Using Anti-Evasion Malware Detection Techniques to Block Stealth Attacks: SANS Product Review on Minerva Labs
In cybersecurity, the pressure is always on. Securing your network is an ongoing struggle and deploying an array of security tools often results in more alerts than you can handle. When alerts pile up, they create a bigger headache instead of fixing issues and detecting threats as intended.
Anti-evasion technology is helping organizations avoid the overlapping noise of alert upon alert. While traditional defenses scan AntiVirus files to evaluate threats, Minerva Labs uses advanced malware detection techniques to outsmart malware by tricking it into attacking itself.
SANS, a leading cooperative research and education organization for security professionals, tested Minerva’s anti-evasion software to see how it would hold up in crisis.
“Most endpoint security solutions focus on examining file attributes or behavioral patterns of how malware operates,” SANS reported. “Therefore, as the malware becomes more evasive, the effectiveness of the techniques deteriorates rapidly. In contrast, with Minerva’s Anti-Evasion Platform, the more evasive the malware we tested, the more effective the solution was at preventing the threat from affecting the system.”
In their review, SANS ran multiple attack types against Minerva, including malware with the following criteria:
- Sandbox avoidance
- Memory injection attacks
- Use of malicious documents
- File destruction
Find out more about how the Minerva malware detection platform performed when it went head-to-head with each of these malicious attacks.