THE 2024 STATE OF PHISHING REPORT IS PUBLISHED!  READ THE REPORT HERE

Attack Vectors

Malware Detection

Malware (short for “malicious software”) detection includes various types of threats: viruses, ransomware, spyware, worms, trojans, keyloggers, and many more. The most common ways for malware to be transported are in files and URLs.

 

In a world where collaboration of content, across multiple apps, is becoming the main driver for business performance, malware becomes an irreplaceable tool in any attacker’s arsenal.

 

Although this sounds impossible – we’ve identified a common factor in all malware-based attacks. Learn how Perception Point delivers advanced malware detection and prevents any malware from penetrating your organization.

graphic of squares ato

Malware Detection & Prevention Challenges

Malware detection and protection are becoming an increasingly complex problem to solve.

 

The complexity is hundreds of millions of new malware variants created every year, the increased use of advanced malware, the combination of several techniques, employing evasion techniques, and the proliferation of content sharing platforms.

 

Legacy solutions all fall in at least one of these challenges, leaving end-users exposed to malware attacks on a daily basis.

multi layers platform malware detection

The Malware Kill Chain

graphic of a square

Step 1

Development

Atacker develops a new malware (or uses a known malware published online) according to the required actions, such as stealing information, locking files, or installing keyloggers to gain legitimate access credentials, etc.
graphic of a flower

Step 2

Reconnaissance and Weaponization

Attacker finds a software vehicle to transport the malware – e.g. adding it as an attachment to an email, sending a URL via a messaging app, or uploading it to a cloud storage platform for users to download.

circles with lines connecting

Step 3

Delivery and
Installation

Attackers send malware to the targeted users. Once opened/clicked, the malware is installed and runs the designated malicious code.
skull icon going into a box

Step 4

Persistence
and Action

Usually the malware will include persistence techniques to make sure that it will still continue even after system reboot or loss of internet connection.

Our Anti-Malware Detection Engines

Perception Point tackles malware detection by dividing it into two types:

Everyday Malware
graphic of squares

Perception Point developed next-gen static and dynamic engines that detect and prevent any attempt to deliver malware.

 

These dynamic and static engines are be broken up into several elements: In the front line stands the Recursive Unpacker which extracts all files and URLs transferred, thus uncovering and thwarting evasion techniques.

 

Next is the Threat Intelligence layer – The best-in-class intelligence sources coupled with internally developed engines scans all content to identify any “known” malware.

 

Following the threat intelligence, is a stack of the leading Anti-virus engines in the world in addition to Perception Point’s Signature Analysis engines for highly complex malware.

 

The last piece of the “Everyday Malware” stack, is Perception Point’s phishing engines which use in-house build image recognition capabilities to prevent any type of URL based malware delivery.

Advanced Malware
three layers block bec

New, sophisticated malware attacks all rely on the usage of an exploitation technique.

 

This means that prior to any advanced malware release, the attacker will try to use an exploit to set the ground ready for installing one of any millions of malware options he has in his hands.

 

Perception Point knows how attackers think. This is why we invented the HAP – a proprietary next-gen dynamic engine that has visibility into the exploit level.

 

In other words, instead of chasing the many malware out there, we “cut off the root” and prevent the malware from even being delivered, not to mention from running.

Our Advantages

Multi-layered Approach

Combining numerous state of the art engines that use static techniques to prevent any type of malware delivery, whether from file or URL.

Anti-evasion Techniques

Next-gen engines internally developed by Perception Point, uncover any attempt to conceal the malware with evasion techniques.

Eliminating Advanced Malware

Next-gen dynamic engine eliminates the risk of new malware variants in any advanced attack by intercepting the malicious intent prior to the malware delivery – in the exploit stage.

Maximum
Usability

Providing ultimate detection without compromising on content functionality, allowing your employees to receive content from external sources without being limited with many types of policies for file delivery.

Cross Channel Coverage

Holistic solution that can be deployed across any channel to ensure the same level of malware protection in any access point to your organization.

Deployment-
ready

Deployed in one-click, creating zero fuss to you and your IT team.

TALK TO SALES

Ready to Try
Perception Point?

Learn More