Automatically translated.View original post

Malware can fake death to evade detection.

Researchers warn malware can fake death to evade detection.

Modern-day malware is used in a variety of strategies and methods to avoid being detected by various defense systems, some of which sound incredible, but it works.

According to a report by the Digit News website, it has mentioned the detection of malware latency strategies that, in addition to avoiding detection, can also evade detection, can also lurk within the system for a long time. A report from the research team of Picus Labs, an expert in cybersecurity research and monitoring, has called the method "faking death." The detection of the method is based on the examination of 1.1 million dangerous files and 15.5 million operations of malware files that took place in 2025. 2568) found that more than 80% of the total is stealth and persistent in the victim's system.

By examining this group of files, the research team detected some malware that came with new characteristics that had never been detected, such as one LummaC2 malware that used trigonometric calculations using Euclidean distance calculations to determine the function of the mouse between real people and the operation commanded by an environment simulation system like Sandbox. If detected, the malware would stop working and be quietly embedded in the system until the right time. This method is called faking death.

In addition to using mathematics to verify, many malware has also been found to detect a variety of systems, whether VM or Virtual Machine is in use on hardware, registry, or system configuration. If detected, the malware will stop and wait in the system.

Not only that, the research also revealed that firing malware code into the Process Injection to lurk on the victim's system has been a popular malware lurking method for three years in a row since the year of the research, which the research team named a digital parasite method. This method also covers malware ransom or Ransomware users, where hackers are 36% less popular for using Encrypted Files for Impact. Exactly.

# Trending # Lemon 8 Howtoo # lemon 8 diary # lemon 8 diary # freedomhack

3/7 Edited to

... Read moreจากประสบการณ์ที่เคยทำงานเกี่ยวกับการป้องกันภัยคอมพิวเตอร์ มัลแวร์ที่มีพฤติกรรมแบบแกล้งตายถือเป็นภัยที่ท้าทายมาก ๆ เพราะมันใช้วิธีการหยุดทำงานเมื่อรู้ว่าถูกจับตามอง ซึ่งทำให้ระบบรักษาความปลอดภัยทั่วไปตรวจจับได้ยากขึ้นอย่างมาก มัลแวร์ประเภทนี้มักจะตรวจสอบสภาพแวดล้อมจริง ๆ ด้วยวิธีแปลกใหม่ เช่น การวัดความเคลื่อนไหวของเมาส์ เพื่อแยกแยะระหว่างการใช้งานของคนจริงกับการทำงานใน Sandbox ซึ่งเป็นระบบจำลองเพื่อตรวจจับมัลแวร์ ถ้าระบบสังเกตเห็นความผิดปกติ มัลแวร์จะหยุดทำงานและรอเวลาที่เหมาะสมก่อนโจมตีจริง วิธีนี้ช่วยให้มันสามารถแฝงตัวอยู่ในระบบได้นานโดยไม่มีใครสังเกตเห็น ยิ่งไปกว่านั้น มัลแวร์ยังมีการตรวจสอบความเป็นจริงในระดับลึก เช่น เช็คการใช้งาน Virtual Machine (VM) หรือดูค่าบน Registry และ System Configuration เพื่อให้แน่ใจว่าระบบไม่ใช่สภาพแวดล้อมจำลองก่อนจะลงมือโจมตี สำหรับผู้ดูแลระบบและผู้ใช้ทั่วไป สิ่งสำคัญคือควรใช้ซอฟต์แวร์ป้องกันมัลแวร์ที่ทันสมัย และมีเทคโนโลยีตรวจจับพฤติกรรมแปลกปลอม (behavior-based detection) เพื่อเสริมความปลอดภัย ไม่ใช่พึ่งพาแค่การสแกนหาไวรัสแบบเก่าเท่านั้น ในมุมมองส่วนตัว การที่มัลแวร์โจมตีด้วยวิธี Digital Parasite และไม่พึ่งพาการเข้ารหัสไฟล์มากเหมือนก่อน ทำให้เราอาจเห็นการเปลี่ยนแปลงรูปแบบของการโจมตีในอนาคต ซึ่งควรเตรียมพร้อมด้วยการทำสำรองข้อมูลอย่างสม่ำเสมอและเพิ่มการอบรมให้พนักงานมีความรู้เรื่องมัลแวร์ยุคใหม่ สุดท้ายแล้ว การเข้าใจพฤติกรรมมัลแวร์แบบแกล้งตาย จะช่วยให้เราปรับปรุงระบบรักษาความปลอดภัยให้รับมือกับภัยสมัยใหม่ได้ดียิ่งขึ้น และยังช่วยให้ผู้ใช้ทั่วไปตระหนักถึงความเสียงที่อาจแฝงมาโดยไม่รู้ตัวอีกด้วย

Related posts

#creatorsearchinsights It’s Not a Crime If It’s Under 750! — Entitled Shoplifter’s Shocking Excuse #cops #karma
Bodycam Cops

Bodycam Cops

0 likes

3 cybersecurity jobs that pay well
1. Security Analyst - What They Do: Monitor networks for vulnerabilities, investigate breaches, and implement security measures. - How to Start: - Obtain certifications like CompTIA Security+ or CySA+. - Gain experience with tools like SIEM (e.g., Splunk). - Start in an I
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

628 likes

Thieves using jammers to scramble home security
Thieves are getting creative, with the holiday season, and packages being left outside from home deliveries they become targets for theft. Law enforcement warns more thieves are using jammers to scramble the video on wifi connected home security camerasCredit Vid: NBC News #homesecurity #warn
WTF NEWZ

WTF NEWZ

83 likes

Man Drives Into Oncoming Traffic While Fleeing Police at 130 mph #cops #karma #creatorsearchinsights
Bodycam Cops

Bodycam Cops

41 likes

Why I switched to taking notes on my iPad
I used to love writing in notebooks, but after switching to my iPad, I can confidently say I’m never going back! Here’s why: ✨ Cuter Notes – Let’s be real…aesthetic notes make studying more enjoyable! I can use custom colors, cute stickers, and different handwriting styles to make my notes visua
Rebecca R.

Rebecca R.

262 likes

😫 Wanting to quit your 9-5?
Becoming a Pinterest Manager might be for you! In less than a year, I went from earning $2K at my 9-5 to over $4K/month with Pinterest management alone. Now, with all the different skills and platforms I lesrned, I make anywhere from $12-15K A MONTH! Back then, I knew I had to do something
Bria | Monetize with AI 🤖

Bria | Monetize with AI 🤖

482 likes

#creatorsearchinsights Fleeing Suspect Takes Herself Out Running into a Pole #cops #karma
The Basement Yard 💤💯

The Basement Yard 💤💯

0 likes

It's no secret that Karol G just slayed the #Grammys #Glambot . #AwardsSeason
user6854050772614

user6854050772614

5 likes

Top Cybersecurity Certificates
There are several reputable cybersecurity certifications that can help you advance your skills and knowledge in the field of cybersecurity. 1. Certified Information Systems Security Professional (CISSP): - CISSP is a globally recognized certification that covers a wide range of cybersecurit
anjali.gama

anjali.gama

110 likes

Developing a career in cybersecurity
Hey All! 👋 Want to stay safe online and protect your data? Cybersecurity knowledge is essential. It helps you secure your personal information and understand how to safeguard your digital footprint. Let’s dive into why it’s crucial! 💻🔒 Why Cybersecurity Matters Cybersecurity is about protecting
Meghana

Meghana

547 likes

⚡ How to Make Your PC Run Faster – 5 Easy Tips! 🖥️🔥
💡 1. Disable Startup Programs 🚀 Too many apps launching at startup slow down your PC! ✅ Open Task Manager (Ctrl + Shift + Esc) ✅ Go to the Startup tab ✅ Disable unnecessary apps to speed up boot time 💡 2. Clean Temporary Files 🗑️ Over time, junk files slow your system down. ✅ Press Win
skaeszun

skaeszun

284 likes

Check out this website that helps you when you’re feeling uninspired! I walk you thru the process of downloading the svg file to taking it to cricut design space! Happy crafting. #designinspo #creativeart #cricutprojects #svgfiles #CricutTips
VlunaWorks

VlunaWorks

30 likes

Tools and sites I use as a cybersecurity student 🌸
#cybersecuritystudent #cybersecurity #techgirlie
LexiStudies

LexiStudies

102 likes

Revelry in the Dark
#myheroacademia #mha #bokunoheroacademia #bnha #tokoyami
Malware X20

Malware X20

5 likes

Mac Productivity Apps: Make More Time for YOU! 💻
Let’s talk about one of the most important things in our daily routines—our workflow. Whether you’re working for yourself, managing a side hustle, or simply trying to keep everything in check, examining and refining your workflow is key to getting more done with less stress. 💪 By finding simple, ef
Cas Lin

Cas Lin

35 likes

Just Finished!!
Finger painting is awesome!! I don’t have my brushes with me so i decided to finger paint, it’s even better than i imagined it’d turn out!! I may or may not sell this painting, but I will have lots more to share like this!! ⭐️Overall rating: 10/10 #paintingmyselfhappy #painting 🎨 #hel
✨🖤alexandria🖤✨

✨🖤alexandria🖤✨

50 likes

Elite Hacker Destroyed His Empire By Forgetting On
Bro, I really forgot to use a VPN 💀 #hacker #cybercrime #fail #tech #arrestedstupidly
arrestedstupidly

arrestedstupidly

1 like

SOS!!! Wha do you do if you click a phishing email link… two times?!? So far I have: 1, added two factor sign on 2, changed my passwords 3, stress cried and spiraled But for real. What do you do… how do I know if there is now malware (? Is that what it’s called ?) living on my computer?!?
Alexandra Wildeson

Alexandra Wildeson

2 likes

FBI Warns Against Replying to Scam Texts
The FBI is urging smartphone users to never reply to suspicious texts or calls, especially those claiming to be from government officials—often crafted to manipulate victims into handing over passwords or clicking malicious links. Scammers are increasingly impersonating senior U.S. officials via sm
Sylvia Lustre

Sylvia Lustre

4 likes

+it’s less than 80$✨❗️LINK for this item in my bio❗️
Details⬇️: This flip phone smartphone with a flip keyboard design, offering both the convenience of a traditional keypad and the functionality of a modern touchscreen device. With 4GB of internal storage, you'll have plenty of space for apps, photos, and more. The compact 3.5" displa
Atlas

Atlas

443 likes

You need TikTok ?
Here is how you can download TikTok if you need help with and apple phone just ask me I can help with Apple phone you need to change your region on the Apple Pay store
Ali

Ali

10 likes

The Easiest Way to Get Mac Premium Apps!
Why Setapp is Essential: One Subscription, Numerous Apps: Gain access to over 240 premium applications for a single monthly fee,no need for multiple subscriptions.  Effortless Search & Download: Quickly discover the ideal productivity tool with an easy search, and download it right away. Enh
Reverelia

Reverelia

19 likes

Lunes con sabor a fin del mundo #aliens #ufo #ovni #teoriasconspirativas #conspiracytiktok #tsunami #findelmundo #tiktoklatino
Richie

Richie

0 likes

Day 3 of 31: 31 days to a safer you. Did you know hackers can turn on your webcam without you ever noticing? 🎥👀 it happens when malware sneaks onto your device and gives cybercriminals access to your camera. That means your most private moments could be exposed. ✅ Here’s how to protect yours
Cybersecurity Girl

Cybersecurity Girl

21 likes

Pentagon Recalcuted 12 Kilometer Mothers Ship Arrival Date 3I Atlas on October 31 2025 #igorkryan #3iatlas #31atlas #halloween2025
Igor Kryan

Igor Kryan

1 like

This video has been sitting in my drafts since 2025. Not because it wasn’t good, but because I waited for “perfect.” Just the same way we take the perfect picture and over staring at it, opens up the imperfections in the photo🤣🤣🤣 Today, I realized the message in this video still matters: persona
Abby❤️💎

Abby❤️💎

1 like

Why Was Swift Shielded By a Bulletproof Barrier?
Taylor Swift snuck into the football stadium to watch her fiancé Travis Kelce at work ... and it looks like she used a bullet-resistant portable shield to evade detection following Charlie Kirk's very public murder. Taylor’s fans are going with an interesting theory online, after Taylor kept
TheOneRealCinnamon

TheOneRealCinnamon

86 likes

Unable to Initialize Hard Drive? Fix it Now
Find out how you can fix this issue and initialize your hard drive with ease using Partition Assistant, ensuring no data is lost during the process. #hdd #fix #repair #disk
SmoothTechie

SmoothTechie

0 likes

The sneakiest IRS scams to know about😏
IRS scams are getting trickier every year and I don’t want anyone here getting caught slipping. I’m breaking down the sneakiest scams you NEED to know about to protect your money and identity. If you’ve ever been unsure about a sketchy call, text, or email, drop “PROTECT ME” in the comments and I’
Shaniqua Financebabe

Shaniqua Financebabe

9 likes

AI is a New God of Earth no matter how you look at it #igorkryan #aigod #agi #utopia
Igor Kryan

Igor Kryan

2 likes

Tips for pursuing a career in cybersecurity
1. Build a Strong Technical Foundation A solid understanding of systems, networks, and programming is essential for identifying and mitigating security threats. • Learn networking basics (e.g., TCP/IP, firewalls, VPNs). • Gain familiarity with operating systems (Windows, Linux)
vedha | career tips (tech) 👩‍

vedha | career tips (tech) 👩‍

129 likes

Ten easy ways to spot a scam
That's a great request! Let's simplify those scam-spotting tools down to the absolute basics, using language even a child can remember. Here are ten easy rules, like a checklist, for staying safe: The 10 Super-Simple Scam Rules | Rule | What to Look For | The Simple Tool | |---|---|---|
Dragonak1754

Dragonak1754

5 likes

Malicious Android App
Cybercriminals are using fake ATT apps to distribute malware #cybersecurity #Android
Lemon8er

Lemon8er

0 likes

The sneakiest IRS scams to know about🙃🥸
I’m sure you’re well aware that people are trying to scam others. I feel like one of the most common scams are scams regarding taxes or scams pretending to be the IRS. Here are some of the ones that you want to be aware of and especially let other people know who may not have access to this info
Kylie 💸🫶🏻

Kylie 💸🫶🏻

12 likes

Recover Hidden Files from USB Using Command Prompt
Can’t see your files on a USB stick even though they’re there? This video shows how to use Command Prompt commands (like attrib) to unhide files hidden by system attributes or viruses — plus what to try if that doesn’t work. #USB #cmdanks #digitallifestyle #techtutorial #newonlemon8
XanthusTechCore

XanthusTechCore

2 likes

how to protect your devices from viruses! Pt 2
‧°𐐪♡𐑂°‧₊ 💌 Your device & inbox deserve protection too 💻📬 Here are small but powerful ways to stay safe online: 🛡️ Software & System Security – always update your OS & browser, turn on your firewall, and scan regularly for threats 📧 Email & Messaging Safety – avoid suspicious lin
peachiesuga ♡

peachiesuga ♡

30 likes

Solved: exFAT Drive Not Recognized in Windows 10
Why exFAT drive not recognized in Windows 10/11 and what’s the best solution to it? Read the following post to get the answers. #drive #filesystem #recognized
Techcrafter

Techcrafter

0 likes

20 Free Tools For CyberSecurity Enthusiasts
#Tech #hacking #hacker #cybersecurity #pentesting #startup #hacker #cyber #command #Prompt
ⵜⵉⴽ-TIK

ⵜⵉⴽ-TIK

81 likes

What to offer as a SMM? 📲
Knowing that my days/weeks are never 100% the same makes me happy! Including client work, I also: 📱I assisted an e-commerce startup by sharing my marketing tips with them so they have a successful launch! 📱Created and designed business cards for a local company. 📱And also had someone re
Bria | Monetize with AI 🤖

Bria | Monetize with AI 🤖

12 likes

#cybersecurity #studying #studytok #studywithme #BackToSchool
study with me 📚

study with me 📚

21 likes

Back Up Outlook Emails to an External Hard Drive
Need to back up your Outlook emails to an external hard drive? Here are 2 simple methods to help you out. Download AOMEI Backupper and give it a try! #backup #outlook #externalharddrive
SmoothTechie

SmoothTechie

1 like

Fake false lies
The statement you have shared appears to originate from a message promoting a purported “Quantum Financial System” (QFS), urging individuals to establish accounts, convert substantial portions of their assets, and invest in specific cryptocurrencies. As a professional inquiry into this topic warran
Dragonak1754

Dragonak1754

3 likes

Never plug your phone or computer into usb plugs in hotels or airports here’s why 👇🏼 A USB port doesn’t just deliver power, it can also transfer data. A compromised hotel USB outlet could secretly install malware on your phone or copy your data without you realizing it. Hotels, airports, and o
Cybersecurity Girl

Cybersecurity Girl

146 likes

See more