April 6, 2026

How Polymorphic Malware Evades Detection — And What to Do About It

How Polymorphic Malware Evades Detection — And What to Do About It
Apple Podcasts podcast player badge
Spotify podcast player badge
Castro podcast player badge
RSS Feed podcast player badge
Apple Podcasts podcast player iconSpotify podcast player iconCastro podcast player iconRSS Feed podcast player icon

Polymorphic malware is the kind of threat that changes its own code — its signature, its behavior, even the command-and-control server it reports to — specifically so your antivirus can't catch it. In this episode, Dr. Mike Saylor of Black Swan Cybersecurity joins Prasanna and me to break down exactly how this works, why signature-based detection keeps losing the race, and what defenders actually need to do differently.

Mike walks us through ViraLock, one of the most well-known early examples of polymorphic malware, and explains the gap between infection and detection that attackers exploit. We also get into the difference between polymorphic and metamorphic malware — and metamorphic is a lot scarier. Then we cover waterhole attacks, a red team story that will make you rethink how fast attackers can own a network, and what behavioral detection looks like when it's actually working.

If you thought keeping your antivirus updated was enough, this episode is going to change your mind.

Chapters:

00:00:00 – Intro

01:35 – Meet the guests: Prasanna Malaiyandi and Dr. Mike Saylor

02:58 – What is polymorphic malware? The ViraLock story

05:52 – How polymorphic code changes its own signature

10:04 – Disguised executables and the human factor

12:23 – Polymorphic vs. static malware: what's the real difference?

14:15 – Metamorphic malware: nation-state-level scary

16:01 – The Frankenstein virus: a conceptual metamorphic example

16:52 – Waterhole attacks: infecting the shared file everyone downloads

18:32 – How polymorphic malware stays alive: the red team story

21:28 – Behavioral detection and baselining: how you actually fight back

26:57 – Risk-based defense: protect what matters most

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we get into something that should terrify every IT and security

Speaker:

professional polymorphic malware.

Speaker:

This is the kind of malware that literally changes its own code.

Speaker:

Its signature, its behavior.

Speaker:

Even the IP addresses it talks to just so your antivirus can't catch it.

Speaker:

Dr. Mike Saylor joined persona in me to break down how polymorphic malware

Speaker:

works, why it's been so effective at, uh, evading detection and what the, it's

Speaker:

scarier cousin metamorphic malware can do.

Speaker:

That's even worse.

Speaker:

Well, we also cover waterhole attacks and what behavioral detection

Speaker:

actually looks like in practice.

Speaker:

If you thought your antivirus or anti-malware had it covered this episode.

Speaker:

Hopefully will change your mind and probably scare you a little bit.

Speaker:

If you don't know who I am.

Speaker:

I'm w Curtis Preston, AKA, Mr. Backup, and I've been passionate about backup

Speaker:

and recovery for over 30 years.

Speaker:

That's right.

Speaker:

30 years ever since, uh, there were no backups of the production

Speaker:

database that we just lost.

Speaker:

So that's why I do this because I don't want you to do that.

Speaker:

On this podcast.

Speaker:

We turn unappreciated backup admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the backup wrap up.

Speaker:

I'm your host, w Curtis Preston, AKA, Mr. Backup.

Speaker:

And with me, I have a guy that's starting to remind me of

Speaker:

my wife Prasanna, Malaiyandi.

Speaker:

How's it going?

Speaker:

Prasanna.

Speaker:

So basically I'm awesome because your wife is amazing, is what you're saying.

Speaker:

Yeah, that's what it was.

Speaker:

That was what it was.

Speaker:

I was just like, you were saying something.

Speaker:

I was like, man, you're starting to sound like my wife, becoming

Speaker:

very predictable and how

Speaker:

But in fairness, but yes, because the last episode, I was judgy mc

Speaker:

Yeah.

Speaker:

this time though, but be honest, right?

Speaker:

You knew I was going to ask

Speaker:

Yeah.

Speaker:

That's what I'm

Speaker:

So you did it, but you didn't actually complete it.

Speaker:

whatever,

Speaker:

So you failed.

Speaker:

blah, blah, blah.

Speaker:

Anyway, hi.

Speaker:

we have also with us to watch our bickering, we have Dr. Mike Sailor,

Speaker:

CEO of Black Swan Cybersecurity and co-author with me of this lovely book.

Speaker:

Learning ransomware response and recovery.

Speaker:

That should ship any day now for anyone who wants to order it.

Speaker:

and I believe the, the electronic version is already on its way out.

Speaker:

Doctor Mike Saylor.

Speaker:

How's it going,

Speaker:

Mike?

Speaker:

everybody.

Speaker:

Thank you.

Speaker:

All right,

Speaker:

like a married couple?

Speaker:

I think we need a third party to.

Speaker:

Make

Speaker:

It Ha it happens

Speaker:

sometimes.

Speaker:

so Mike, there's a phrase that you brought up a lot in the book.

Speaker:

and so I. I wanted to give you an opportunity to talk about it, to talk

Speaker:

about what it is, why it matters, and is there anything we can do about it?

Speaker:

And of course, what we're talking about today is polymorphic

Speaker:

ransomware, AKA, the shapeshifter.

Speaker:

Do you wanna start this out by talking about VeriLock?

Speaker:

what was VeriLock or is VeriLock and, how does that factor into

Speaker:

the, into this whole thing?

Speaker:

Sure.

Speaker:

Yeah, it was one of the most, talked about, polymorphic, malware, it

Speaker:

functioned by compromising your computer with malware that had yet

Speaker:

to be defined in a, anti-malware antivirus signature base, or heuristics.

Speaker:

so it, it was designed to, to look different, to behave different, so

Speaker:

that it could survive the filters.

Speaker:

and it was usually delivered in a, in an attachment that.

Speaker:

That you would expect.

Speaker:

so if you worked in accounting, maybe it was an invoice if you worked

Speaker:

in, the warehouse, maybe it was a shipping label, if you worked in, the

Speaker:

computer room or the mail room, maybe it was a PO or something like that.

Speaker:

So it was designed so that, you, you wouldn't suspect that attachment was,

Speaker:

malware or something unsolicited.

Speaker:

But yeah, when you open that attachment, the, it triggered the payload.

Speaker:

The payload would drop, and start to slowly or, unsu suspiciously, deploy

Speaker:

itself within the computer and start to, to, to then progress into the, the Mitre

Speaker:

attack, phases of reconnaissance and.

Speaker:

asset value identification spreading and those kind of things.

Speaker:

So the polymorphic part of that was really designed so that, and backing up too.

Speaker:

So a lot of antivirus software works on a schedule.

Speaker:

So you could have the latest and greatest, antimalware in a

Speaker:

ransomware software on your computer.

Speaker:

Yeah, there is a period of time between infection and detection and some of that

Speaker:

is analyzing how the software is behaving.

Speaker:

Some of that is sending snippets of code or heuristics to the vendor and they're

Speaker:

gonna sandbox it and do their analysis and then it pushes that back out as an update.

Speaker:

until recently, those updates took about seven to 10 days.

Speaker:

So you could be infected with something that the antivirus has

Speaker:

never seen before that could maintain, persistence on that device for seven

Speaker:

to 10 days before update comes.

Speaker:

And that's why updates are important.

Speaker:

The update comes and now your antivirus says, Hey, I found out that

Speaker:

there's this thing on this computer.

Speaker:

I need to clean it or quarantine it.

Speaker:

So that's how it used to work.

Speaker:

So now polymorphic code says, all right, now I know that on some

Speaker:

periodic basis I need to change the way I look and the way I behave,

Speaker:

so that even if, and I, this antivirus anti malware detected how I was

Speaker:

looking and behaving yesterday, the update that comes in isn't gonna

Speaker:

catch the way I look and behave today.

Speaker:

Yeah, interesting.

Speaker:

So hence the term polymorphic, right?

Speaker:

So we morphic meaning changing and poly meaning many.

Speaker:

So not only is it changing, it's changing multiple times, in a single deployment.

Speaker:

Would that be the right term,

Speaker:

We would call it a life

Speaker:

so that, that payload has a lifespan and it would do these, these changes and.

Speaker:

And I think we're gonna get into it in a little bit, but polymorphic

Speaker:

code, it's coded, it's hard coded in the malware, how often to change

Speaker:

the way it looks and behaves.

Speaker:

could you go over what you mean by looks and behaves?

Speaker:

is it, oh, I'm just changing my extension or my location where I'm running.

Speaker:

Maybe it's the footprint of the malware itself, or is there like significant

Speaker:

parts of the malware that change

Speaker:

while it's

Speaker:

changing it, it doesn't, the changing the extension or the

Speaker:

file type or, or even some of the.

Speaker:

The consumable content, is somewhat irrelevant to antivirus, antimalware.

Speaker:

those tools are looking for, file type headers, the flags that say,

Speaker:

even though it says it's a text file, it's an executable file.

Speaker:

really what the polymorphic code is doing is changing the signature of

Speaker:

the malware, and it doesn't take much.

Speaker:

for example, If I install malware and it's hard coded to communicate back

Speaker:

to a command and control server at a particular IP address, that is part

Speaker:

of the signature now of that malware.

Speaker:

And so when the update comes anti-malware gonna go, Hey, that file contains that

Speaker:

IP address for a known bad command and control, and we're gonna quarantine it.

Speaker:

So what the malware is hard coded to do is say, use that IP

Speaker:

address for the first 72 hours.

Speaker:

And then change it to this other IP address, increment

Speaker:

by one or 10, or, some math.

Speaker:

and that will coincide with the threat actors changing their

Speaker:

lease on the command and control server, or they build a new one.

Speaker:

and so that's an example of how that antivirus update is gonna miss the change

Speaker:

that this malware made, to how it behaves.

Speaker:

Gotcha.

Speaker:

So it isn't necessarily as an example, changing out the underlying, say

Speaker:

on a window system DLLs that it's leveraging or other things like

Speaker:

Oh, it could for sure.

Speaker:

Notepad Plus is in the news, and so maybe it's using Notepad plus.

Speaker:

and some of the related, file structures and support files that are associated

Speaker:

with Notepad puts plus, and that helps it do, the first day or two

Speaker:

worth of activity and then it changes its behavior to start using, the

Speaker:

DLLs, in Microsoft calculator or, or, maybe from the command and control.

Speaker:

It downloads additional modules.

Speaker:

And so now the file structure or the file, the malware itself has changed.

Speaker:

It's no longer a 150 kilowatt file.

Speaker:

Now it's a megabyte file, and because we've added stuff

Speaker:

to it, it's been rewritten.

Speaker:

So now, all the metadata's changed.

Speaker:

and there's any number of examples.

Speaker:

just get creative on how you can modify how a file looks and behaves.

Speaker:

And bad guys are doing that because.

Speaker:

Antivirus.

Speaker:

In a lot of cases, most cases, those signatures are point in time things.

Speaker:

And so you've got a, you've got a period of oper, of time to operate as malware

Speaker:

before those signatures get updated.

Speaker:

There's even malware that detects based on it.

Speaker:

It'll detect what antivirus you're using and behave differently based on that.

Speaker:

So if you've got trend micro versus eset versus.

Speaker:

McAfee or some CrowdStrike.

Speaker:

it will just, it will identify that first and then behave

Speaker:

accordingly, based on the antivirus capabilities and update schedules.

Speaker:

Let's go back to, when we, you were talking about Viralock.

Speaker:

one of the things I read about it was that it would send a document that

Speaker:

you were expecting, but change it so that it was actually an executable.

Speaker:

And this is, this is going, this is gonna happen a lot, but that

Speaker:

seems like something that, that the average person wouldn't fall for.

Speaker:

You're changing invoice dot doc to invoice doc exe.

Speaker:

And then people gonna click on that anyway.

Speaker:

some people just don't realize it and some people are just very busy, right?

Speaker:

So I've gotta get through a hundred invoices today, and

Speaker:

there's another invoice, right?

Speaker:

So they're just trying to do their job.

Speaker:

and so yeah, very often bad guys, again are taking advantage of human

Speaker:

nature, Right, We're just, we're too busy to be diligent.

Speaker:

when you're like, Hey, I expected that sort of document to come here

Speaker:

I'm gonna ask a dumb question

Speaker:

in Windows it does, it, does it have to have, do XE to be an executable?

Speaker:

I know there's DLLs, but don't, doesn't it have to have XE to

Speaker:

actually be an executable, or can it just run with anything?

Speaker:

So there are a few file types like, self-expanding, containers,

Speaker:

like a zip or a tar ball.

Speaker:

so there's a couple, and it doesn't have to say EXE in order to execute

Speaker:

like an EXE because again, I can call a file, whatever, I can call

Speaker:

it A DLL, and it'll look like a DLL.

Speaker:

Because Windows is associating the file extension with what it thinks

Speaker:

is necessary to open that file.

Speaker:

So that's why that icon changes.

Speaker:

But if you double click on it, windows goes, Hey, wait, I thought it was a

Speaker:

DLL or a text file, and I'm opening what I think is associated with

Speaker:

that file type and it's not working.

Speaker:

So file corrupted, file not readable, whatever.

Speaker:

Because I just changed the extension.

Speaker:

But if you look at the file itself in the binary, there's actually

Speaker:

file type flags and headers that identify it as an executable.

Speaker:

So you just have to know how to address that file as an

Speaker:

executable without double

Speaker:

clicking on

Speaker:

What I'm hearing you say is if you double click on it,

Speaker:

it's got the wrong, extension.

Speaker:

It's not gonna do the thing you want it to do, but there is a way to run it.

Speaker:

Okay.

Speaker:

All right.

Speaker:

So if I think though about polymorphic ransomware.

Speaker:

Isn't a lot of ransomware implementations where you're downloading modules from

Speaker:

command and control servers, wouldn't all of those fall under this classification?

Speaker:

No.

Speaker:

so traditional, or we would call it static.

Speaker:

and correct me if I misunderstood your question, but, all of the

Speaker:

additional, so there is a, the point of polymorphic or metamorphic, which

Speaker:

I think we'll get to in a minute, is to, evade detection and built in.

Speaker:

There is also sometimes a capability of disabling antivirus because we're

Speaker:

now resident on the machine and, we can escalate privileges and.

Speaker:

Issue commands especially.

Speaker:

And there's vulnerabilities disclosed recently, of pretty elementary ways of

Speaker:

disabling windows Defender as an example.

Speaker:

so there's that.

Speaker:

then all the other files I call down, are just adding to, my base, executable.

Speaker:

And so it's not my executable plus five other files.

Speaker:

It is my base executable that's creating a new executable and in

Speaker:

a lot of cases, cleaning up after my, cleaning up after myself.

Speaker:

Gotcha.

Speaker:

it's always evolving, if

Speaker:

yep.

Speaker:

And one other thing to add about, vi lock is, that made it a little

Speaker:

different is that as it infected other files, it replicated itself.

Speaker:

So it wasn't just ransomware, it was also a virus.

Speaker:

And so you could.

Speaker:

Let's say you, you paid the ransom and you decrypted all your files.

Speaker:

now all those files still have the virus in them and could very well just

Speaker:

become reinfected or communicable now,

Speaker:

Oh.

Speaker:

others that you might share those files

Speaker:

Communicable.

Speaker:

now you brought up the term metamorphic code.

Speaker:

how is metamorphic versus polymorphic?

Speaker:

So polymorphic is primarily hard-coded changes.

Speaker:

this is going to happen in 24 hours.

Speaker:

This is gonna change from this to that.

Speaker:

Metamorphic does its own like almost AI analysis of what needs to change and it

Speaker:

does it when it thinks it's necessary.

Speaker:

So metamorphic is actually a lot more scary than polymorphic.

Speaker:

Interesting.

Speaker:

and is there.

Speaker:

An understanding of like how common either of those two types are.

Speaker:

Polymorphic iss probably pretty common 'cause that's just easy to do.

Speaker:

Metamorphic is like nation state, CIA scary stuff, so probably pretty prevalent.

Speaker:

You just, we just don't know about it.

Speaker:

Do you have an example of a metamorphic ransomware attack out there?

Speaker:

And it's okay if you don't off the top of your head.

Speaker:

I don't.

Speaker:

Okay.

Speaker:

Okay.

Speaker:

When, like nothing like VE lock, like not a tool like VE lock.

Speaker:

I'll keep thinking about it as we

Speaker:

talk, but, I, I've got scenarios in mind without necessarily

Speaker:

any identifiable names to put

Speaker:

on it.

Speaker:

With the stuck net.

Speaker:

which?

Speaker:

Which is the

Speaker:

one

Speaker:

Stuck Stucks nut was hard coded.

Speaker:

Okay.

Speaker:

so that was polymorphic.

Speaker:

even, Like some of the other ransomware, like the hit target, it was hard coded

Speaker:

to look for point of sale systems it would move from one asset to the other.

Speaker:

Cleanup after itself behave a little different, hard coded.

Speaker:

Yep.

Speaker:

Yeah, I could just see, I could just see the malware like

Speaker:

crawling through the thing.

Speaker:

Are you a point of sale system?

Speaker:

Nope.

Speaker:

I have I have a conceptual example of metamorphic code and it was

Speaker:

called the Frankenstein virus.

Speaker:

It was developed, I'm having trouble remembering his name, but it was developed

Speaker:

out of the University of Texas at Dallas.

Speaker:

Oh.

Speaker:

And essentially what it would do is a framework would be downloaded that

Speaker:

completely harmless, like nothing would think this framework was an

Speaker:

issue at all, but as this framework executed, it would look for resources.

Speaker:

it would feed off the land.

Speaker:

So what software, what applications, what DLLs do you have on this computer?

Speaker:

And it would assemble its malware based on what's available to it.

Speaker:

That's crazy.

Speaker:

be an example of metamorphic, but I don't think that made it out of the lab.

Speaker:

Yeah, and I'm guessing with a lot of the AI stuff, we might

Speaker:

see more of this in the future.

Speaker:

Yep.

Speaker:

making, making mean people smarter, but being stupid.

Speaker:

something in the research that came up something called a waterhole attack.

Speaker:

Mike, is this, does that, is that relevant in this discussion?

Speaker:

It is.

Speaker:

And so it, it's similar to that one,

Speaker:

to many strategy that bad guys have.

Speaker:

what's my least, level of effort that results in the largest possible gain?

Speaker:

And looking for opportunities to attack victims in, in how they collaborate.

Speaker:

So Microsoft Teams, zoom, WebEx, slack, SharePoint, all of those are

Speaker:

what we would consider Waterholes.

Speaker:

We, we go to those things to, interact with coworkers, update documents,

Speaker:

share documents, store documents.

Speaker:

So if I can compromise that water hole, then I've got a, I've got a

Speaker:

larger pool of potential victims.

Speaker:

if I can infect that one, that one file in SharePoint, that everybody like

Speaker:

time, here's the time sheet template or the expense template, right?

Speaker:

I'm gonna go infect that.

Speaker:

So now everybody downloads that to do their time sheets in their

Speaker:

expenses, and I'm infecting everybody that opens that template.

Speaker:

Is that because they're, there are, they're using like macros?

Speaker:

Is that what you're talking about there?

Speaker:

It could be macros, it could be, you know, uh, polymorphic code.

Speaker:

It could be viralocker on your time sheet template.

Speaker:

It's just something that a whole bunch of people are accessing.

Speaker:

right?

Speaker:

That's a, that's an interesting, you want to talk about the things that

Speaker:

a polymorphic, piece of code does to make sure that it continues to live.

Speaker:

Yeah, so well, the life of polymorphic is somewhat known depending

Speaker:

on the antivirus that you use.

Speaker:

And so some of the older, traditional ones that code is only gonna live for,

Speaker:

a couple of weeks, if you're using

Speaker:

while malware is running wild in

Speaker:

a couple of weeks.

Speaker:

and I'll add to that, that single deployment of that code is a couple

Speaker:

of weeks, but really what happens in the real world is that code will

Speaker:

likely establish access that then can be multiplied into different threads.

Speaker:

And so this is, here's another example of a red teaming exercise that we did.

Speaker:

and this is a, an example of that coordinated effort among

Speaker:

different attack skill sets.

Speaker:

So one of the guy on our team, our chief engineer, knew how to write malware.

Speaker:

I know how to break into buildings and social engineer people.

Speaker:

another guy is on our team.

Speaker:

we call him the ghost 'cause no one ever remembers seeing him.

Speaker:

so very good social engineer, but also very technical.

Speaker:

So he and I together infiltrated a physical building, social engineered

Speaker:

employees as if we were from it.

Speaker:

So I was dressed like this with a certain tie, and so I was the IT manager.

Speaker:

And he just had a polo shirt on and, with, slacks.

Speaker:

And so he was the IT engineer and together we, I had my cup of coffee and

Speaker:

my clipboard and together we presented a level of legitimacy and confidence

Speaker:

and we just started asking people, Hey, before you leave today, it looks

Speaker:

like you're getting ready to leave.

Speaker:

We just need to run an inventory application on your machine

Speaker:

because we're doing some upgrades to make things work better.

Speaker:

We all want things to work better.

Speaker:

I don't need your password or anything.

Speaker:

I just don't log off yet.

Speaker:

with their current session, active, plug in a self deploying USB drive, that would

Speaker:

create a shell, a reverse shell from that workstation all the way back to our chief

Speaker:

engineer sitting at the hotel saying, all right, got one, move to the next desk.

Speaker:

And so that malware and that thread lived on that computer for a week.

Speaker:

But we would do that, 20 to 50 times.

Speaker:

And.

Speaker:

The reason you do that persistence, that multi-threaded persistence is because

Speaker:

antivirus and most computers don't all do the same thing at the same time.

Speaker:

So a week from now when antivirus signatures update to catch our

Speaker:

malware, we would see those persistent threads start to drop, right?

Speaker:

But because we have access to that computer, we've already got the next

Speaker:

payload ready, and so we deploy our next.

Speaker:

Payload to one of those active threads, and then it spreads backwards to the other

Speaker:

machines that were previously compromised.

Speaker:

So now we get our threads back because we managed to change

Speaker:

the signature of our malware.

Speaker:

And so even though the

Speaker:

malware may only last a week or two, because I have access to the environment,

Speaker:

I just need to deploy a new, a fresh copy that the antivirus hasn't seen before and

Speaker:

restart the clock on another week or two.

Speaker:

So it's basically like trying to play whack-a-mole.

Speaker:

So as someone who's trying to defend against this, what do you do?

Speaker:

Like it seems like you're never going to stay ahead of them.

Speaker:

So

Speaker:

I.

Speaker:

but all of those things, are identifiable if you have a baseline.

Speaker:

the way that malware works.

Speaker:

If you have a baseline, you can start to look for deviations from that baseline.

Speaker:

So that's your perimeter IP addresses.

Speaker:

You're connected to data volume, network protocols being used,

Speaker:

File access patterns.

Speaker:

ingress, egress, ingress egress, file integrity.

Speaker:

So who touched it?

Speaker:

What did they do?

Speaker:

network and endpoint behavior.

Speaker:

User behavior.

Speaker:

All of those things you can baseline and start to track deviations

Speaker:

if you have the right tools.

Speaker:

And bad guys know, a lot of people don't have the tools.

Speaker:

And even if you did, there's a subset of people that do that's that, that,

Speaker:

that don't look at it 24 hours a day.

Speaker:

Yeah, so

Speaker:

what's interesting about that, that, engagement I was describing where we

Speaker:

deployed all that ransomware, we did.

Speaker:

We did a ton of different things.

Speaker:

We had thir 12 objectives to achieve, and they gave us like

Speaker:

180 days to achieve 12 objectives.

Speaker:

We achieved 11 objectives in seven days,

Speaker:

Wow.

Speaker:

and then we spent the rest of the time helping them, identify the

Speaker:

problems and fix the problems.

Speaker:

But one of the problems, and this goes back to the behavior, is because we

Speaker:

had access and one of our objectives was to exfiltrate a lot of data.

Speaker:

And we decided to do a little bit to achieve the objective and then do a lot to

Speaker:

see how much it would take to get caught.

Speaker:

And in the debrief, we were talking to the firewall admin and

Speaker:

said, look, do you review your firewall logs and your bandwidth?

Speaker:

And he is yeah, every morning I come in, I said, okay, the other

Speaker:

day we pegged your bandwidth.

Speaker:

what did you think about that?

Speaker:

He said, I thought it was weird.

Speaker:

But then the next day when I came in and it was still pegged,

Speaker:

I just thought it was normal.

Speaker:

yeah, you're can't help you buddy.

Speaker:

so what you're talking about there is shifting from pattern, like file pattern

Speaker:

recognition to behavioral, recognition.

Speaker:

I'm not shifting to it.

Speaker:

But adding, so

Speaker:

security's all about layers.

Speaker:

What, how many things can I put between me and the bad guys so that I can

Speaker:

identify things faster and respond faster before they get to what they

Speaker:

want or they spread and so yeah.

Speaker:

It's like when I build a house, do I just need a yard?

Speaker:

it'd be nice to have a sidewalk and a curb.

Speaker:

It may be a fence, right?

Speaker:

So it's all those things that are gonna help me determine when someone

Speaker:

comes off the street towards my house.

Speaker:

So it can detect things like the, the, it can detect just weird stuff

Speaker:

like you talked about a mass upload tra, a mass upload of traffic.

Speaker:

It could also obviously detect, a lot of encryption going on.

Speaker:

what other

Speaker:

But it could, it could,

Speaker:

might it notice?

Speaker:

it could also be, over the last six months, Curtis

Speaker:

does not work after 6:00 PM.

Speaker:

He does not log in, or if he does, he, this is what he does.

Speaker:

he has this behavior during this period of

Speaker:

time and this behavior during another period of time.

Speaker:

And that could be during the day, it could be the weekends.

Speaker:

you open Microsoft Word, you open the internet.

Speaker:

but today you opened Excel and Notepad and you went to 50 websites, and those

Speaker:

could

Speaker:

Notepad.

Speaker:

Those could all be harmless activities, but they'll be flagged

Speaker:

as a deviation from normal behavior,

Speaker:

and that's

Speaker:

how you get ahead malware, not because

Speaker:

it's identified as truly suspect.

Speaker:

It's identified as a deviation.

Speaker:

I don't work after four, by the way, just for the record,

Speaker:

but.

Speaker:

That's five o'clock.

Speaker:

I know in one of the previous points you discussed sort of these

Speaker:

tools, Curtis, I think at some point we're gonna have a podcast episode,

Speaker:

maybe talking about some of these

Speaker:

yeah, Of the various tools.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Can't cover everything in one episode or even 10 episodes.

Speaker:

It's a lot.

Speaker:

It's a lot to cover.

Speaker:

so in this topic of polymorphic ransomware and also metamorphic ransomware, can

Speaker:

you think of anything that we haven't covered that you think is important?

Speaker:

So one of the things that.

Speaker:

It is important to security cybersecurity specifically.

Speaker:

'cause cybersecurity impacts everything.

Speaker:

if it turns on and has value it, cybersecurity has a, there's a risk to it.

Speaker:

So we're also limited.

Speaker:

from a defense perspective, by our resources.

Speaker:

So that's time, money, tech people,

Speaker:

right?

Speaker:

And so one of the things that's very important to an organization or even

Speaker:

individuals is identify those things that are really valuable, where they are, and

Speaker:

invest more in protecting that thing.

Speaker:

and then start to, pull away from that to add layers as resources become available.

Speaker:

But if you don't, if you don't identify or you don't know where the important things

Speaker:

are and you just decide to blanket, cover everything, if you had a hundred computers

Speaker:

and your budget's, a thousand dollars and that's $10 a computer, nine out of

Speaker:

10 of those aren't as important and you could have invested more, in capabilities

Speaker:

and recoverability in that one computer.

Speaker:

Uh, and, do the kind of, the bare minimum good hygiene on the others.

Speaker:

But then, segmentation, hardening, good policy, good monitoring, good response.

Speaker:

Have a response plan, uh, good backups.

Speaker:

what I'm hearing though is just like in, in backup and recovery,

Speaker:

we talk about not everything is the same from a recovery perspective.

Speaker:

there are applications that have a much.

Speaker:

A higher business value and much higher business criticality.

Speaker:

And so you're not gonna back up Joe's laptop the same way you buy, you

Speaker:

back up the primary database server.

Speaker:

And it sounds like the same is true of, cybersecurity.

Speaker:

It is.

Speaker:

And so yeah, your retention, classification, or even identification,

Speaker:

that's all risk-based, value-based approach to applying resources to protect

Speaker:

what you think is the most valuable.

Speaker:

What's gonna keep your organization running, and how fast can we

Speaker:

recover if something bad happens?

Speaker:

All right.

Speaker:

Mike, thank you for continuing to contribute to my cyber depression.

Speaker:

Hey, don't pull your hair

Speaker:

Yeah.

Speaker:

too late.

Speaker:

Too

Speaker:

late.

Speaker:

Yeah.

Speaker:

Prasanna.

Speaker:

Oh, too, that was hurtful right there at the end.

Speaker:

Anyway, thanks Prasanna.

Speaker:

You're welcome.

Speaker:

And thank you to the listeners.

Speaker:

That is a wrap.