latest insights

seculert blog

Unsplashed background img 1

Proxy Games - How Enterprises Remain Vulnerable to Threats

On-Demand Webinar

read more

New Dyre variant outsmarts AV researchers' sandboxes

Now Seculert researchers have discovered new changes that make Dyre more difficult to detect and analyze.

read more

Anti-sandbox capabilities found in Dyre malware

Seculert research discovers that a new version of the financial malware Dyre is avoiding sandbox detection by counting the number of cores.

read more

Banking Trojan Uses Simple Method to Evade White Hats’ Analysis

A new variant of Dyre banking Trojan has emerged with a simple, yet efficient trick that prevents malware researchers from analyzing it.

read more

Nasty Dyre malware bests white hat sandboxes

Core checker a defensive wrecker

read more

Dyre Malware Developers Add Code to Elude Detection by Analysis Tools

As more companies deploy sandboxing technology to catch advanced malware, many attackers are adding code to their program to detect if the attack running in a virtual machine.

read more

Dyre Banking Trojan Counts Processor Cores to Detect Sandboxes

Researchers have come across a new version of the Dyre banking malware that leverages a clever yet simple technique to evade sandboxes and prevent analysis.

read more

Dyre Banking Trojan Jumps Out Of Sandbox

A number of unidentified commercial and freely available sandboxes fail to detect a new version of the Dyre banking Trojan, which was recently blamed for more than $1 million in losses to financial institutions and enterprises. - See more at: https://threatpost.com/dyre-banking-trojan-jumps-out-of-sandbox#sthash.c0CmYihA.dpuf

read more

Dyreza Banking Trojan Variant Evades Sandbox Solutions

Researchers have documented a new variant of the Dyreza banking trojan, a member of the Dyre malware family, which has the capability to evade an array of sandbox solutions.

read more

Dyre Banking Trojan Counts Processor Cores to Detect Sandboxes

According to Seculert, the new Dyre sample they’ve analyzed is designed to check the number of processor cores on the infected machine. Since most modern PCs have at least two cores, a single core could indicate the presence of a sandbox. That is because sandboxes are usually configured to use only one core in order to save resources.

read more

Subscribe to Email Updates

Contact Us

Unsplashed background img 2