Tech Talk: Obfuscation and bypassing AV detection practices


#1

I’ve worked for a company that developed AV software and there were times I dreaded having the “how did this get through” discussion. It was a question with too many possible answers, none which would sufficiently satisfy the person making the inquiry. Ultimately, the question was rhetorical and although it lead to some interesting conversations about polymorphic viruses, heuristics and why the end user should never have opened that attachment, I would end up accepting responsibility and ensuring that we’d work diligently to assist with addressing the issue. Based on the insidious nature of the latest obfuscation techniques listed in this article, I’m happy to be on the team that is bringing awareness of what not to do, when connected to the Wild Wild Web, to every end user around the globe!