Polymorphic engine
Type of computer program
A polymorphic engine (sometimes called mutation engine or mutating engine) is a software component that uses polymorphic code to alter the payload while preserving the same functionality.
Polymorphic engines are used almost exclusively in malware, with the purpose of being harder for antivirus software to detect. They do so either by encrypting or obfuscating the malware payload.
One common deployment is a file binder that weaves malware into normal files, such as office documents. Since this type of malware is usually polymorphic, it is also known as a polymorphic packer.
The engine of the Virut botnet is an example of a polymorphic engine.[1]
References
- ^ "The most polymorphic virus around today". Kasperky. 26 May 2021. Retrieved 2022-04-17.
- v
- t
- e
Information security
- Computer security
- Automotive security
- Cybercrime
- Cybersex trafficking
- Computer fraud
- Cybergeddon
- Cyberterrorism
- Cyberwarfare
- Electromagnetic warfare
- Information warfare
- Internet security
- Mobile security
- Network security
- Copy protection
- Digital rights management
- Adware
- Advanced persistent threat
- Arbitrary code execution
- Backdoors
- Bombs
- Hardware backdoors
- Code injection
- Crimeware
- Cross-site scripting
- Cross-site leaks
- DOM clobbering
- History sniffing
- Cryptojacking
- Botnets
- Data breach
- Drive-by download
- Browser Helper Objects
- Viruses
- Data scraping
- Denial-of-service attack
- Eavesdropping
- Email fraud
- Email spoofing
- Exploits
- Fraudulent dialers
- Hacktivism
- Infostealer
- Insecure direct object reference
- Keystroke loggers
- Malware
- Payload
- Phishing
- Polymorphic engine
- Privilege escalation
- Ransomware
- Rootkits
- Scareware
- Shellcode
- Spamming
- Social engineering
- Spyware
- Software bugs
- Trojan horses
- Hardware Trojans
- Remote access trojans
- Vulnerability
- Web shells
- Wiper
- Worms
- SQL injection
- Rogue security software
- Zombie
- Application security
- Secure coding
- Secure by default
- Secure by design
- Computer access control
- Computer security software
- Data-centric security
- Obfuscation (software)
- Data masking
- Encryption
- Firewall
- Intrusion detection system
- Information security management
- Runtime application self-protection
- Site isolation