· 3 min read

How hackers bypass antivirus

Sandbox detection, behaviour modification, logic bombs, and zero day attacks. How hackers and malware ignore your AV.

Sandbox detection, behaviour modification, logic bombs, and zero day attacks. How hackers and malware ignore your AV.

Hackers know these techniques, you should too.

As cyber threats become more sophisticated, it is important to understand the different techniques attackers can use to evade detection. In this article, we will discuss four different techniques which can be used to evade detection: detecting simulation software, only activating under certain conditions, through a zero day attack, and through fileless malware.

  • Detecting simulation software: Similar to how a major car manufacturer can reduce emissions during an emissions test, malware can detect when it is being tested in a sandbox and can adjust its behavior accordingly. This can be done by recognizing an IP address associated with an antivirus company or detecting that company’s particular registry keys. Malware can also choose not to check for sandboxing and employ simple and advanced techniques such as “stalling” to delay activation until a certain period of time has passed, this leverages the real-life shortcoming of sandboxes, as their analysis time is inherentely limited by the end user’s patience.
  • Only activating under a certain condition: Malware can be configured to only activate in certain environments, such as attacking a specific browser version, or when a certain condition is met, such as a logic bomb attack, which may involve waiting for a certain time of day, or geographic location, or waiting for a specific trigger word to be typed.
  • Through a Zero Day Attack: Zero Day Attacks leverage zero day vulnerabilities, that is, vulnerabilities only known to the attacker, thus which are very difficult to defend against. Some defenses exist, but are marred by a high number of false positives.
  • Through Fileless Malware: Fileless Malware utilizes existing and legitimate Windows files such as binaries, libraries, and scripts and are difficult for current AV systems to detect due to their hiding in memory and not writing files to disk. Fileless Malware runs from system memory, ignoring the actual file system and able to create a virtual file system on the fly and executing malicious code without writing any files to the hard drive. This type of malware is particularly dangerous because it is capable of bypassing traditional security measures such as antivirus and firewalls, increasing the risk of a successful attack.

This article discusses four techniques which attackers can use to evade detection: detecting simulation software, only activating under certain conditions, through a zero day attack, and through fileless malware. It explains how malware can detect when it is being tested in a sandbox, as well as how it can be configured to only activate in certain environments or when a certain condition is met. It also covers zero day attacks, which leverage zero day vulnerabilities, and fileless malware, which can bypass traditional security measures.

    Share:
    Back to Blog

    Related Posts

    View All Posts »
    Anti Spam Laws Around the World

    Anti Spam Laws Around the World

    Spam, unsolicited electronic communication, has become a global issue that affects individuals, businesses, and governments alike. Various countries have developed anti-spam laws to protect consumers from unwanted emails, messages, and other forms of digital marketing. These laws vary by region, but they generally focus on requiring consent from recipients, providing clear opt-out mechanisms, and penalizing violators with hefty fines. Below is an overview of key anti-spam regulations from the United States, Canada, New Zealand, Australia, Ireland, and the United Kingdom.

    What is Risk Reduction in Cyber Security - 50 Ways to Reduce Risk

    What is Risk Reduction in Cyber Security - 50 Ways to Reduce Risk

    Explore the essentials of risk reduction in cyber security and learn how to proactively protect your organization. Uncover strategies for minimizing vulnerabilities, strengthening defenses, and implementing best practices to lower potential cyber threats and ensure robust digital security.

    What is Risk Transfer in Cyber Security - 40 Ways to Transfer Risk

    What is Risk Transfer in Cyber Security - 40 Ways to Transfer Risk

    Discover how risk transfer in cyber security can safeguard your organization. Learn about strategies to mitigate potential cyber threats by shifting liability, utilizing insurance, and partnering with third-party experts. Explore effective ways to protect your digital assets.