The three attacks you've mentioned, code mutation, code fragmentation and code concealment through rootkits, are some of latest evolution of new malicious code generation techniques. All are designed to make it harder to detect the virus or rootkit, and take the concept of the polymorphic virus one step further.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
These programs are being designed to stick around undetected for as long as possible on infected systems. Some malware designers use "packers" to encrypt malware to evade detection.
Others use different routines for decrypting the code to create a virtually unlimited number of mutations, such as the Trojan Swizzor did recently.
Swizzor repacked itself once a minute to get past signature-based tools that work only if they know precisely what to block. Swizzor also recompiled itself once every hour.
Zero-day attacks using well-concealed Trojans present a serious challenge to the security professional. Therefore it's very important to rely on a security product or group of products that really stays on top of current threats and vulnerabilities.
Of course, all of the usual steps your customers take to prevent any type malware always need to be taken, and may help prevent some of these exploits.
Dig Deeper on Threat management and prevention
Related Q&A from Russell Dean Vines
While some SMBs are not securing their mobile broadband, there is good reason to do so, even if a customer has only a small amount of data to protect.continue reading
A smurf attack can slow down a network to the point of shutting it down completely. Learn how to understand a full-scale smurf attack and how to ...continue reading
Streaming video and audio sites are frequently visited on both home computers and work computers. Learn about streaming video security risks and what...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.