Malware detection

Purpose

In the case of a successful attack, hackers might be able to manipulate your web application so that it returns malicious code to its users. Malware detection can identify such malicious code and remove it “on the fly”. To the user, your web application continues to work as intended, until you’ve been able to resolve the problem.

How malware detection works

Malware detection works in cooperation with an external malware detection service. This service scans your web application at regular intervals. vWAF communicates with the service. If the service has found any malicious code, vWAF automatically retrieves information about this code. vWAF then internally adds an invisible handler, which dynamically filters out the malicious code from all responses of your web application. Currently, malware detection exclusively works with the HackAlert service of Armorize Technologies (https://hackalert.armorize.com).

By checking the log files for the Malware Detection Handler, you can find out and document when malware detection has filtered out malicious code. The most recent replacements are also visible on the Malware Detection tab (see section on status information below).

Opening

To access the Malware Detection tab:

  1. In the navigation area, select the application for which you want to configure or monitor malware detection.
  2. Activate the External Services | Malware Detection tab.

Enabling malware detection

To enable malware detection, activate the Enable malware detection check box.

Important: For malware detection to actually work, you must have a valid user account with one of the supported malware detection service providers, and you must enter your user account data for the used malware detection service (see following sections).

Choosing a malware detection provider

Currently, malware detection exclusively works with the HackAlert service of Armorize Technologies (https://hackalert.armorize.com).

Entering user account data

To be able to query the external malware detection service, you must specify the user data that you’ve been given by your service provider. This includes username, password, and the host names of all scanned applications (Scan IDs).

  1. Enter the username and password into the Username and Password fields, and then click the Save Credentials button.
  2. Enter the first Scan ID, and then click the Add Scan ID button. To enter multiple Scan IDs, repeat the process.

The username and password are stored in the vWAF configuration database (unencrypted). Communication with the external malware detection service provider usually uses HTTPS (depending on provider).

Column Meaning

Scan ID

ID or host name of an application. This ID has been given to you by your malware detection service provider

Last Scan

Date and time of the most recent scan that was run by the external malware detection service.

Last Sync

Date and time of the most recent synchronization between vWAF and the external malware detection service provider.

Next Sync

Date and time of the most recent synchronization between vWAF and the external malware detection service provider.

Action

It depends on the external malware detection service which actions are possible:

  • warn:

    vWAF has added an entry to the log file but didn’t replace any code.

  • replace:

    vWAF has replaced the malicious code with a replacement string.

Sync Status

Indicates whether or not the most recent synchronization with the external malware detection service provider has been successful (status OK). If any error has occurred, an error message informs you about the reason of failure.

Hostname

Hosts (configured in vWAF) for which malware detection has been enabled and on which the external malware detection service has detected some malware.

Location

Shows you where exactly the malware has been detected.

Malware String

Malicious code that has been found.

Replace String

String that vWAF inserted dynamically instead of the malicious code when answering the request.