DiscoverDISCARDED: Tales From the Threat Research TrenchesMalware Evasion Uncovered: The Battle Against Evolving Malware Techniques
Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques

Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques

Update: 2024-07-09
Share

Description

Hello, Cyber Pirates! In today's episode of the Discarded Podcast, hosts Selena Larson and Tim Kromphardt are joined by Kyle Cucci, Staff Threat Researcher at Proofpoint. Dive with us into the world of cyber attacks as Kyle breaks down the intricacies of evasion techniques used by threat actors. From defense evasion to anti-sandboxing and anti-reversing methods, Kyle sheds light on how modern malware ensures its survival. Discover the evolution and increasing sophistication of these techniques, and learn about specific malware families like WikiLoader, Remcos, and the notorious Loki Bot.

We then move into how teams of threat hunters, intelligence analysts, and malware reversers work closely to identify new malware techniques and develop robust defenses within sandbox environments. Kyle shares insights into the constant feedback loop between intelligence and detection teams, highlighting how they stay ahead of evolving threats.

We also talk about: 
  • evasion strategies, including temperature checks, geofencing, and human detection mechanisms
  • the use of publicly available tools by malware authors
  • the future of AI and large language models (LLMs) in both aiding and combating cyber threats
Resources mentioned:



For more information about Proofpoint, check out our website.

Subscribe & Follow:
Don't miss out on future episodes—subscribe to the Discarded Podcast on your favorite platform.
Comments 
In Channel
loading
00:00
00:00
x

0.5x

0.8x

1.0x

1.25x

1.5x

2.0x

3.0x

Sleep Timer

Off

End of Episode

5 Minutes

10 Minutes

15 Minutes

30 Minutes

45 Minutes

60 Minutes

120 Minutes

Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques

Malware Evasion Uncovered: The Battle Against Evolving Malware Techniques

Proofpoint