Hostile Environment Simulation

Make Every Endpoint Look Hostile to Malware

Understanding Evasive Malware

Attackers invest tremendous efforts to develop and test malicious programs that evade your existing defenses and will only launch in an environment it considers safe.
Evasive malware checks for a variety of security tools e.g. sandbox, debugger, antivirus and others, and only then decides whether or not to attack.

Existing security tools that rely on known indicators such as signatures, behavioral models or patterns, won’t catch evasive malware as their techniques are unknown and have not been detected before. These solutions are designed to identify an attack based on something that is known and detection will happen after the malware has a foothold on the endpoint, which leaves it just a little too late.

Effective Malware Prevention Through Deception

Minerva Labs' Hostile Environment Simulation mimics the presence of security products that evasive malware is designed to bypass. When advanced malware encounters artifacts belonging to the following categories, it shuts itself down instead of exhibiting its true nature:

Anti-Virus and other security solutions used for malware detection.

Virtual machines and emulators, used for manual and automatic malware analysis.

Sandbox products, used to learn the behavior of suspicious programs by detonating them in a controlled environment.

Forensics toolkits, used by analysts to dissect malware samples as part of forensics investigations.

Block evasive malware attacks without the need to seek and detect malware.

Avoid tedious investigations of false alarms and irrelevant alerts.

Significantly strengthen endpoint security by closing the gap of unknown attacks.

Force Malware Authors to 'Pick Their Poison'

Deploying Minerva’s Hostile Environment Simulation, forces malware authors to “pick their poison” and significantly strengthens your ability to resist persistent attacks.

If attackers try to evade your baseline security products, Minerva Hostile Simulation will block them. If they don’t use evasion tactics, your existing anti-malware tools will handle the infection.

Back to Minerva Anti Evasion Platform >

Ready to see us in action?

Resources

Video: Integrating Minerva Anti-Evasion Platform with McAfee

Watch a demo of how Minerva Labs Anti-Evasion Platform boosts your endpoint security when integrated with McAfee and enhances your investment

Watch >>

Evasive malware: How and why your anti-malware strategy needs to evolve beyond Anti-Virus

Discover the reasons why evasion techniques work, even with a layered defense approach and how to evolve your endpoint protection strategy, to cover the gap.

Download >>

Brochure: Anti-Evasion Brochure

Block unknown threats that are designed to evade your existing defenses.

Download >>

Whitepaper: Introduction to Evasive Techniques

Evasion techniques are a set of malware capabilities that evolved as a result of the need to avoid execution within a hostile environment.

Download >>
See All Resources >>