of the malware but the hiding of it.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/7cdc8e55-b4d8-4787-8cc2-f3e15fb41718n%40googlegroups.com.
They are suggesting that Go is being more widely used than others,
making it more of a risk.
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/63527e94-331d-45bd-9d5a-019c0df4aba9n%40googlegroups.com.
They are suggesting that Go is being more widely used than others, making it more of a risk.
The issue is not a vulnerability in the language itself but the use of that language to embed malware so AV signatures do not detect it. The feeling is that our InfoSec will be wanting to restrict obscure languages (Go, Rust etc...).
On Aug 23, 2022, at 10:44 AM, Brian Candler <b.ca...@pobox.com> wrote:
On Tuesday, 23 August 2022 at 15:30:49 UTC+1 Gopher-Insane wrote:The issue is not a vulnerability in the language itself but the use of that language to embed malware so AV signatures do not detect it. The feeling is that our InfoSec will be wanting to restrict obscure languages (Go, Rust etc...).And how exactly does choosing not to use Go/Rust in your own organization, avoid you from getting infected by malware written in Go/Rust?
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/a465a7ff-3e13-458d-a7f8-61c0375c38a7n%40googlegroups.com.
The issue is not a vulnerability in the language itself but the use of that language to embed malware so AV signatures do not detect it. The feeling is that our InfoSec will be wanting to restrict obscure languages (Go, Rust etc...).
On Tuesday, 23 August 2022 at 15:22:39 UTC+1 jesper.lou...@gmail.com wrote:On Tue, Aug 23, 2022 at 2:58 PM 'Gopher-Insane' via golang-nuts <golan...@googlegroups.com> wrote:They are suggesting that Go is being more widely used than others, making it more of a risk.--Is their position "we shouldn't write Go in our organization, because it's being used by malware creators elsewhere?"I'm still confused as to what the context of this is.J.
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/631fa521-9209-42a5-9244-bbb1a774ef69n%40googlegroups.com.
I think what is being suggested that if the sec team bans all applications that exhibit dynamic code loading behavior they’d be safer - which would catch a lot of apps in the net.
On Aug 23, 2022, at 11:05 AM, Brian Candler <b.ca...@pobox.com> wrote:
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/73a6a242-ce44-4a48-8794-6f67a4b78167n%40googlegroups.com.
--
You received this message because you are subscribed to the Google Groups "golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email to golang-nuts...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/ed1966c2-675b-4030-911b-7fa618291985n%40googlegroups.com.
On Tue, Aug 23, 2022 at 9:29 AM Robert Engels <ren...@ix.netcom.com> wrote:
>
> I did not read the analysis - just the thread here and earlier threads on this subject. My understanding that even though Go is statically linked the loader does relocations that confuse virus scanners.
I'm not sure precisely what you mean, but I don't think that's
accurate. There is no Go loader. The statically linked binary
produced for a pure Go executable has no run-time relocations at all.
My assumption--and it is just an assumption--is roughly the reverse:
because pure Go programs are statically linked, and because the symbol
table does not use the same names as a default C symbol table, a virus
scanner has a harder time seeing which system calls are being used.
Of course the same would be true for a statically linked C program,
but perhaps malware writers tend to steer clear of those.
Obviously anything that Go is doing can also be done in C, but the
malware authors do have to work a bit harder to do that.
Ian
Apparently Go is an "unconventional language". So Languages are divided into "conventional" and "unconventional"
languages.
To view this discussion on the web visit https://groups.google.com/d/msgid/golang-nuts/682d8bda-825e-4e97-9b4c-c4d24fdd5326n%40googlegroups.com.