IBM X-Force research: evading the malware sandbox

Sandcastle on the Beach

Author

Security Intelligence

Security Intelligence Staff

Malware in its many forms from ransomware, viruses and worms to zero-day exploits and botnets continues to be a popular attack vector among cybercriminals.

Network firewalls, network intrusion detection and prevention devices and desktop anti-virus software are adept at
recognizing and blocking or quarantining known malware. But by their nature, these security measures can only capture what they know. Can your security solution identify an unknown yet suspicious file as malware, particularly if it’s been engineered to masquerade as a benign file?

Read the new research report from IBM X-Force to become acquainted with the basics of malware sandbox environments and how to overcome evasion techniques malware uses to try to stay undetected.

Download the complete report to learn:

  • The role of malware sandbox environments;
  • What evasive behaviors malware uses to avoid detection in sandbox environments;
  • What sophisticated analysis techniques you can use to out-maneuver advanced malware.
Mixture of Experts | 3 April, episode 101

Decoding AI: Weekly News Roundup

Join our world-class panel of engineers, researchers, product leaders and more as they cut through the AI noise to bring you the latest in AI news and insights.

Related solutions
Incident response services

Improve your organization’s incident response program, minimize the impact of a breach and experience rapid response to cybersecurity incidents.

Explore incident response services
Threat detection and response solutions

Use IBM threat detection and response solutions to strengthen your security and accelerate threat detection.

Explore threat detection solutions
IBM QRadar SOAR Solutions

Optimize decision-making processes, improve SOC efficiency and accelerate incident response with an intelligent automation and orchestration solution.

Explore QRadar SOAR
Take the next step

Improve your organization’s incident response program, minimize the impact of a breach and experience rapid response to cybersecurity incidents.

  1. Explore incident response services
  2. Learn more about IBM X-Force