Attack Vectors

Malware

Malware (short for “malicious software”) encapsulates various types of threats in one term: viruses, ransomware, spyware, worms, trojans, keyloggers, and many more. The most common ways for malware to be transported are in files and URLs. In a world where collaboration of content, across multiple apps, is becoming the main driver for business performance, malware becomes an irreplaceable tool in any attacker’s arsenal.

 

Although this sounds impossible – we identified a common factor in all malware-based attacks. Learn how Perception Point prevents any malware from penetrating your organization.

The Malware Challenges

Protecting against malware is becoming an increasingly complex problem to solve. The complexity is hundreds of millions of new malware variants created every year, the increased use of advanced malware, the combination of several techniques, employing evasion techniques, and the proliferation of content sharing platforms. Legacy solutions all fall in at least one of these challenges, leaving end-users exposed to malware attacks on a daily basis.

The Malware Kill Chain

Step 1

Development

Atacker develops a new malware (or uses a known malware published online) according to the required actions, such as stealing information, locking files, or installing keyloggers to gain legitimate access credentials, etc.

Step 2

Reconnaissance and Weaponization

Attacker finds a software vehicle to transport the malware – e.g. adding it as an attachment to an email, sending a URL via a messaging app, or uploading it to a cloud storage platform for users to download.

Step 3

Delivery and
Installation

Attackers send malware to the targeted users. Once opened/clicked, the malware is installed and runs the designated malicious code.

Step 4

Persistence
and Action

Usually the malware will include persistence techniques to make sure that it will still continue even after system reboot or loss of internet connection.

Our Anti-malware Engines

Perception Point tackles the malware threat by dividing it into two types:

Everyday Malware

Perception Point developed next-gen static and dynamic engines that prevent any attempt to deliver malware.

 

These dynamic and static engines are be broken up into several elements: In the front line stands the Recursive Unpacker which extracts all files and URLs transferred, thus uncovering and thwarting evasion techniques. Next is the Threat Intelligence layer – The best-in-class intelligence sources coupled with internally developed engines scans all content to identify any “known” malware. Following the threat intelligence, is a stack of the leading Anti-virus engines in the world in addition to Perception Point’s Signature Analysis engines for highly complex malware. The last piece of the “Everyday Malware” stack, is Perception Point’s phishing engines which use in-house build image recognition capabilities to prevent any type of URL based malware delivery.

Advanced Malware

New, sophisticated malware attacks all rely on the usage of an exploitation technique. This means that prior to any advanced malware release, the attacker will try to use an exploit to set the ground ready for installing one of any millions of malware options he has in his hands.

 

Perception Point knows how attackers think. This is why we invented the HAP – a propriety next-gen dynamic engine that has visibility into the exploit level. In other words, instead of chasing the many malware out there, we “cut off the root” and prevent the malware from even being delivered, not to mention from running.

Our Advantages

Multi-layered Approach

Combining numerous state of the art engines that use static techniques to prevent any type of malware delivery, whether from file or URL.

Anti-evasion Techniques

Next-gen engines internally developed by Perception Point, uncover any attempt to conceal the malware with evasion techniques.

Eliminating Advanced Malware

Next-gen dynamic engine eliminates the risk of new malware variants in any advanced attack by intercepting the malicious intent prior to the malware delivery – in the exploit stage.

Maximum
Usability

Providing ultimate detection without compromising on content functionality, allowing your employees to receive content from external sources without being limited with many types of policies for file delivery.

Cross Channel Coverage

Holistic solution that can be deployed across any channel to ensure the same level of malware protection in any access point to your organization.

Deployment-
ready

Deployed in one-click, creating zero fuss to you and your IT team.

TALK TO SALES

Ready to Try
Perception Point?

Learn More