answersLogoWhite

0


Best Answer

Some methods they use are:

Stealth mode - the virus intercepts requests from the anti-virus program and returns the information the anti-virus program would expect from a non-infected program.

Self-modification or mutation - the program changes its code slightly with each infection to make it harder for anti-virus software to create a "signature" for the virus

Encryption of the payload - this may obfuscate the actual virus, especially if a different encryption key is used each time. The code still has to have a decrypting function attached to allow the virus to unpack and execute.

Polymorphic viruses - this is sort of a combination of the encryption and mutation tactics. The virus payload is encrypted and the decrypting function modifies itsself with each infection to make it very tough to create a signature for the virus.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar
More answers
User Avatar

Wiki User

11y ago

Compressing a file cannot fool antivirus programs. The only way to sneak around antivirus software is by using polymorphism or having the virus modify theantivirus's settings (a stealth virus).

This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are ways for malware authors to get around antivirus engines?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How do I contact at Norton 360 Technical Support?

Symantec's Norton website would prefer you go through an online form to get a local support number or use the online chat, but they do list a phone number to call directly: 1-855-815-2726 The website notes that there will be around a 5-minute wait and the best days to call are Tuesday, Wednesday and Friday.


What is a WinNuke attack?

WinNuke refers to a remote denial-of-service attack (DoS) that affected the Microsoft Windows 95, Microsoft Windows NT and Microsoft Windows 3.1x computer operating systems.The exploit sent a string of OOB (out of band) data to the target computer on TCP port 139 (NetBIOS). The OOB data was a malicious TCP packet containing an Urgent Pointer (URG). The Urgent Pointer is a rarely used field in the TCP header, used to indicate that some of the data in the TCP stream should be processed quickly by the recipient. Affected operating systems didn't handle the Urgent Pointer field correctly. When the system failed to process the field, the computer locked up and displayed a Blue Screen of Death. This did not damage or change the data on the computer's hard disk, but any unsaved data would be lost.The term WinNuke was not a particular piece of malware, rather it is used to describe malware that exploited the aforementioned vulnerability to cause a Denial of Service. Most of the WinNuke malware was busy doing its damage around 1997, although a newer family of malware got released into the wild around 2010 that exploits a similar vulnerability in Windows NT, 2000, XP, and even .NET to the same ends, i.e. DOS.


The Modern Internet And Virus Protection Software?

Virus and malware corruption is one of the leading causes of data corruption on computers today. The modern internet is riddled with websites full of malware and downloads full of viruses. A common misconception is that only less than reputable sites have malware and viruses but unfortunately this is the far from true. Almost any website or download is susceptible to viruses and malware. These viruses and malware could either be put their intentionally or unintentionally. Either way, it’s imperative to have good virus protection software installed on a pc at all times. The following is a list of things to consider when purchasing virus protection software. First, does the virus protection software come with automatic virus definition updates? This is imperative because new viruses are produced daily. All virus protection software systems work on virus definition systems. This system is simply a catalog of viruses that are currently around and the treatment action for the computer. If this system isn’t up to date, a new virus can infect the machine secretly. Good virus protection software will produce updates weekly, at a minimum. Second, does the virus protection software scrub incoming downloads and email? Some virus protection software systems only check the computer on a timed event. This means that between the two timed events a computer can become infected with a virus. A good system will do spot checks throughout the day, as well as scrub all incoming downloads and emails for any viruses. This is a must have on a good virus protection software system. Third, how many resources does the virus protection software system consume? While this has nothing to do with the effectiveness of the system, it does affect the usability of the machine running the software. If a virus protection software system is using all the available resources of a computer, it makes it impossible to use the computer productively. Regardless of what system is purchased, it is imperative that all computers have a good virus protection software system installed. The internet is a dangerous place and a good virus protection software system will allow for safe browsing.


Houw long has the internet been around for?

since around 1985.


How much does a lead programmer make?

well around 100,000+, with the average being around 103,000-105,000

Related questions

Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique?

Malware authors have many ways to get around antivirus engines. Which one of the following would not be an effective technique?


Malware authors have many ways to get around antivirus engines. Which would not be an effective technique?

Hotfixing


Is the program McAfee security scan plus safe?

McAfee is not the best AntiVirus around. I would recommend switching to a different AntiVirus, such as Avast.


Malware authors have many ways to get around antivirus engines. What would not be an effective technique?

To evade detection, during and after installation, malware uses five primary techniques.Wrapping. This process attaches the malicious payload (the installer or the malware itself) to a legitimate file. When the legitimate file is installed, so is the malicious payload (which usually installs before the legitimate file does). Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines.Obfuscation. This involves modifying high level or binary code it in a way that does not affect its functionality, but completely changes its binary signature. Obfuscation was originally used to protect legitimate software against reverse-engineering and piracy. Malware authors have adopted the technique to bypass antivirus engines and impair manual security research. Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples.Packers. These software tools are used to compress and encode binary files, which is another form of obfuscation. At runtime, the packer, which is typically embedded with the malicious binary, will "unpack" the payload into memory and execute it. There are a handful of common packing mechanisms in use today such as UPX, PECompact, Armadillo and others. These techniques are extremely effective at circumventing static signature engines.Anti-debugging. Like obfuscation, anti-bugging was originally created by software developers to protect commercial code from reverse-engineering. Anti-debugging can prevent a binary from being analyzed in an emulated environments such as virtual machines, security sandbox, and others. For example, the ZeroAccess malware implemented a self-debugging technique in order to block external debugging attempts. Another example is malware attempting to delay its execution (or sleep) for an extended period of time. This is useful for bypassing sandboxing solutions since these only keep binaries in an emulated environment for a specific period of time before classifying them as benign and releasing them to the network.Targeting. This technique is implemented when malware is designed to attack a specific type of system (e.g. Windows XP SP 3), application (e.g. Internet Explorer 10) and/or configuration (e.g. detecting a machine not running VMWare tools, which is often a telltale sign for usage of virtualization). Targeting ensures that the malware is only triggered and installed when specific conditions are met, which enables it to evade detection in sandboxes because they do not resemble the host being attacked.


When did the four authors of the bible live?

The authors were not four, it is believed that the authors were 44 living in different places around the Mediterranean Sea, mainly Israel


Malware authors have many ways to get around antivirus engines Which method would not be an effective technique?

To evade detection, during and after installation, malware uses five primary techniques.Wrapping. This process attaches the malicious payload (the installer or the malware itself) to a legitimate file. When the legitimate file is installed, so is the malicious payload (which usually installs before the legitimate file does). Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines.Obfuscation. This involves modifying high level or binary code it in a way that does not affect its functionality, but completely changes its binary signature. Obfuscation was originally used to protect legitimate software against reverse-engineering and piracy. Malware authors have adopted the technique to bypass antivirus engines and impair manual security research. Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples.Packers. These software tools are used to compress and encode binary files, which is another form of obfuscation. At runtime, the packer, which is typically embedded with the malicious binary, will "unpack" the payload into memory and execute it. There are a handful of common packing mechanisms in use today such as UPX, PECompact, Armadillo and others. These techniques are extremely effective at circumventing static signature engines.Anti-debugging. Like obfuscation, anti-bugging was originally created by software developers to protect commercial code from reverse-engineering. Anti-debugging can prevent a binary from being analyzed in an emulated environments such as virtual machines, security sandbox, and others. For example, the ZeroAccess malware implemented a self-debugging technique in order to block external debugging attempts. Another example is malware attempting to delay its execution (or sleep) for an extended period of time. This is useful for bypassing sandboxing solutions since these only keep binaries in an emulated environment for a specific period of time before classifying them as benign and releasing them to the network.Targeting. This technique is implemented when malware is designed to attack a specific type of system (e.g. Windows XP SP 3), application (e.g. internet Explorer 10) and/or configuration (e.g. detecting a machine not running VMWare tools, which is often a telltale sign for usage of virtualization). Targeting ensures that the malware is only triggered and installed when specific conditions are met, which enables it to evade detection in sandboxes because they do not resemble the host being attacked.


How much do car engines cost?

Around 5000


Why were engines made?

to help people get around easier


How many search engines are on the Internet?

There are about 12 major search engines in general, but if you mean how many search engines that are around the globe, refer to the related links below.


How much does CA Antivirus protection cost?

This antivirus will cost you around 30 to 50 a year. It will give licenses for up to 3 computers to use. It is a very large and fully featured software.


How does computer get infected with rogue antivirus software?

Your computer gets infected by rogue anti virus software by the user allowing someone or something to download itself. This is called social engineering or the user's computer is already infected and the malware present downloads more malware including rogue antivirus software. Today anti malware experts are cracking down on hackers and other exploits in the cyberworld. In many cases th security is so good that even the most experienced people technically have a very difficult time being malicious. To around this malicious code writers take advantage of social engineering. Instead of being technical and finding holes or vulnerabitlitys in operating systems or programs cybercriminals just let a user let them in. You know when you visit a site or try to download data internet explorer will pop with a security warning. Well some people click yes download and so on. Thus making the criminals job a lot easier. Computers will also download rogue antivirus when already existing malware (malicious code) sends information about your computer to download more malware. Why does this happen? Cybercriminals know that after a while users will realize their machines are infected and therefore disinfect them. However if more and more malware is downloaded it will make fixing the machine and in many getting help very difficult.To fix malware problems visit download.com and search for AVG 8 Free. Trust me it is an extremely good piece of software. It fix the problem totally 99 % of the time. Hope you find a solution to your problem.I have found that AVG and other antivirus programs do not work very well with rogue antivirus and maleware programs. There are many different variations of these rogue programs and they usually drop trojans and worms with them. The programs that work effectively are maleware bytes antimalware and super antispyware. As soon as you know you have been infected you must start scanning with these programs immediately, as the infections start to lock your computer down. Meaning you may not be able to open things such as the registry, task manager, any programs, etc....


How much horsepower does a 1986 Toyota MR2 have?

The 1986 Toyota MR2's horsepower varied depending on where it was purchased for example the United States engine had about 112 hp the European engines around 124 hp, Australian engines around 118 hp and the Japanese engines around 130 hp.