🔒 Discover the latest insights from the VMRay Labs team shedding light on the evolution of malware evasion techniques.
In their recent article, they delve into the significance of indirect syscalls, highlighting how these tactics complicate detection processes and emphasize the need for advanced monitoring methods.
🕵️♂️ Dive into the details of #Pikabot's implementation of these evasion techniques and their impact on hooking-based EDRs
🛡️ Explore how VMRay's transition-based monitoring approach remains undetectable and resilient to evasion attempts, operating beyond the observable range of malware processes.
𝐂𝐨𝐧𝐧𝐞𝐜𝐭 𝐰𝐢𝐭𝐡 𝐨𝐮𝐫 𝐞𝐱𝐩𝐞𝐫𝐭 𝐭𝐞𝐚𝐦 𝐚𝐭 𝐄𝐥𝐢𝐭𝐞𝐕𝐀𝐃 𝐟𝐨𝐫 𝐦𝐨𝐫𝐞 𝐢𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧. 𝐘𝐨𝐮 𝐜𝐚𝐧 𝐫𝐞𝐚𝐜𝐡 𝐮𝐬 𝐛𝐲 𝐬𝐞𝐧𝐝𝐢𝐧𝐠 𝐚𝐧 𝐞𝐦𝐚𝐢𝐥 𝐭𝐨 𝐬𝐚𝐥𝐞𝐬@𝐞𝐥𝐢𝐭𝐞𝐯𝐚𝐝.𝐜𝐨𝐦.
EliteVAD
https://lnkd.in/djUmMxmK
🛡️ The latest article of VMRay Labs team suggests that indirect syscalls represent a significant evolution in #malware #evasion techniques. They not only complicate the process of detection but also underscore the necessity for advanced monitoring techniques.
🔒 Read the details on how #Pikabot implements this and other techniques to evade hooking-based EDRs. https://bit.ly/4c2LgJV
🕵️♂️ And learn how the transition-based monitoring process of VMRay remains invisible and evasion-resistant, through a mechanism that occurs outside the observable range of the malware’s processes.
#cybersecurity #malwareanalysis
Lumu CTO | Veteran CISO|SOC Manager | CISSP | Cybersecurity Evangelist
2moGreat topic at this one regarding the attack trends we are seeing in schools and local government. See you there!