polymorphic virus

(redirected from polymorphic malware)

polymorphic virus

A virus that changes its binary signature each time it infects a new file. Using a random number generator, a unique key can be created to encrypt each virus download that self extracts and executes when opened. Without an identifiable pattern to match, the only way to discover a polymorphic virus is by its actions (see behavior detection). See self-extracting file.

Also called a "stealth virus," hundreds of thousands of polymorphic Windows viruses are discovered every day. The actual number of antivirus families that generate that many files is perhaps a few thousand. See virus and antivirus program.
References in periodicals archive ?
Malwise-An Effective and Efficient Classification System for Packed and Polymorphic Malware, Deakin University, Victoria, June 2013
Malwarebytes' position in the market is gained on its capability to propose higher security from zero-day threats, as well as against polymorphic malware.
Innovative architecture defeats polymorphic malware, allowing IT to safely embrace mobility and the social web
When polymorphic malware strikes, vSentry automatically protects the desktop, enterprise data and networks.
The shift to laptops and mobile devices has blurred the borders of networks; rapid proliferation of polymorphic malware has tested the effectiveness of static, signature-based protection; and the continuing swell in network traffic has slowed forensic analysis while driving storage costs skyward.
Our system's abilities in key areas, including pinpointing polymorphic malware variants and system vulnerabilities, are truly world class.
Our industry-leading anti-malware engine provides superior detection rates and heuristic analysis to detect and block even the most sophisticated polymorphic malware.
As new phishing/malware sites are detected, Cyveillance customers are updated in real-time, protecting them from zero-day exploits and polymorphic malware which are often missed by traditional signature-based technologies, such as anti-virus.
Throughout the first quarter of 2007, server-side polymorphic malware exploded across email, exploiting the well known zero-hour vulnerability of traditional anti-virus solutions.
The document, Malware Outbreak Trend Report: Storm-Worm, details the characteristics of the Storm-Worm, a server-side polymorphic malware.
Commtouch Zero-Hour[TM] Virus Outbreak Protection detects and blocks email-borne outbreaks - including server-side polymorphic malware - within moments of their release on the Internet.
One of the earliest server-side polymorphic malwares, known as Stration/Warezov, reappeared suddenly for several intense outbreak waves in November and December.

Full browser ?