Home Malware News Email-Borne Polymorphic Malware Attacks Has Tripled

Email-Borne Polymorphic Malware Attacks Has Tripled

Posted: September 28, 2011

Although e-mail-based malicious software attacks have been common for years, there has been a very sharp rise in such attacks that use polymorphic coding to evade detection. Since July, the estimated number of polymorphic-style malicious software attacks transmitted by e-mail have roughly tripled, resulting in the overwhelming majority of such attacks being able to change their code and conceal themselves from PC security programs. As malware researchers have noted, the nature of these attacks makes keeping up-to-date security software incredibly important, as well as placing focus on awareness of social engineering tricks that are used to assist installation of Trojans, viruses and other infections.

The Basic Reconnaissance That Can Save Your PC from a Polymorphic Attacker

Programs that are labeled 'polymorphic' may be a Trojan, a virus, a worm or almost any other type of harmful application, although some programs (such as W32.Sality and Virut) are more likely to be polymorphic than other PC threats. Because these types of PC threats are exceptionally difficult to delete once they've infected your computer, you should try to avoid infection in the first place.

Most importantly, SpywareRemove.com malware experts recommend that you delete spam e-mail messages that could contain polymorphic Trojans or other PC threats and have awareness of the social engineering tactics that these e-mail messages use. Typical fake e-mail messages that can contain polymorphic infections include, but aren't restricted to:

  • Invitations to partake of free or bargain-rate adult content, including HornyGirlHere messages.
  • Fake 'missed package' messages that spoof their sender addresses to look as though they were sent by mail-delivery services.
  • Fake social networking links, invitations and friendship requests.
  • Fraudulent bills that claim that you will be charged a certain amount of money if you don't follow the instructions that are contained in the spam e-mail message.

In most cases, SpywareRemove.com malware researchers have found that such e-mail messages contain polymorphic PC threats in the form of file attachments, although links that direct you to file downloads may also be used for the same purpose.

How to Shore Up Your Defenses Against the Tide of Polymorphic Infections

If you suspect that your PC has a polymorphic infection, you should take several measures to be sure that your PC security software can be effective. Because polymorphic infections change portions of their code on a regular basis, SpywareRemove.com malware experts recommend that you avoid any shortcuts in scanning procedures when you try to scan your computer. 'Fast' or 'quick' scan modes will often skip large amounts of code to expedite the process, and this can cause your anti-malware scanner to skip over the code that would let it detect a polymorphic Trojan, virus or worm. Always use the most thorough scanning option that's available, even if it takes a significant amount of time.

The new surge in polymorphic programs also places importance on keeping your security programs up-to-date with respect to threat definitions. If your database is outdated, your software may be unable to detect a polymorphic infection even if it does scan the infected code.

Lastly, malware researchers advise you to be aware of PC threats that are particularly prevalent for your geographical region. For example, Saudi Arabi remains targeted by spam more than any other country in the world, while South Africa is the number-one target for phishing attacks (attacks that steal private information by using fake account login forms and legitimate company disguises). All of these defensive procedures, taken together, will empower you to keep your PC safe from polymorphic threats regardless of how often a Trojan changes its form.

Loading...