Feb. 7, 2022, 11:11 a.m. | Alexey Bukhteyev

Check Point Research research.checkpoint.com

Research By: Alexey Bukhteyev Malware uses sandbox evasion techniques to avoid exposing its malicious behavior inside a sandbox and thus prevent detection. Figure 1 – Sandbox evasion techniques. Common evasion techniques include the use of specific assembly instructions, and looking for specific registry keys  or file names. Such evasion techniques can be easily discovered by... Click to Read More


The post Invisible Sandbox Evasion appeared first on Check Point Research.

cape check point research publications cuckoo evasion hooking sandbox searchable

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC