Malware Analysis Spotlight: Why Your EDR Let Pikabot Jump Through

Malware Analysis Spotlight: Why Your EDR Let Pikabot Jump Through

Pikabot has posed significant challenges to many Endpoint Detection and Response (EDR) systems through its employment of an advanced technique to hide its malicious activities known as “indirect system calls” (or “indirect syscalls”). This is only one of multiple techniques this family employs to evade detection.

View this report to learn more on:

  • How Pikabot distinguishes itself through the use of extensive obfuscation techniques;
  • Best practices in monitoring application behavior with EDR’s & Sandboxing;
  • Enhancing detection abilities to combat evasion techniques and indirect syscalls.



Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.