Prevalent Threats Targeting Cuckoo Sandbox Detection and Our Mitigation

January 3, 2018

In this blog post, we will discuss the history of sandbox detection. We will then unveil the malware families that KTIS has observed from spear-phishing emails that attempt to bypass the user-mode API hook in order to evade sandbox detection. And finally, we will share the mitigation method we use to harden the Cuckoo sandbox against this bypass technique.

Read more...

Previous Article
How Financial Services Firms Can Protect Against DDoS Attacks
How Financial Services Firms Can Protect Against DDoS Attacks

Distributed denial-of-service (DDoS) attacks are becoming increasingly common across the financial services...

Next Article
Addressing Three Major Pain Points of the Cybersecurity Skills Gap
Addressing Three Major Pain Points of the Cybersecurity Skills Gap

The cybersecurity skills shortage is an issue impacting all industries. As cyberattacks become more frequen...