Evasive Malware Tag

In a previous blog, titled Evasive Malware – The Art of Doing Nothing, we covered how advanced malware evades detection by stalling and postponing all malicious activity whenever a sandbox is detected.  In today's blog, we'll look at another sophisticated evasion technique...

Advanced malware uses a number of techniques to avoid being detected by a sandbox. One method is to stall. When a malicious object discovers that it's under evaluation, it will postpone evil behavior until the sandbox times out. The malware simply hides its...

There's no question that cybercriminals benefit from the knowledge, tools, and experience of other hackers. They often band together to form powerful crime rings, sharing their techniques and the latest network vulnerability information. If we are to be successful battling these formidable adversaries, the security industry...

One of the common misconceptions regarding a conventional sandbox is how much it can actually observe when evaluating an object for malicious behavior. Because a conventional sandbox runs in an isolated virtual machine environment, an object can safely execute without risk of...

Exploit Kits are a serious cyber threat today and are responsible for the vast majority of malware infections worldwide.  Exploit kits are sophisticated but malicious programs designed and distributed by cyber criminals. They help fraudsters, hackers, and data thieves breach an organization's...

If the past is any predictor of the future, we can expect a dramatic surge of malware infections during the next several weeks. Historically, the number of malware infections has increased significantly during November and December. This annual spike is primarily driven...

Ransomware is a growing problem for organizations of all sizes. Earlier this year, the FBI projected that in 2016, ransomware victims would pay $1Billion dollars to recover their data. For many cyber thieves, ransomware has become the preferred crime, surpassing even credit card...

Advanced malware solutions ("sandboxes") traditionally use virtual machines (VM) to analyze suspicious objects to find out if they are malicious. However, advanced malware is capable of detecting the presence of the virtual machine technology used by conventional sandboxes and leveraging this weakness to...