Intel 471’s Post

View organization page for Intel 471, graphic

22,431 followers

Malware crypting services, called crypters, obfuscate malicious files to bypass and evade antivirus capabilities. Ransomware gangs increasingly outsource this work to third-parties in order to increase the effectiveness of their malware. In October, we observed several actors offering malware crypting services that can bypass Microsoft Edge, Google Chrome, and Microsoft Defender protection mechanisms. The growing commoditization of crypting services and tools makes it easier than ever for threat actors to wage malicious campaigns undetected by endpoint security. It also underscores why intelligence-driven threat hunting is now a must-have capability. 📌 Learn more about malware crypting on the Intel 471 blog: https://lnkd.in/dJUwX3ez 📌 Explore our full report on Adversary Intelligence to discover comprehensive insights into malware crypting in the cyber underground: https://lnkd.in/gt2ED7G7

To view or add a comment, sign in

Explore topics