Polymorphic Virus

3rd December 2020 | Cybrary Polymorphic Virus


polymorphic virus cybrary

A Polymorphic Virus is a type of ‘shape-shifting’ virus, producing malicious code that is able to replicate itself with new signatures but identical payloads over and over again. These viruses repeatedly change their overt characteristics in an attempt to evade and outwit your computer’s defenses and sabotage your system. Polymorphic capabilities are designed to evade signature-based cybersecurity solutions like antivirus and Anti-Malware.

This threat continues to grow. Antivirus researchers in 2020 determined that 97 percent of newly identified viruses had polymorphic properties. In 2015, it took the combined efforts of the FBI and Europol to bring down a botnet running advanced polymorphic malware called Beebone. This polymorphic botnet contained at least 12,000 compromised computers and was able to change itself up to 19 times a day to avoid detection.

Source: Kaspersky, TrendMicro

Related Terms: Macro Virus, Memory-Resident Virus, Melissa Virus

What does this mean for an SMB?

The polymorphic virus is not immune to security. By taking the right steps, you can protect yourself from this continually evolving threat. Here are the steps any company should take to avoid falling victim to Polymorphic Viruses. 

Antivirus:

One of the simplest and best ways to protect your systems from dynamic, changing code is to ensure you have the right type of security solution software in place. Have a high-quality heuristic and signature based antivirus solution will give far more comprehensive protection than just signature based or just heuristic based antivirus protection. Heuristic based solutions examine the actions and activities taken by code running on your system and prevent certain things from happening: for example, encrypting files should never happen and many heuristic programs prevent that helping you avoid a ransomware attack.

Employee Awareness Training

The initial exploit of a system often comes from human error, performing an action like downloading and running an infected email attachment, or visiting a website that has been compromised. Your own good judgment is often your first and best line of defense.

Keep Software Up to Date

Cybercriminals are constantly updating and morphing their virus code. All of the good guys should do the same. Updates are released in the form of free software patches for your desktop and laptop computers, but also for your IoT devices.  Make sure you install all system and software updates to everything.

Guide Staff With Cybersecurity Policies

Cybersecurity policies are a great way to keep staff informed and accountable to company expectations on behaviors and technology usage. CyberHoot recommends adopting the following four foundational governance policies if you haven’t any defined just yet:

  1. Password Policy
  2. Acceptable Use Policy
  3. Information Handling Policy
  4. Written Information Security Policy (WISP)

Perform a Risk Assessment

Spend your finite time and money on the most critical risks you face, identified in a Risk Assessment by a competent professional.  CyberHoot comes with built in cybersecurity assessments to help our clients do just this.

Purchase Cybersecurity Insurance for Catastrophic Failures

When all your preparations and protections fail you, having cybersecurity insurance to help you recover quickly and effectively can mean the difference between a complete failure of your company and just a bad year.  Protect yourself no differently than with Fire, Flood, Errors & Omissions, or car insurance with Cybersecurity Insurance.  Here are two articles on what cyber insurance can cover and some of the challenges it has

Conclusions

By building a robust, defense-in-depth cybersecurity program as outlined above, you create an equal playing field where the hackers do not have the upper hand.

To learn about this and other viruses, watch this short video:

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more