Skip to main content

Understanding X-morphic exploitation

posted onMay 3, 2007
by hitbsecnews

The concept of malware morphing is not new. For years, malware authors and anti-virus researchers have documented and classified the methods used to obfuscate and hide malware code with each infection. And while these techniques have been a source of innovation for web browser exploit developers, in their first generation they were relatively ineffective against traditional signature-based protection engines for the following reasons:

* Malware authors did not have the organizational structure or financial backing to develop obfuscation techniques that would be effective against modern security solutions.

* Patches were generally available when an exploit appeared.

* The methods used for attracting victims to malicious websites were relatively unsophisticated and static in nature.

Source

Tags

Viruses & Malware

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th