Malware Evasion Techniques

The cluster focuses on discussions about how malware and attackers use evasion tactics to bypass anti-malware tools, endpoint security products, and detection services like Microsoft flagging or VirusTotal, including probing for blind spots and hiding methods.

📉 Falling 0.5x Security
4,858
Comments
20
Years Active
5
Top Authors
#8234
Topic ID

Activity Over Time

2007
3
2008
6
2009
42
2010
78
2011
145
2012
179
2013
236
2014
265
2015
265
2016
336
2017
430
2018
252
2019
277
2020
329
2021
419
2022
373
2023
427
2024
402
2025
365
2026
29

Keywords

MS e.g HN LOTL eicar.org VM VPN NotPetya O.S APT malware compromised malicious infected virus detect payload xyz software detected

Sample Comments

taneliv Oct 21, 2025 View on HN

Maybe an effort to foil anti-malware / endpoint security products?

jimmaswell Feb 29, 2024 View on HN

Has there been a single recorded case of malware getting around this way?

badrabbit Feb 21, 2020 View on HN

It's not earth shattering but malware/attackers will use things like this for evasion.

krisoft Sep 30, 2022 View on HN

Imagine that you have put malware in xyz.com/mybadpage1, xyz.com/mybadpage2, and xyz.com/mybadpage3 pages. MS flags you, and you query MS. They tell you they see malware on the first two urls. Now you gained information about their blindspots.You can capitalise on this multiple ways. You can remove the first two and hope they remove the flag. You can design your next attack better so it is more like mybadpage3. Etc

fieldbob Sep 17, 2023 View on HN

isnt this how you hide malware on a machine?

jcims Jan 8, 2022 View on HN

Probably not. Most of that type of malware takes additional measures to avoid detection by the site maintainers.

jfoster Mar 12, 2015 View on HN

It sounds like you might be misunderstanding the feature. Can you explain precisely how you envisage it being used by malware?

rjh29 Jun 27, 2022 View on HN

I guess you'd have to run it in a malware sandbox like Cuckoo.

stouset Jan 31, 2018 View on HN

Malware already does this. Non-malware programs already do this to complicate analysis.

ape4 Oct 19, 2025 View on HN

Wouldn't the next malware use a different way to embed itself