About Us | Contact Us
View Cart

The Troubling Evolutionary Success of Malware

By Vigilize | Friday, May 3, 2013 - Leave a Comment

The five tactical keys to the success of today’s viruses and malicious software

As malware evolves at an increasingly accelerated speed, it’s becoming more and more difficult for antivirus software to keep up. This year’s Microsoft Security Intelligence Reports indicated that over 40 million Windows systems were infected with some form of malware last year. Google researchers found that only 25% of real-world malware was detected by common antivirus scanners. Even when they were combined, the scanners were only able to detect 40% of infected downloads.

In order to defend against them, we need to know what is contributing to their success. Security experts have identified five strategies that make today’s malware so successful.

1. Start with the old and sick.
Out-dated and under protected computers are easy prey for viruses and malware. According to Microsoft’s Security Intelligence Report, systems with out-of-date antivirus software, unpatched system software, or no defenses at all have a 1-in-80 chance of being infected on any given month. Whereas a fully-patched, fully updated and protected system has a 1-in-500 chance.

2. Infect in real-time.
Instead of being attached to emails, which give a scanner time to find it, viruses today are coming through a browser or live internet connection. These types of malware can evade detection up to 4 times longer than email-associated malware.

3. Change faces.
Viruses and malware are more frequently able to adapt and change on the fly in order to escape detection. This polymorphism adds a level of randomness that makes it difficult for a scanner to recognize and detect its signature.

4. Lay low.
Just as some pathogens in the real world have a period of time where they lay dormant inside the body, malicious programs can be programed to sleep until a certain action or passage of time activates them.

5. Hiding is half the battle.
Malware today is becoming increasingly adept at actively hides itself from scanners. This evading is so crucial for the program to succeed that over half of its code may be dedicated to bypassing a system’s defenses.


Original article by Robert Lemos.
Read the full story here.

Latest News
    from Dan’s New Role . . . And note the date! Another one of those Dan’s New Leaf Posts, meant to inspire thought about IT Governance . . . . Once again, I am turning over a new leaf.  Those who have not been following this blog for its full fourteen-year history might not realize […]
    Top Seven Risks . . . that small bank Information Security Officers face in 2023! When we present audit reports to boards of directors, we also talk to the board about the top risks the institution is facing. Since 2006, we have been compiling a list of the “top seven risks small institutions are facing,” in […]
    Another awareness poster for YOUR customers (and users). Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]
    The new plan calls for technology providers, and not end users, to be responsible for security… An article review.  Following multiple high profile cybersecurity incidents in 2021 and 2022 the Biden Administration recently announced new long-term goals for the nation’s cybersecurity, and under the new plan companies that provide technology would carry more of the […]
    R7: 2023’s Top Seven Technology Risks Webinar-Video What are the top seven risks your board should know about in 2023? Since 2006, Dan has been compiling a list of the “top seven risks small institutions are facing,” in preparation for his board presentations. This webinar will present the 2023 list in a manner that you […]
    A new way of helping people “read” new guidance… Look for more in the future! To save you time, we are proud to present “Adam Reads” . . . recorded versions of our Guidance Summaries! Below you can find an embedded player for the audio file. If you are having issues with that working, you […]
    Times they are a-changin’ . . . The infotex website is being updated. You read that right! We are in the process of updating our website from the circa 2013 version we have had for far too long. As the Digital Media Manager for infotex this excites me greatly and I look forward to the […]
    A new Team member’s first article! In today’s news cycle, it is difficult to miss all the fuss about AI, or more specifically, ChatGPT. So many differing opinions on the matter can make it hard to decipher what the future looks like. Few people think AI is a gimmick, but not many know the possibilities […]
    A draft version of the new framework may be available as early as this summer… An article review. As the cybersecurity landscape is constantly evolving, the tools we use to address risk need to evolve as well–and by this summer we should be getting our first look at planned changes to the NIST cybersecurity framework.  […]
    Another awareness poster for YOUR customers (and users).  Now that we have our own employees aware, maybe it’s time to start posting content for our customers! Check out posters.infotex.com for the whole collection! Download the large versions here: Awareness Poster (Portrait) Awareness Poster (Landscape) You are welcome to print out and distribute this around your […]