Download AV-Comparatives real-world test into how well different security products defend against APTs

Download AV-Comparatives real-world test into how well different security products defend against APTs



Graham Cluley Security News is sponsored this week by the folks at AV-Comparatives. Thanks to the great team there for their support!


Austrian anti-malware testing lab AV-Comparatives has published its new Advanced Threat Protection report (Enhanced Real-World Test) into endpoint protection products.


The test checks the ability of well-known security products from vendors such as Avast, Bitdefender, CrowdStrike, ESET, FireEye,, Kaspersky and Sophos to protect against targeted attacks known as Advanced Persistent Threats (APTs)


APTs are a growing menace, and are engineered to avoid detection by standard malware protection mechanisms. The threat to businesses from such attacks should not be underestimated.


AV-Comparatives performed the test in response to the increasing number of APT attacks. Whilst they can be directed at consumers/individuals, APTs are most commonly directed at businesses. They allow hackers to establish remote control of infected computers, with which they can carry out a wide variety of criminal activities. Data can be stolen, deleted or substituted, and systems can be sabotaged.


Another important reason for AV-Comparatives’ Enhanced Real-World Test is that APTs use a number of techniques to evade detection by endpoint security programs.


To create the most realistic possible scenario, AV-Comparatives’ test uses the same real-world hacking and penetration techniques employed by hackers to access corporate internal computer networks. These include the use of system programs, along with popular scripting languages. The test involves both staged and non-staged malware samples, and deploys obfuscation and encryption techniques to try to hide malicious code.


Fileless malware is included, and different command and control (C2) channels and exploit frameworks are used, to imitate the range of threats found in the real world.


< ..

Support the originator by clicking the read the rest link below.