Understanding Unpredictable Threats: Advanced Malware

July 26, 2017 | Views: 3127

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here


Unpredictable Threats – Advanced Malware

By: Art Rebultan

How do you think a traditional, signature-based anti-malware can detect unpredictable threats like Polymorphic, Metamorphic and Cross-Platform malware? This advanced malware has the same destructive functionalities from any of the commonly known malware; Trojan, Worm, Virus, Keylogger, Ransomware, Bot, Adware, Rootkit, and Spyware.


While maintaining its function, the constantly changing its identifiable features in order to evade detection is what makes an anti-malware difficult to catch Polymorphic (“morph”) malware. File names and types (jpg, doc, xls, pdf, exe, etc.) or encryption keys also changes to make the malware unrecognizable by antivirus that uses many detection techniques.


I personally call this malware as a “transformer” as it can transform base on the ability to translate, edit, and rewire its own code. Thus, the signature is also changing. The difference of this to Polymorphic is the latter is encrypted on its original code to evade anti-malware detection and has the function to decryption itself.

Cross-Platform Malware

Write once, infect anywhere. This is the ability of the Cross-platform malware where it is designed to run on different platforms like Windows, Macintosh, Linux, Android, or iOS. This malware disguises as a Trojan and commonly written in Java.



  1. Install the next generation Antivirus.
  2. Heard about EDR tool? 70% of the AV misses are detected. And expensive. Will cover this soon.
  3. Regular scanning of updated anti-malware. Use other free tools. Healthy paranoia.
  4. Disable Javascript snippets on the web browser. This is a common entry point of exploit to user’s system.
  5. Don’t fall into Phishing and social media survey scams. Always check if the web site is HTTPS.
  6. Always do a clean backup of your important data to external hard drive or another computer.
  7. Security awareness is the best protection. Always read current events on cyber security.
Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge



Is Linux Worth Learning in 2020?
Views: 295 / December 14, 2019
How do I Get MTA Certified?
Views: 893 / December 12, 2019
How much does your PAM software really cost?
Views: 1344 / December 10, 2019
How Do I Get into Android Development?
Views: 1723 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?