antivirus evasion

Tech Optimizer
December 5, 2024
Researchers at ANY.RUN have identified a zero-day attack campaign operational since at least August 2024, which employs corrupted files to bypass security measures. Attackers use corrupted files, often disguised as ZIP archives or DOCX documents, to exploit vulnerabilities in file-handling processes, allowing them to evade antivirus software, sandbox environments, and email spam filters. These files execute malicious code when opened, despite their damaged appearance. Conventional antivirus solutions struggle to scan these files effectively, static analysis tools fail to process them, and advanced email filters cannot intercept them. ANY.RUN’s interactive sandbox can dynamically analyze these corrupted files in real-time, identifying malicious activity that traditional security tools miss. The attack process involves delivering a corrupted file via email, leading to detection failure by security tools, execution through built-in recovery mechanisms in applications, and identification of malicious behavior by the sandbox. This highlights the need for advanced threat detection techniques to maintain robust cybersecurity.
Tech Optimizer
June 10, 2024
Cybersecurity researchers have discovered a new version of the Raspberry Robin malware that is adept at eluding antivirus programs. The malware was observed in a campaign in March 2024 and is designed to bypass Microsoft Defender Antivirus exclusion rules, making it difficult to detect. The malware's scripts are currently undetected by antivirus scanners on VirusTotal, highlighting its sophistication and potential threat. Raspberry Robin, also known as the QNAP worm, was initially identified in September 2021 and spread through malicious USB devices.
Search