Analysis Surfaces High Degree to Which Malware Evades Detection
Stairwell分析769份威胁报告发现,传统安全工具漏检1.6万个恶意软件变种。平均每份报告漏检21个变种,传统工具依赖文件哈希匹配导致大量盲区。AI时代恶意软件变种激增,需采用结构和行为分析的新工具提升检测能力。 2025-9-22 20:34:0 Author: securityboulevard.com(查看原文) 阅读量:14 收藏

Avatar photo

An analysis of 769 public threat reports published by Stairwell, a provider of file analysis tools, finds they contained 16,104 more undetected variants of malware beyond the 10,262 instances first discovered by legacy cybersecurity tools and platforms.

Company CTO Mike Wiacek said the report confirms suspicions the number of hidden variants of malware slipping past existing cybersecurity tools is much larger than what is currently suspected, with 21 additional variants detected on average per threat report.

The primary reasons these variants are not detected in the first place is legacy tools and platforms require an exact file hash match to identify malware, said Wiacek. As a result, there is a significant false negative issue that results in cybersecurity teams not detecting large swaths of malware that might be activated at any given time, he added. For every one variant of malware detected, there is one to two other variants that are not being detected, noted Wiacek. Those blind spots eventually lead to one or more cybersecurity incidents that could have been avoided using file analytic tools that map the full tree of malware variants that may have been installed, he said.

Techstrong Gang Youtube

That’s critical because as the cost of creating malware variants in the age of artificial intelligence (AI) continues to drop to near zero, the number of variants that might need to be detected will only continue to increase, noted Wiacek. More challenging still, the rate at which the next-generation of cyberattacks can be launched is only going to exponentially increase, he noted.

In summary, the report makes it apparent that tools and platforms that analyze structural and behavioral similarities to identify malware variants are a more effective approach, said Wiacek

It’s not clear what percentage of cybersecurity incidents involve malware that went undetected but the amount of budget dollars being invested in the hopes of enabling a better outcome only continues to increase. A recent Futurum Group survey finds cybersecurity budgets will increase on average to 11% of the IT budget in 2025. Overall, 80% of respondents work for organizations that experienced at least one significant cyber incident within the past 12 months, with cloud security incidents emerging as the most common (31%) followed by data breaches/exfiltration (28%) and ransomware attacks (26%), the survey finds.

Specifically, organizations are focused on enhancing threat detection capabilities (33%), adoption of quantitative risk assessment methodologies (32%), addressing evolving security needs (28%), improving threat response capabilities (27%), automation and containment of security sprawl (27%), enhancing third-party and supply chain risk monitoring (24%) and improving usability and ease of use (23%).

It may be a while yet before a cybersecurity playing field that is decidedly lopsided might one day be evened out as more cybersecurity teams embrace AI to essentially fight fire with fire. In the meantime, many of them should assume that the amount of malware that has been able to evade cybersecurity tools that rely on static searches of hashes is much larger than most anyone might really want to admit given how much has already been spent trying to detect it.

Recent Articles By Author


文章来源: https://securityboulevard.com/2025/09/analysis-surfaces-high-degree-to-which-malware-evades-detection/
如有侵权请联系:admin#unsafe.sh