Integrate Virustotal.com API for scanning

Bug #1382728 reported by X1D32G2pEQ
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
Open AS Communication Gateway
Won't Fix
Wishlist
Unassigned

Bug Description

Basically the idea is to integrate the virustotal.com API as a optional module into the final release.

This will not be a replacement for a local scanning engine, but in fact it could give good or even better scantime results for known viruses and threats. Imagine if VT already has a scan of a particular file archived, at the most it just takes a few seconds to query a files hash via the api - where scanning (and even unpacking) on the local hardware would be a bit more time consuming.

There should be different modes and configuration options available, for example:

1) Hash scanning: generates a hash of every incoming attachment and check if the file is already known at VT or not

2) Hash + File scanning: same as 1) and if the hash is not already known upload file to VT for scanning (slower but pretty good scan results)

Currently the virustotal public api is officially limited to 4 api requests per minute.

Related documents and information:

https://www.virustotal.com/de/about/
https://www.virustotal.com/de/documentation/public-api/
http://www.sorbs.net/home/VirusTotal.pm

Tags: antivirus
Changed in open-as-cgw:
importance: Undecided → Wishlist
description: updated
description: updated
description: updated
description: updated
Revision history for this message
Erik Sonnleitner (esonn) wrote :

Generally speaking, this idea is nice. However, just a few thoughts:

(1) 4 API calls/minute won't suffice even for moderately sized installations. When the time has finally come, we may contact the VT team for accessing the "private API" (see https://www.virustotal.com/en/faq/#difference-private-api)

(2) Entire files uploaded to VT may not be private anymore. I have uploaded files to VT during penetration tests, including files containing code to back-connect to my host if executed; if you do this, you'll going to experience dozens of back-connects even days after uploading, from IPs all around the world - that's hardly what I would like to see in sensitive/corporate/etc attachments. Non-geeks still don't use crypto these days.

Revision history for this message
X1D32G2pEQ (x1d32g2peq-deactivatedaccount) wrote :

Hello Erik,

thank you very much for your suggestions.

Yep, the lack of private file submission and back-connects at virustotal are definitely a negative aspect.

Another alternative that came to my mind is AV Comparatives (www.av-comparatives.org) a Innsbruck based NPO. As far as I know their sample db is much larger compared to Virustotal, but they are not providing a public api yet. They are mostelikely will not going to provide a scan api, but even a hash check api for their system would be more than enough. They actually do share samples and signatures with all big av vendors and therefore always have fresh signatures and hashes of most recent in the wild stuff.

I've actually had some mail exchange with the guys at AVC some weeks ago in order to schedule a visit at their labs. I'm going to ask them whether they would be willing to offer a public api access somewhen (or maybe just private for our project).

In between we should really start a discucss about malware in mail exchange in general nowadays, since dropping all kinds of executable binaries, libraries and scripts by default is common practice now - thanks to amavis...

qr'.\(ade|adp|app|bas|bat|chm|cmd|com|cpl|crt|emf|exe|fxp|grp|hlp|hta|inf|ins|isp|js|jse|lnk|mda|mdb|mde|mdw|mdt|mdz|msc|msi|msp|mst|ops|pcd|pif|prg|reg|scr|sct|shb|shs|swf|vb|vbe|vbs|wmf|wsc|wsf|wsh)$'ix, # banned ext

What security issues we have to deal with?

- Possibly weak applications and exposed vulnerabilities (PDF, MS Office, everything related to windows...)
---> Local AV scanner / VT

- Malformed MIME headers and exploits, possible attack vectors on local mail clients
---> Amavis , Regex'in

- Embedded url's in mail body which lead to malicious content such as infected binaries, exploit kits, phising pages
---> Amavis, Regex'in, VT url submission, phishtank.com for phising url's, maybea also Anubis

- Password protected archives possibily containing malicious binaries
----> Amavis + there should be an option in the GUI to quarantine them by default

information type: Public → Public Security
Changed in open-as-cgw:
status: New → Won't Fix
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.