Skip to main content
Articles

IBM X-Force Research: Knowing the Sandbox Malware

By November 3, 2017#!28Thu, 28 Feb 2019 10:45:41 -0300p4128#28Thu, 28 Feb 2019 10:45:41 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28 28am28am-28Thu, 28 Feb 2019 10:45:41 -0300p10America/Sao_Paulo2828America/Sao_Paulox282019Thu, 28 Feb 2019 10:45:41 -03004510452amThursday=904#!28Thu, 28 Feb 2019 10:45:41 -0300pAmerica/Sao_Paulo2#February 28th, 2019#!28Thu, 28 Feb 2019 10:45:41 -0300p4128#/28Thu, 28 Feb 2019 10:45:41 -0300p-10America/Sao_Paulo2828America/Sao_Paulox28#!28Thu, 28 Feb 2019 10:45:41 -0300pAmerica/Sao_Paulo2#No Comments

Malware in its many forms & #8211; from ransomware, viruses and worms to zero-day exploits and botnets & #8211; It remains a popular attack vector among cybercriminals.

Network firewalls, network intrusion detection and prevention devices, and desktop anti-virus software are experts in recognize and block or quarantine known malware. But by their nature, these security measures can only capture what they know.

Can your security solution identify an unknown and suspicious file as malware, especially if it is designed to become a benign file?

Read the new research report from IBM X-Force to familiarize you with the basics of malware sandbox environments and how to overcome the evasion techniques that malware uses to try to remain undetected.

Download the full report here and learn how:

  • The role of sandbox environments in malware;
  • What evasive behaviors malware uses to avoid detection in sandbox environments;
  • What sophisticated analysis techniques can you use to avoid malware advanced.

Leave a Reply