6 Ways Malware Evades Detection – And How to Stop Them (2024)

6 Ways Malware Evades Detection – And How to Stop Them (1)

6 Ways Malware Evades Detection – And How to Stop Them (2)

By SonicWall Staff

One of the key characteristics of advanced malware is the use of many tactics to evade detection. In addition to defeating signature-based detection products and behavior-based detection tools, there are hundreds of evasion techniques advanced malware uses to avoid detection. Moreover, a malware object will typically deploy multiple tactics.

While there are hundreds of specific tactics to evade detection, they fall into six key categories.

  1. Stalling delays
    With this tactic, the malware remains idle to defeat timer-based recognition. Most virtualized sandboxes can detect if malware calls the OS sleep function, but they can’t spot evasion if the malware performs the delay internally without calling the OS. Full CPU emulations, “bare-metal” detect these behaviors with unrivaled accuracy. This is very effective against a well-known competitor.
  2. Action-required delays
    This tactic delays malicious activity pending a specific user action (e.g., mouse click, open or close a file or app). Most virtualized sandboxes will not detect malware waiting on user action.
  3. Intelligent suspension of malware
    Unlike simple stalling techniques, this category includes sophisticated evasion techniques that discover the presence of a sandbox and suspend malicious actions to avoid detection. Malware waits until it has completed penetration of the host or machine before injecting, modifying or downloading code; decrypting files; moving laterally across network; or connecting to C2 servers.
  4. Fragmentation
    This tactic splits malware into fragments, which only execute when reassembled by the targeted system. As virtualized sandboxes typically evaluate fragments separately, each fragment appears harmless, thus evading detection.
  5. Return-oriented programming (ROP)
    An ROP evasion tactic modifies the stack (memory addresses of code to be executed next), thus injecting functionality without altering the actual code. ROP evasions delegate the execution of its malicious code to other programs, instead of the malware program, thereby hiding it from conventional detection.
  6. Rootkits
    A rootkit is an application (or set of applications) that hides malicious code in the lower OS layers. Most virtualized sandboxes do not monitor what an OS does with calls from applications, so the malicious actions performed by a rootkit will generally go undetected.

Because of the increased focus on developing evasion tactics for malware, organizations should apply a multi-engine approach to analyzing suspicious code, especially to find and stop ransomware and credential theft.

The award-winning SonicWall Capture Advanced Threat Protection (ATP) multi-engine sandbox efficiently discovers what code wants to do from the application, to the OS, to the software that resides on the hardware. This approach includes Lastline® Deep Content Inspection™ technology, along with two other complementary engines.

Learn more about how Lastline technology — which earned the highest achievable score in NSS Labs’ 2017 Breach Detection Systems group test — adds a key layer to Capture’s unique capabilities. Read our Solution Brief: Overcoming Advanced Evasion of Malware Detection.

https://d3ik27cqx8s5ub.cloudfront.net/blog/media/uploads/images/featured/SNWL-image-403.jpg 500 1200 SonicWall Staff https://blog.sonicwall.com/wp-content/uploads/images/logo/SonicWall_Registered-Small.png SonicWall Staff2018-02-21 10:27:242021-09-17 11:54:596 Ways Malware Evades Detection – And How to Stop Them
6 Ways Malware Evades Detection – And How to Stop Them (2024)

FAQs

How can we prevent malware detection? ›

How to prevent malware
  1. Keep your computer and software updated. ...
  2. Use a non-administrator account whenever possible. ...
  3. Think twice before clicking links or downloading anything. ...
  4. Be careful about opening email attachments or images. ...
  5. Don't trust pop-up windows that ask you to download software. ...
  6. Limit your file-sharing.

How does malware evade detection? ›

File encryption — Malware encryption involves encoding malicious code or components to hide its true purpose and evade detection by security software. This technique aims to prevent easy analysis by converting the malware's content into a scrambled format that can only be deciphered with a specific decryption key.

What are the evading techniques by modern malware? ›

Packers and Crypters: Packers and crypters are techniques used in malware to evade signature-based detection. Packers are tools that compress and encrypt the malware's code, creating a new executable that requires a specific unpacking routine to be executed, before revealing the original malicious code.

What techniques can malware authors employ to evade detection? ›

Malware authors employ a diverse toolkit: polymorphism, packers, anti-analysis techniques, fileless execution, and even social engineering to evade detection.

How does malware stay undetected? ›

One reason is that the software may not be able to recognize the malware or virus because it is new and has not been previously identified. Another reason is that the malware or virus may be designed to evade detection by disguising itself or hiding in legitimate files.

How is malware stopped? ›

Scan your device for malware.

Run a malware or security Delete anything it identifies as a problem. You may have to restart your device for the changes to take effect. Run your scan again to make sure everything is clear. If the scan shows there are no more issues, you've likely removed the malware.

How do hackers evade detection? ›

Hackers leverage encryption to conceal command and control communications and employ polymorphic and metamorphic malware that can alter its own code.

What are evasion techniques? ›

Intrusion detection system evasion techniques are modifications made to attacks in order to prevent detection by an intrusion detection system (IDS). Almost all published evasion techniques modify network attacks.

What are the techniques used for defense evasion? ›

Techniques used for evasion include removal of indicators of compromise, spoofing communications, and exploiting software vulnerabilities. Adversaries may also leverage and abuse trusted devices and processes to hide their activity, possibly by masquerading as master devices or native software.

What are anti-evasion techniques? ›

Protection against network attacks that combine several different known evasion methods to create a new technique that is delivered over several layers of the network simultaneously.

What are the 3 methods for protecting your device from malware? ›

Antivirus software, antispyware software, and firewalls are also important tools to thwart attacks on your device.
  • Keep up-to-date. ...
  • Antivirus software. ...
  • Antispyware software. ...
  • Firewalls. ...
  • Choose strong passwords. ...
  • Use stronger authentication. ...
  • Be careful what you click. ...
  • Shop safely.

What are two evasion methods used by hackers? ›

The following evasion approaches are widely used:
  • Disabling security tools.
  • Masquerading (tricked file type, scheduled tasks, renamed hacking software, etc.)
  • Obfuscating malicious code.
Apr 8, 2022

What are advanced evasion techniques? ›

Advanced evasion techniques (AETs) refer to sophisticated methods used by cyber attackers to bypass network security systems, intrusion detection and prevention systems (IDS/IPS), and other security measures in order to gain unauthorized access or deliver malicious payloads.

What methods are used by viruses to avoid detection? ›

Viruses avoid detection by pattern recognition receptors, T cell receptors and antibodies by modifying the ligands for these receptors. Different viruses target every stage of antigen processing and presentation by MHC molecules, thus inhibiting recognition by T cells.

How to stop malware detecting VM? ›

Network Adapter and MAC Address

Malware can detect a VM by examining the MAC address range, which is often specific to virtual network adapters. Before starting the VM, configure a custom MAC address, manually set a MAC address that doesn't belong to a known virtual network adapter vendor.

How can we prevent malicious code detection? ›

Using antivirus software is the best way to defend your computer against malicious code. If you think your computer is infected, run your antivirus software program.

What is malware and how to prevent it? ›

Malware is any type of software that causes damage to a system or allows access to unauthorized data from viruses that replicate themselves throughout a system. You can prevent malware with anti-virus software, email security software, and training.

Which of the following can you do to prevent against malware? ›

Antivirus and antimalware software may be installed on a device to detect and remove malware. These tools can provide real-time protection or detect and remove malware by executing routine system scans.

How do I turn off malware detection? ›

Select Start and type "Windows Security" to search for that app. Select the Windows Security app from the search results, go to Virus & threat protection, and under Virus & threat protection settings select Manage settings. Switch Real-time protection to Off.

Top Articles
National Bitcoin ATM | Buy Bitcoin and Receive it Instantly
Ways for Salon Owners to Make More Money — The Glam House Brand | Salons
Virtual Roster Ameristar
Torin Kamran Charles Cox
Parent Portal Pat Med
Wilson Tattoo Shops
[PDF] Latin America/US Hispanic Media - Free Download PDF
Stone-Ladeau Funeral Home | Winchendon, Massachusetts
Dte Platinum Protection Plan
Beau Burns Gofundme
Herbalism Guide Tbc
Report: ACC could shorten grant of rights, offer incentives to keep FSU and Clemson
Study Restaurants Near Me
How To Play BucketBall
Carbs in Nalley Tartar Sauce
Check From Po Box 1111 Charlotte Nc 28201
Devotion Showtimes Near Regency Buenaventura 6
Aldi Vs Costco: All Your Questions Answered
Oxford Covered Market: How To Visit + What To Eat & Buy! - Where Goes Rose?
Verity Or Falsity Of A Proposition Crossword Clue
Deshuesadero El Pulpo
Austin Eaccess
1818 West Taylor Street Chicago Il
selena gomez en ropa interior
Commercial Credit Cards for Business Expenses | J.P. Morgan
Retail Therapy - Meaning, Examples, Benefits, How To Stop?
Jordans Auto Sale - Springfield, MA
proofcore.io detection history
Trizzle Aarp
Hillside Funeral Home Washington Nc Obituaries
Isabella Lauren Leak
Milestones Of The Civil Rights Movement | American Experience | PBS
Aspenx2 Newburyport
Perfil del docente policial colombiano en la educación virtual: competencias tecnológicas y su utilización
Black Adam Showtimes Near Marcus Valley Grand Cinema
Genesis Fs Card Services Kay
A Description of the Western Isles of Scotland by Martin Martin
Paige Turco: Filme, Serien und Biografie
Badger State Pullers Schedule
Holiday Hours - Home Grown Apothecary
Saint Frances Cabrini West Bend Wi
Fired Dies Cancer Fired Qvc Hosts
Dawat Restaurant Novi
Alylynn
Wmlink/Sspr
Accuradio Unblocked
Wild Fork Foods Login
250 Points Standings
Rutgers University-RUWirelessSecure | Powered by SecureW2
R/Clashroyale
Latest Posts
Article information

Author: Ray Christiansen

Last Updated:

Views: 6292

Rating: 4.9 / 5 (49 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Ray Christiansen

Birthday: 1998-05-04

Address: Apt. 814 34339 Sauer Islands, Hirtheville, GA 02446-8771

Phone: +337636892828

Job: Lead Hospitality Designer

Hobby: Urban exploration, Tai chi, Lockpicking, Fashion, Gunsmithing, Pottery, Geocaching

Introduction: My name is Ray Christiansen, I am a fair, good, cute, gentle, vast, glamorous, excited person who loves writing and wants to share my knowledge and understanding with you.