Malware Obfuscation: Techniques, Definition & Detection - ExtraHop | ExtraHop (2024)

Though it is unclear when digital obfuscation started being developed seriously, we can point to a few milestones over the last 40 years. Much like early viruses, many early applications of obfuscation were not malicious.

1984 saw the creation of the International Obfuscated C Code Contest, which was the first competition in the world to see who could write the most obfuscated C program. Though it was more of an academic exercise to push the boundaries of obfuscation, it also revealed the power of obfuscation through many mind-boggling creations over the years.

Things picked up in the 1990s and 2000s as digital watermarks, a form of steganography, were used to identify copies of illegally distributed music and movies. This coincided with the passing of the Digital Millennium Copyright Act (DMCA) in 1998, which was used by the music and movie industries to combat piracy.

The early 2000s also saw the first instances of obfuscated malware. In 2005, we saw the PoisonIvy remote access trojan (RAT) hide part of its code to evade signature-based detection tools. Another RAT, Hydraq, used spaghetti code in 2009 as a means of obfuscation. It rearranged code blocks so that it could not be followed linearly, then used jump instructions to execute them in the right order.

Notably, the MITRE ATT&CK entry on obfuscated files or information is relatively new, having only been created on 31 May 2017. Few procedure examples in its database were found before 2015, indicating an explosion of interest around obfuscation in recent years.

More recently, we see signs of maturation and commercialization in the marketplace. In 2020, researchers found a number of vendors providing obfuscation-as-a-service for Android applications, with prices starting at $20 per APK. Impressively, this off-the-shelf service reduced payload detection rates by nearly 50%.

Malware Obfuscation: Techniques, Definition & Detection - ExtraHop | ExtraHop (2024)

FAQs

What are the obfuscation techniques for malware? ›

Compression, encryption, and encoding are some of the most common obfuscation methods used by threat actors. Multiple methods are often used in tandem to evade a wider variety of cybersecurity tools at the initial point of intrusion.

What are the techniques of obfuscation? ›

Three of the most common techniques used to obfuscate data are encryption, tokenization, and data masking. Encryption, tokenization, and data masking work in different ways. Encryption and tokenization are reversible in that the original values can be derived from the obfuscated data.

What are malware detection techniques? ›

Signature-based detection (SBD)

Signature-based detection works by identifying malware through its unique identifier, known as signatures, comparing it to an existing malware database, and eliminating it before infiltrating a system.

What are two techniques that malware can use to avoid detection? ›

Packers and Crypters: Packers and crypters are techniques used in malware to evade signature-based detection. Packers are tools that compress and encrypt the malware's code, creating a new executable that requires a specific unpacking routine to be executed, before revealing the original malicious code.

What is an example of obfuscation? ›

Within the illegal drug trade, obfuscation is commonly used in communication to hide the occurrence of drug trafficking. A common spoken example is "420", used as a code word for cannabis, a drug which, despite some recent prominent decriminalization changes, remains illegal in most places.

What are the 3 methods for protecting your device from malware? ›

Antivirus software, antispyware software, and firewalls are also important tools to thwart attacks on your device.
  • Keep up-to-date. ...
  • Antivirus software. ...
  • Antispyware software. ...
  • Firewalls. ...
  • Choose strong passwords. ...
  • Use stronger authentication. ...
  • Be careful what you click. ...
  • Shop safely.

How to make your code unreadable? ›

A tool called an obfuscator will automatically convert straightforward source code into a program that works the same way, but is more difficult to read and understand. Unfortunately, malicious code writers also use these methods to prevent their attack mechanisms from being detected by antimalware tools.

How do attackers use obfuscation? ›

In the case of "bad" obfuscation, hackers combine various techniques to hide malware and create multiple layers of disguise. One of these techniques is packers. These are software packages that compress malware to hide its presence and make the original code unreadable.

What are the best practices for obfuscation? ›

Prefer using irreversible data obfuscation techniques

Hiding information is pointless if the persons who seize it can reverse-engineer the process and decrypt it using a key or a tool. So, it's best to adopt irreversible methods of data obfuscation like data masking or data anonymization.

How to detect hidden malware? ›

How To Know if You Have Malware
  1. suddenly slows down, crashes, or displays repeated error messages.
  2. won't shut down or restart.
  3. won't let you remove software.
  4. serves up lots of pop-ups, inappropriate ads, or ads that interfere with page content.
  5. shows ads in places you typically wouldn't see them, like government websites.

How do you know if you have malware on your phone? ›

Find more signs of malware
  1. Alerts about a virus or an infected device.
  2. Anti-virus software you use no longer works or runs.
  3. A significant decrease in your device's operating speed.
  4. A significant, unexpected decrease in storage space on your device.
  5. Your device stops working properly or working altogether.

How can I scan my device for malware? ›

Check for Android malware using Play Protect
  1. Open the Play Store on the Android device you want to scan.
  2. Tap on your profile in the upper-right corner.
  3. Tap on Play Protect.
  4. Tap Scan.
  5. Tap on the option to remove any detected malware.
Jan 5, 2023

What is the most effective defense against malware? ›

How to prevent malware
  • Keep your computer and software updated. ...
  • Use a non-administrator account whenever possible. ...
  • Think twice before clicking links or downloading anything. ...
  • Be careful about opening email attachments or images. ...
  • Don't trust pop-up windows that ask you to download software. ...
  • Limit your file-sharing.

What is a type of malware that is so difficult to detect? ›

Fileless Malware

Because the operating system recognizes the edited files as legitimate, a fileless attack is not caught by antivirus software — and because these attacks are stealthy, they are up to ten times more successful than traditional malware attacks.

What is the type of malware that tricks? ›

Trojans. A Trojan (or Trojan Horse) disguises itself as legitimate software to trick you into executing malicious software on your computer. Because it looks trustworthy, users download it, inadvertently allowing malware onto their device.

What are three tools that can be used in the data obfuscation process? ›

Data masking, encryption, and tokenization are three common data obfuscation techniques. Each type has strengths in protecting against destructive malware. Familiarizing yourself with data obfuscation techniques will help you protect your sensitive data—and educate you in case obfuscation is used against you.

What is the method of concealing malware? ›

Encryption: This approach encrypts the virus code, which remains concealed until runtime, when it decrypts itself. Various encryption methods can be utilized, making it impossible to determine the malware's true code.

Which tool is used to handle packed and obfuscated malware? ›

The best (and quickest) way to unpack packed malware is to use a tool. Exeinfo PE is one such tool that will analyze the code to determine if it has been packed. It can often identify the packer used as well. UPX is one commonly used packer tool that includes the unpacking feature.

Top Articles
What happened to the piggy bank? | Fandom
How To Know What To Expect When Selling Your Old Jewelry?
Hometown Pizza Sheridan Menu
Nikki Catsouras Head Cut In Half
Hay day: Top 6 tips, tricks, and cheats to save cash and grow your farm fast!
Xrarse
Graveguard Set Bloodborne
Zendaya Boob Job
Obituary | Shawn Alexander | Russell Funeral Home, Inc.
Driving Directions To Atlanta
Scholarships | New Mexico State University
No Hard Feelings Showtimes Near Cinemark At Harlingen
How Much Are Tb Tests At Cvs
Tvtv.us Duluth Mn
St. Petersburg, FL - Bombay. Meet Malia a Pet for Adoption - AdoptaPet.com
Ubg98.Github.io Unblocked
Mychart Anmed Health Login
Is A Daytona Faster Than A Scat Pack
Rimworld Prison Break
Miltank Gamepress
R. Kelly Net Worth 2024: The King Of R&B's Rise And Fall
How Long After Dayquil Can I Take Benadryl
The Listings Project New York
Cookie Clicker Advanced Method Unblocked
How To Find Free Stuff On Craigslist San Diego | Tips, Popular Items, Safety Precautions | RoamBliss
Kroger Feed Login
Webworx Call Management
R/Airforcerecruits
Receptionist Position Near Me
Hrconnect Kp Login
Pronóstico del tiempo de 10 días para San Josecito, Provincia de San José, Costa Rica - The Weather Channel | weather.com
Summoners War Update Notes
Delete Verizon Cloud
Www.1Tamilmv.con
Rugged Gentleman Barber Shop Martinsburg Wv
Devotion Showtimes Near The Grand 16 - Pier Park
24 slang words teens and Gen Zers are using in 2020, and what they really mean
Dallas City Council Agenda
Craigslist Jobs Brownsville Tx
2023 Fantasy Football Draft Guide: Rankings, cheat sheets and analysis
Obituaries in Hagerstown, MD | The Herald-Mail
Wgu Admissions Login
How to Install JDownloader 2 on Your Synology NAS
Florida Lottery Powerball Double Play
Boyfriends Extra Chapter 6
Product Test Drive: Garnier BB Cream vs. Garnier BB Cream For Combo/Oily Skin
Rubmaps H
WHAT WE CAN DO | Arizona Tile
Att Corporate Store Location
Intuitive Astrology with Molly McCord
Latest Posts
Article information

Author: Tyson Zemlak

Last Updated:

Views: 6194

Rating: 4.2 / 5 (63 voted)

Reviews: 94% of readers found this page helpful

Author information

Name: Tyson Zemlak

Birthday: 1992-03-17

Address: Apt. 662 96191 Quigley Dam, Kubview, MA 42013

Phone: +441678032891

Job: Community-Services Orchestrator

Hobby: Coffee roasting, Calligraphy, Metalworking, Fashion, Vehicle restoration, Shopping, Photography

Introduction: My name is Tyson Zemlak, I am a excited, light, sparkling, super, open, fair, magnificent person who loves writing and wants to share my knowledge and understanding with you.