Oct 30, 2024

Detecting 5th Column Malware

Detecting 5th Column Malware

Detecting 5th Column Malware

Perimeter protection systems, such as firewalls, can be excellent at preventing certain types of attacks, e.g., Denial-of-Service attacks. However, they are less effective at filtering out sophisticated malware attacks, e.g., ransomware attacks. One method to circumvent a perimeter protection system is to split a malware executable package into a number of pieces. None of the pieces will be recognizable by the perimeter protection as being any previously documented malware. These can then pass through the perimeter protection undetected and be reassembled and launched once they are inside. Only a system that does not rely upon previously documented malware, a system such as Crytica’s Rapid Detection & Alert (RDA) system, can detect such types of sophisticated attacks.

Access the Full Whitepaper