antivirus lies antivirus lies

Is Antivirus Enough in 2026? 5 Lies Your AV Tells You

Open your antivirus dashboard right now. Somewhere on the screen is a green checkmark, a shield icon, or a sentence telling you that your device is protected. That status is not a status. It is a marketing surface dressed up as a technical guarantee, and the gap between what it claims and what the underlying engine actually does is wide enough for entire categories of modern attacks to walk through.

This is not a piece arguing that antivirus is useless. AV still catches commodity malware in volume, and removing it would be reckless. The point is narrower and more uncomfortable: the specific reassurances your AV product gives you — about scans, about real-time protection, about detection rates, about clean scans, about quarantine — are technically false in ways that matter. Five of those reassurances are below, with what’s actually happening underneath each one.

Lie N°1 — “I scanned everything. You’re protected.”

A full system scan finishes, the log says zero threats, and the dashboard turns green. The engine did not, in fact, scan everything. It scanned what it could parse, in formats it understood, under the time and CPU budget the user tolerated.

Encrypted archives, password-protected payloads, and packed executables are routinely skipped or deferred. Obfuscated PowerShell, scripts that decode themselves at runtime, and fileless code that lives only in process memory never touch the on-disk scanner. Signed Microsoft binaries running malicious arguments — what MITRE catalogs as the T1218 family of techniques — look like trusted system activity, not malware. And “clean” is a verdict against today’s signature database; tomorrow’s update can flag a file that’s been sitting quietly on disk for months.

The scan result is real. The conclusion drawn from it — that nothing bad is present — is not.

Lie N°2 — “Real-time protection means I see everything.”

Real-time protection watches for malicious files being written to disk and for known-bad processes being launched. That is a narrow definition of “everything.” Entire attack classes happen on your machine in ways the AV is not architected to observe.

A browser session stealer copies cookies and OAuth tokens from your profile folder. No executable, no infection event, nothing to flag. A phishing page convinces you to grant a malicious OAuth app persistent access to your mailbox. No malware lands on disk. An attacker pipes commands through powershell.exe, wmic.exe, or certutil.exe — signed Microsoft tools doing exactly what they’re designed to do, with malicious intent. The AV sees trusted processes running trusted code.

CASE FILE
SUNBURST / SolarWinds — when AV trusted the wrong thing
VICTIMS
18,000+
organizations
DWELL TIME
14+ months
undetected
SIGNED BY
SolarWinds
valid code-signing cert
APT29 inserted the SUNBURST backdoor into a legitimate Orion update in early 2020. Every major AV trusted the signed installer. The payload waited 12–14 days before contacting its command server, then disabled defenses by hashing process names against a blocklist and rewriting registry keys to deactivate competing AV services. Discovered by FireEye in December 2020 — through behavioral anomalies in network traffic, not endpoint AV.

A trojanized npm or PyPI package executes at install time. A signed software update from a vendor you trust delivers a backdoor. SUNBURST, the SolarWinds compromise, did exactly that — reaching roughly 18,000 organizations through a legitimate signed update, sitting undetected for more than 14 months, and disabling Windows Defender on infected hosts by rewriting registry keys before its command-and-control traffic ever started.

Real-time protection saw a trusted process running. By the definition the engine uses, nothing was wrong.

Lie N°3 — “My detection rate is 99%.”

The 99% number is real in the sense that it appears in lab tests. It is misleading in the sense that lab tests measure performance against a curated corpus of known-bad files, and “known-bad files” stopped being the dominant attack vector years ago.

Independent evaluations show this gap clearly. MITRE Engenuity’s ATT&CK Evaluations test EDR and AV products against scripted adversary emulations — the same TTPs real APTs use — and detection rates collapse compared to file-based benchmarks. Sophos’s 2025 Active Adversary Report, drawn from 500,000+ hours of incident response engagements, found that 75% of initial access attempts in 2025 were malware-free: credential abuse, identity misuse, and social engineering rather than payloads on disk.

DETECTION REALITY
Vendor “99%” depends entirely on which row you’re in
THREAT CLASS
CATCH RATE
CONDITION
Known signatures
~99%
post-patch
Zero-day binaries
~40%
first 48 hours
Fileless / in-memory
~25%
no disk artifact
Phished credential theft
~10%
browser scope
Targeted intrusion (APT)
<5%
bespoke tooling
Ranges drawn from MITRE Engenuity ATT&CK Evaluations, Sophos 2025 Active Adversary Report, and Mandiant M-Trends 2025.

The headline number reflects the easiest case and is sold as the general case. The general case looks nothing like that.

Lie N°4 — “If your last scan was clean, you’re clean.”

Antivirus reports on the past. Threats happen continuously. The gap between those two things is where attackers actually live, and the numbers from front-line incident response make that gap painfully concrete.

Sophos’s 2025 data puts the median ransomware dwell time at 4 days in their combined incident response and managed detection caseload. Mandiant’s M-Trends 2025 report sets a higher global median of 11 days, with some intrusions hitting nearly 400 days when monitoring infrastructure was sparse. IBM’s Cost of a Data Breach 2024 report puts the mean time to identify a breach at 194 days — a seven-year low, but still more than six months. And Mandiant’s 2025 numbers show that only 52% of intrusions are detected internally; 34% are reported by external parties, and another 14% are disclosed by the attacker themselves through ransomware notes or extortion.

A clean scan is a statement about a moment that has already passed. Between scans, against the median attack timeline, the AV is silent for the entire active phase of most modern intrusions.

Lie N°5 — “I quarantined the threat. You’re safe.”

This is the most dangerous lie, because it fires after a detection — at the moment the user is most certain the AV did its job. Quarantine takes one file and moves it into an encrypted directory the engine controls. It does nothing about the state the malware established before the popup.

Persistence mechanisms survive. Registry Run keys, scheduled tasks, WMI event subscriptions, and Windows services keep firing on the schedule the attacker set — they reference file paths, autorun entries, or LOLBin commands, not the specific binary now sitting in quarantine. MITRE ATT&CK technique T1547 (Boot or Logon Autostart Execution) alone covers more than a dozen sub-techniques, most of which a vanilla AV won’t strip.

Secondary payloads are already deployed. Most modern droppers exist to fetch other tools after first execution — Cobalt Strike beacons, custom backdoors, credential stealers. By the time the dropper is quarantined, those implants are already running, under different names, in different process trees, often with valid signed certificates of their own.

And the alert itself is the warning shot. Sophisticated adversaries actively monitor for AV interference. The moment quarantine fires, they pivot — escalating, dumping additional credentials, burning the foothold, or activating destructive payloads — before the human at the keyboard has even read the popup.

The Pattern Across All Five

The five lies share a single underlying flaw. Antivirus is built around one question: “is this file bad?” Its scan, its real-time engine, its detection rate, its snapshot reporting, and its quarantine action are all answers to that one question.

Modern attackers stopped asking that question years ago. They steal session cookies from a browser, abuse OAuth consent screens, run signed Microsoft binaries with malicious arguments, sit inside trusted software updates, and exfiltrate credentials before any traditional payload touches disk. None of that triggers a file scanner, because none of it is a bad file.

Antivirus is a smoke detector, not a fire department. Even when it works, it only points at the fire. It cannot stop it, contain it, or undo it.

What Actually Closes the Gap

No single control replaces AV. What closes the gap is layering, on the assumption that any one layer will be bypassed.

Endpoint Detection and Response (EDR) watches process behavior and parent-child relationships rather than file signatures — it catches LOLBin abuse and fileless execution that AV misses. Multi-factor authentication breaks the value of stolen credentials, which is the entry vector in roughly three-quarters of intrusions. Patch management closes the exploitable surface AV cannot address by definition. Network egress filtering spots command-and-control traffic that endpoint tools never observe. Application allow-listing flips the default from “block known bad” to “permit known good.” Tested, immutable backups are the only control that meaningfully blunts ransomware after detection has failed.

The shift is from detection-centric thinking to assumption-of-compromise thinking. The question is no longer “did anything bad get in” — it is “when something gets in, how fast will we see it, contain it, and recover.”

FAQ

Should I uninstall my antivirus? No. AV still catches commodity malware in volume, and removing it raises your baseline risk significantly. The argument is against trusting AV as a complete control, not against running it.

Is built-in Windows Defender enough? For a home user with current Windows, sensible patching habits, and MFA on important accounts — yes, it’s adequate as the AV layer. Defender’s detection performance in independent testing is comparable to most paid products. The other layers above matter more than which AV brand you pick.

What about “next-gen AV” or “AI-powered” antivirus? The marketing labels mean little. What matters is whether the product does behavioral and process-tree analysis (EDR-style telemetry) or only signature and heuristic file scanning. Read the technical documentation, not the homepage.

Does this apply to mobile? The architecture is different — mobile OSes sandbox apps far more aggressively, so traditional AV is less relevant — but the underlying point holds. Phishing, OAuth abuse, and malicious app permissions are the dominant mobile threat vectors, and none of them are caught by a scanner.

The Bottom Line

Your antivirus is not lying because the engineers are dishonest. It’s lying because the questions it’s designed to answer — is this file bad? did I catch it? did I scan everything? — are no longer the questions attackers force defenders to answer. The dashboard reports honestly on a narrowing slice of the threat landscape, and the green checkmark hides that the slice is narrowing.

Treat AV as one layer among many, demand telemetry-rich tools alongside it, and assume — every day — that something is already inside. That assumption is the one that survives contact with how attacks actually unfold in 2026.

Add a comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Cybersecurity intelligence delivered directly to your inbox.

By pressing the Subscribe button, you confirm that you have read and are agreeing to our Privacy Policy and Terms of Use
Advertisement