<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Malware Evasion Techniques - Living off the Land

This is the second of a series of blog posts covering some of the more common evasion techniques used by malware developers. Feel free to visit the first post dealing for what is arguably the most . . .

 

Ukraine Computers Hit By Wiper Attacks As Russia Advances

As Russia began its initial offensive into Ukraine, another kind of attack unfolded inside Ukrainian networks. A destructive wave of wiper malware attacks began corrupting files in hundreds of . . .

 

Malicious Telegram Installer Drops Purple Fox Rootkit

We have often observed threat actors using legitimate software for dropping malicious files. This time however is different. This threat actor was able to leave most parts of the attack under the . . .

 

SystemBC Malware Hides Behind Socks5 Proxy

SystemBC malware has been used by hackers at least since 2019, when Proofpoint released a detailed analysis of the trojan and its methods of infection. The malware is sold on underground hacking . . .

 

Trapping A Fat Quasar RAT

How would you go about evading the state-of-the-art sandbox? The most straightforward way would be to test your malware versus the industry’s top vendors. A sample we encountered in January, 2021 has . . .

 

Lucifer, Prevented since the very beginning (2016)

In a very recent Unit42 report by Palo Alto Networks, a new version of a malware dubbed as Lucifer was analyzed. 

 

Watch Your Six! Minerva Prevented a Built-in Keylogger in HP Driver

Recently as COVID-19 spreads, more organizations are enforcing remote work-from-home, making employees home computers more vulnerable than ever to cyberattacks. 

Minerva is the only vendor that . . .

 

Minerva’s Anti-Evasion Platform Working with Windows Defender Antivirus

Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.

 

PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace

All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .

 

Attackers Insert Themselves into the Email Conversation to Spread Malware

The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.

 

Why is Malware Able to Evade Detection?

In the context of cybersecurity, evasion is the practice of executing malicious code despite the presence of anti-malware controls. Such tactics don’t exploit fixable defects. Instead, they take . . .

 

How can malware authors determine whether their tools will be detected by antivirus solutions

Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .

 
1 2 3

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all