Cuckoo Sandbox Detection


In this blog post, we will discuss the history of sandbox detection. We will then unveil the malware families that KTIS has observed from spear-phishing emails that attempt to bypass the user-mode API hook in order to evade sandbox detection. And finally, we will share the mitigation method we use to harden the Cuckoo sandbox against this bypass technique. [Read More]
by RSS Floser Bacurio and Wayne Low  |  Jan 03, 2018  |  Filed in: Security Research