Antivirus & Malware Evasion Techniques (2024)

In today's world, antivirus software is a crucial aspect of security for endpoints including computers and servers, ranging from individual users to large organizations. Antivirus software provides a key defense against cyber threats but is not infallible. There are various techniques that cybercriminals use to bypass antivirus and evade malware.

How do antiviruses work?

The goal of antivirus software is to determine whether a file is malicious – and it needs to do this quickly to avoid impacting the user’s experience. Two widely-used methods that antivirus solutions use to search for malicious software are heuristic and signature-based scans:

  • Heuristic-based scanning examines the function of a file, using algorithms and patterns to establish whether the software is doing something suspicious
  • Signature-based scanning examines the form of a file, looking for strings and patterns that match known malware samples

Malware creators can choose to interact in two ways with antivirus – one is on disk and the other is in memory. On disk, a typical example would be a simple executable file. Antivirus has more time to scan and analyze a file on the disk. If loaded in memory, an antivirus has less time to interact and generally malware is more likely to execute successfully.

Limitations of antivirus

While antivirus software is a recommended way to keep systems secure, ultimately it does not make devices unhackable. A typical antivirus program uses a database of malware signatures made up of previously identified malware. Whenever a new malware sample is discovered, a digital signature for it is created and added to the database. This means that there is a vulnerable period between a new malware being circulated and antivirus programs updating their databases. During that time, malware has the potential to cause havoc. So, while antivirus software provides an added layer of security, they don’t mitigate threats entirely.

In addition, the number of operating system (OS) independent languages that can be used to write malware is increasing, which means a single malware program has the potential to impact a wider audience. As cyber threats become more sophisticated, antivirus programs must evolve to keep up. With hackers continuously evolving their techniques to bypass antivirus programs, and because of the complexity of today’s security landscape, this is a challenge.

Antivirus evasion techniques

To achieve their objectives, cybercriminals have developed a range of evasion techniques. These include:

Code packing and encryption

The majority of worms and Trojans arepacked and encrypted. Hackers also design special utilities for packing and encrypting. Every internet file that has been processed using CryptExe, Exeref, PolyCrypt and some other utilities, has been found to be malicious. To detect packed and encryptedwormsandTrojans, the antivirus program must either add new unpacking and decoding methods, or add new signatures for each sample of a malicious program.

Code mutation

By mixing a Trojan virus’s code plus spam instructions – so that the code takes on a different appearance, despite the Trojan retaining its original functionality – cybercriminals try to disguise their malicious software. Sometimes code mutation happens in real time – on all, or almost all, occasions that the Trojan is downloaded from an infected website. The Warezov mail worm used this technique and caused serious issues to users.

Stealth techniques

Rootkit technologies – that are generally employed by Trojans – can intercept and substitute system functions to make the infected file invisible to the operating system and antivirus programs. Sometimes even the registry branches – where the Trojan is registered – and other system files are hidden.

Blocking antivirus programs and antivirus database updates

Many Trojans and network worms will actively search for antivirus programs in the list of active applications on the victim computer. The malware will then try to:

  • Block the antivirus software
  • Damage the antivirus databases
  • Prevent the correct operation of the antivirus software’s update processes

To defeat the malware, the antivirus program has to defend itself by controlling the integrity of its databases and hiding its processes from the Trojans.

Masking the code on a website

Antivirus providers quickly learn the addresses of websites that contain Trojan virus files – and their virus analysts then study the content of these sites and add the new malware to their databases. However, in an attempt to combat antivirus scanning, a webpage can be modified – so that, when requests are sent by an antivirus company, a non-Trojan file will be downloaded instead of a Trojan.

Quantity attacks

In a quantity attack, large quantities of new Trojan versions are distributed across the internet within a short time period. As a result, antivirus companies receive huge numbers of new samples for analysis. The cybercriminal hopes that the time taken to analyse each sample will give their malicious code a chance to penetrate users’ computers.

Zero day threats

Your antivirus program is updated regularly. This is usually in response to a zero-day threat. This is a malware evasion technique where a cybercriminal exploits a software or hardware vulnerability and then releases malware before an antivirus program can patch it.

Fileless malware

This is a more recent method of running malware on a machine that doesn’t require anything to be stored on the targeted machine. Fileless malware operates entirely in the memory of the machine, allowing it to bypass antivirus scanners. Visiting an infected webpage does not deliver the malware directly. Instead, it uses a previously known vulnerability in a related program to direct the machine to download the malware to a memory region – and from there, it is executed. What makes fileless malware so dangerous is that once the malware has done its job or the machine is reset, the memory is wiped and there is no evidence that a criminal installed malware.

Phishing

Phishing is one of the most common techniques that cybercriminals use to steal information. In a phishing attack, the attacker deceives victims by pretending to be a trustworthy or known source. If users click a malicious link or downloads an infected file, attackers may gain access to their network, and then steal sensitive information. Antivirus software can only detect known threats and is not reliably effective against new variants.

Browser-based attacks

Antivirus software does not have access to operating systems which allowbrowser-based attacksto bypass them. These attacks infect your device by using malicious scripts and code. To prevent these attacks, some browsers include built-in defensive tools but must be used consistently and correctly to be effective.

Encoding the payload

Another technique through which malware bypasses antivirus scanners is by encoding the payload. Cybercriminals often use tools to do this manually and when the malware is delivered and activated, it is then decoded and does its damage.This is usually done via a small header program tacked onto the front of the encoded virus. Antivirus scanners don’t perceive this program as a threat and the encoded virus is simply seen as data. So when the header is triggered (for example, by being embedded into an existing executable), it will decode the malware into a memory region and then jump the program counter to that region and execute the malware.

Antivirus & Malware Evasion Techniques (1)

How to protect against malware evasion techniques

Using antivirus software should be a core part of your overall cybersecurity strategy – but, as this article shows, businesses shouldn’t solely rely on it for cyber protection. To ensure optimal security, it’s best to invest in a multi-layered approach to cybersecurity. Additional tools you can use to keep cybercriminals out of your network include:

Device encryption

Encrypting devices ensures that no one can access the data they contain without the correct password or key. Even if a device is stolen or infected with malware, proper encryption can prevent unauthorized access.

Multi-factor authentication

MFA requires users to input more than one piece of information to access accounts, such as a time-sensitive code.This provides greater security than simply relying on password. This is particularly important if you have sensitive or personal information on devices or accounts.

Password managers

Passwords are important to keep accounts and networks secure but it is critical to use strong passwords which are unique to each account. A strong password is at least 15 characters (ideally more) and is made up of a mix of upper- and lower-case letters, numbers, and symbols. Password managers can help you keep track – they are a secure vault for unique passwords and keep them safe from hackers.

Cyber security awareness training

With cybercrime on the rise, businesses should teach their employees about the risks associated with cyberattacks, as well as how to handle them if they occur. By educating users about the cyber threat landscape, you can help them to recognize suspicious activity such as phishing emails and so on.

Endpoint detection and response

An EDR solution monitors the behavior of the network and endpoints and stores these logs. EDR technologies can give security staff the data they need to understand the nature of a cyber attack, delivering automated alerts and endpoint remediation.

Cybercriminals don’t usuallyuseone antivirus evasion technique alone. On the contrary: malware is designed to tackle different situations to maximize its chances of success. The good news is that the security community is vigilant, always learning about new antivirus and malware evasion techniques and developing new ways of prevention.

Related articles:

  • What is endpoint security and how does it work?
  • How malware penetrates systems
  • Social engineering
  • Malware classifications
  • Choosing an antivirus solution

Related products:

  • Kaspersky Endpoint Security
Antivirus & Malware Evasion Techniques (2024)

FAQs

What are the evasion techniques for malware? ›

Signature-based malware evasion techniques involve altering the characteristics of malicious software to avoid detection by security solutions that rely on predefined signatures or patterns. These evasion techniques are employed by cybercriminals to bypass traditional antivirus and intrusion detection systems.

What method can malware evade antivirus? ›

Obfuscation

They can hide their intent in multiple ways, including encryption, meaningless code addition or metadata stripping. This method is ideal for hackers looking to get around signature or heuristic-based analysis since they can simply obfuscate their payloads to get around them.

What technique might a malware author use to make the malware smaller and evade anti virus? ›

By packing or compressing their code, malware authors can reduce the file size and the visibility of their malware on disk. They can also avoid detection by antivirus software that relies on static analysis or file hashes.

What are some techniques attackers use to bypass antivirus? ›

Some common antivirus bypass techniques include using encryption or compression to hide malicious code, polymorphism to create unique versions of malware, and obfuscation to make the code more difficult to decipher.

What are anti-evasion techniques? ›

Anti-evasion technology is helping organizations avoid the overlapping noise of alert upon alert. While traditional defenses scan AntiVirus files to evaluate threats, Minerva Labs uses advanced malware detection techniques to outsmart malware by tricking it into attacking itself.

What is an evasion technique detected? ›

8.2 Detection of new malware variants

Evasion technique refers to one of the malware's characteristics which gives them the ability to hide some part of the program codes to avoid execution once loaded in a hostile environment [9,161].

How does malware bypass antivirus? ›

Another technique through which malware bypasses antivirus scanners is by encoding the payload. Cybercriminals often use tools to do this manually and when the malware is delivered and activated, it is then decoded and does its damage.

Can malware block antivirus? ›

Many Trojans and network worms will actively search for antivirus programs in the list of active applications on the victim computer. The malware will then try to: Block the antivirus software. Damage the antivirus databases.

What antivirus can remove malware? ›

AVG AntiVirus FREE is an award-winning anti-malware tool that scans and removes viruses, detects and blocks malware attacks, and fights other online threats, too.

What technique makes malware appear harmless to bypass endpoint security? ›

Code injection is a method employed by attackers to introduce malicious code into a legitimate application or process in order to bypass detection by EDR or EPP systems.

What are the two techniques used by antivirus software to identify malware? ›

1. Signature Detection- looks for recognizable patterns of particular malware within executable code. 2. Heuristics- looks for more general patterns than the strict signature detection approach, so that it can hopefully detect an entire family of similar malware.

Can a virus bypass a virus scan? ›

Yes, malware can hide itself and antivirus and other protection programs may not catch it.

How can malware evade antivirus software detection? ›

File encryption — Malware encryption involves encoding malicious code or components to hide its true purpose and evade detection by security software. This technique aims to prevent easy analysis by converting the malware's content into a scrambled format that can only be deciphered with a specific decryption key.

Can hackers get past antivirus? ›

Although antivirus is an essential part of digital security, it is not foolproof. Each day, more than 350,000 new malware programs are created,2 and it's very possible for newly created malware to get around protections.

How do hackers bypass security? ›

From downloading a malicious app onto a device to opening an attachment posing as a harmless document, malware delivery takes many forms. It is a constant online threat that can let hackers bypass security by installing backdoors. Antivirus software can prevent malware infections.

What are the techniques used in defense evasion? ›

The adversary is trying to avoid security defenses. Evasion consists of techniques that adversaries use to avoid technical defenses throughout their campaign. Techniques used for evasion include removal of indicators of compromise, spoofing communications, and exploiting software vulnerabilities.

What are the evasion techniques for intrusion detection? ›

These techniques pose a challenge for the current IDS as they circumvent existing detection methods.
  • Fragmentation. A packet is divided into smaller packets. ...
  • Flooding. The attacker begins the attack to overwhelm the detector and this causes a failure of control mechanism. ...
  • Obfuscation. ...
  • Encryption.

What are 3 main ways to protect against malware? ›

How to prevent malware
  • Keep your computer and software updated. ...
  • Use a non-administrator account whenever possible. ...
  • Think twice before clicking links or downloading anything. ...
  • Be careful about opening email attachments or images. ...
  • Don't trust pop-up windows that ask you to download software. ...
  • Limit your file-sharing.

What are advanced evasion techniques? ›

An advanced evasion technique is a cyberattack that enables the hacker to access a network without authorization and detection. It combines various evasion methods to hide from any threat detection tool that comes in contact with it.

Top Articles
1 Minute Chocolate Chip Mug Cookie (No Egg!)
Chocolate Chip Cookie Dough Protein Bites | Amy's Healthy Baking
Funny Roblox Id Codes 2023
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Joi Databas
DPhil Research - List of thesis titles
Shs Games 1V1 Lol
Evil Dead Rise Showtimes Near Massena Movieplex
Steamy Afternoon With Handsome Fernando
fltimes.com | Finger Lakes Times
Detroit Lions 50 50
18443168434
Newgate Honda
Zürich Stadion Letzigrund detailed interactive seating plan with seat & row numbers | Sitzplan Saalplan with Sitzplatz & Reihen Nummerierung
Grace Caroline Deepfake
978-0137606801
Nwi Arrests Lake County
Missed Connections Dayton Ohio
Immortal Ink Waxahachie
Craigslist Free Stuff Santa Cruz
Mflwer
Spergo Net Worth 2022
Costco Gas Foster City
Obsidian Guard's Cutlass
Mccain Agportal
Amih Stocktwits
Fort Mccoy Fire Map
Uta Kinesiology Advising
Kcwi Tv Schedule
What Time Does Walmart Auto Center Open
Nesb Routing Number
Olivia Maeday
Random Bibleizer
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Receptionist Position Near Me
Black Lion Backpack And Glider Voucher
Gopher Carts Pensacola Beach
Duke University Transcript Request
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
Jambus - Definition, Beispiele, Merkmale, Wirkung
Ark Unlock All Skins Command
Craigslist Red Wing Mn
Jail View Sumter
Birmingham City Schools Clever Login
Thotsbook Com
Funkin' on the Heights
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
Vci Classified Paducah
Www Pig11 Net
Ty Glass Sentenced
Latest Posts
Article information

Author: Kelle Weber

Last Updated:

Views: 6212

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Kelle Weber

Birthday: 2000-08-05

Address: 6796 Juan Square, Markfort, MN 58988

Phone: +8215934114615

Job: Hospitality Director

Hobby: tabletop games, Foreign language learning, Leather crafting, Horseback riding, Swimming, Knapping, Handball

Introduction: My name is Kelle Weber, I am a magnificent, enchanting, fair, joyous, light, determined, joyous person who loves writing and wants to share my knowledge and understanding with you.