Browse Definitions :
Definition

malware testing

Contributor(s): Ivy Wigmore

Malware testing is the practice of subjecting malicious programs to software testing tools and antivirus programs designed for legitimate applications. 

Malicious software developers want their products to meet a lot of the same requirements that other software should meet. It's not desirable, for example, for either type of program to crash user computers or applications. 

In the case of regular software, causing crashes indicates that the software is not functional. If malware crashes user systems, on the other hand, the larger concern is that the cause of the crash will be detected, eradicated and reported. Running smoothly without causing problems is generally the ideal for malware as much as it is for any software because anything that causes problems is likely to be investigated.

Brandon Dixon, an independent researcher, reported that two high-profile nation state hacking teams were using Google's VirusTotal website to improve their malware. VirusTotal is a free service that allows any user to submit a program for testing. The site aggregates over three dozen antivirus scanners from Symantec, Kaspersky Lab, F-Secure and others. Dixon had been tracking submissions to the site for some time. 

To test their malware, the hacking teams repeatedly submitted programs to the site attempting to ensure they can evade detection by antivirus software. When a program failed to get through antivirus, they would tweak the code and resubmit until the malware was able to pass undetected. 

This was last updated in September 2014

Continue Reading About malware testing

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

  • compliance framework

    A compliance framework is a structured set of guidelines that details an organization's processes for maintaining accordance with...

SearchSecurity

  • Trojan horse (computing)

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • identity theft

    Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable ...

  • DNS over HTTPS (DoH)

    DNS over HTTPS (DoH) is a relatively new protocol that encrypts domain name system traffic by passing DNS queries through a ...

SearchHealthIT

  • telemedicine (telehealth)

    Telemedicine is the remote delivery of healthcare services, such as health assessments or consultations, over the ...

  • Project Nightingale

    Project Nightingale is a controversial partnership between Google and Ascension, the second largest health system in the United ...

  • medical practice management (MPM) software

    Medical practice management (MPM) software is a collection of computerized services used by healthcare professionals and ...

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification and is used in internally mounted ...

  • kilobyte (KB or Kbyte)

    A kilobyte (KB or Kbyte) is a unit of measurement for computer memory or data storage used by mathematics and computer science ...

  • virtual memory

    Virtual memory is a memory management capability of an operating system (OS) that uses hardware and software to allow a computer ...

Close