As attack techniques evolve to outpace defenders, one area growing in prominence is circumventing known threat detection methods. One example is bypassing the Anti-Malware Scan Interface, or AMSI. Let’s explore how attackers can bypass AMSI and how organizations can defend against these types of attacks.
Created by Microsoft, AMSI interfaces between the system and the user to scan applications, user-generated data, and other services for evidence of malware. Although designed with Windows Defender in mind, AMSI works with any endpoint security solution. AMSI primarily scans:
Despite being a crucial layer of defense against ransomware, fileless attacks, and other kinds of malware, attackers can still find ways to slip past AMSI undetected. Here are some ways AMSI is being exploited by today’s threat actors.
Watch this demo to see how these techniques work in action.
Todyl’s Endpoint Security solution is tuned to detect many of these instances of AMSI bypass. Using detection logic that doesn’t rely on AMSI, Todyl can identify anomalies that indicate ransomware, malware, and in-memory attacks, even if they’ve bypassed AMSI already. Then, in Todyl’s managed cloud SIEM, you can see which systems were affected in real time, with case bucketing logic that correlates and groups events by severity.
Beyond these, Todyl’s MXDR team monitors your entire environment, with human analysts examining every alert on top of the automated analysis done by the product. That way, nothing slips through the cracks, and your organization remains protected from AMSI bypass and many other forms of attack 24x7.
See how Todyl can help you defend in depth against AMSI and many other prominent attack vectors. Book a demo today.