How Polymorphic Malware Evades Detection — And What to Do About It

Polymorphic malware is the kind of threat that changes its own code — its signature, its behavior, even the command-and-control server it reports to — specifically so your antivirus can't catch it. In this episode, Dr. Mike Saylor of Black Swan Cybersecurity joins Prasanna and me to break down exactly how this works, why signature-based detection keeps losing the race, and what defenders actually need to do differently.
Mike walks us through ViraLock, one of the most well-known early examples of polymorphic malware, and explains the gap between infection and detection that attackers exploit. We also get into the difference between polymorphic and metamorphic malware — and metamorphic is a lot scarier. Then we cover waterhole attacks, a red team story that will make you rethink how fast attackers can own a network, and what behavioral detection looks like when it's actually working.
If you thought keeping your antivirus updated was enough, this episode is going to change your mind.
Chapters:
00:00:00 – Intro
01:35 – Meet the guests: Prasanna Malaiyandi and Dr. Mike Saylor
02:58 – What is polymorphic malware? The ViraLock story
05:52 – How polymorphic code changes its own signature
10:04 – Disguised executables and the human factor
12:23 – Polymorphic vs. static malware: what's the real difference?
14:15 – Metamorphic malware: nation-state-level scary
16:01 – The Frankenstein virus: a conceptual metamorphic example
16:52 – Waterhole attacks: infecting the shared file everyone downloads
18:32 – How polymorphic malware stays alive: the red team story
21:28 – Behavioral detection and baselining: how you actually fight back
26:57 – Risk-based defense: protect what matters most
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we get into something that should terrify every IT and security
Speaker:professional polymorphic malware.
Speaker:This is the kind of malware that literally changes its own code.
Speaker:Its signature, its behavior.
Speaker:Even the IP addresses it talks to just so your antivirus can't catch it.
Speaker:Dr. Mike Saylor joined persona in me to break down how polymorphic malware
Speaker:works, why it's been so effective at, uh, evading detection and what the, it's
Speaker:scarier cousin metamorphic malware can do.
Speaker:That's even worse.
Speaker:Well, we also cover waterhole attacks and what behavioral detection
Speaker:actually looks like in practice.
Speaker:If you thought your antivirus or anti-malware had it covered this episode.
Speaker:Hopefully will change your mind and probably scare you a little bit.
Speaker:If you don't know who I am.
Speaker:I'm w Curtis Preston, AKA, Mr. Backup, and I've been passionate about backup
Speaker:and recovery for over 30 years.
Speaker:That's right.
Speaker:30 years ever since, uh, there were no backups of the production
Speaker:database that we just lost.
Speaker:So that's why I do this because I don't want you to do that.
Speaker:On this podcast.
Speaker:We turn unappreciated backup admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:Welcome to the backup wrap up.
Speaker:I'm your host, w Curtis Preston, AKA, Mr. Backup.
Speaker:And with me, I have a guy that's starting to remind me of
Speaker:my wife Prasanna, Malaiyandi.
Speaker:How's it going?
Speaker:Prasanna.
Speaker:So basically I'm awesome because your wife is amazing, is what you're saying.
Speaker:Yeah, that's what it was.
Speaker:That was what it was.
Speaker:I was just like, you were saying something.
Speaker:I was like, man, you're starting to sound like my wife, becoming
Speaker:very predictable and how
Speaker:But in fairness, but yes, because the last episode, I was judgy mc
Speaker:Yeah.
Speaker:this time though, but be honest, right?
Speaker:You knew I was going to ask
Speaker:Yeah.
Speaker:That's what I'm
Speaker:So you did it, but you didn't actually complete it.
Speaker:whatever,
Speaker:So you failed.
Speaker:blah, blah, blah.
Speaker:Anyway, hi.
Speaker:we have also with us to watch our bickering, we have Dr. Mike Sailor,
Speaker:CEO of Black Swan Cybersecurity and co-author with me of this lovely book.
Speaker:Learning ransomware response and recovery.
Speaker:That should ship any day now for anyone who wants to order it.
Speaker:and I believe the, the electronic version is already on its way out.
Speaker:Doctor Mike Saylor.
Speaker:How's it going,
Speaker:Mike?
Speaker:everybody.
Speaker:Thank you.
Speaker:All right,
Speaker:like a married couple?
Speaker:I think we need a third party to.
Speaker:Make
Speaker:It Ha it happens
Speaker:sometimes.
Speaker:so Mike, there's a phrase that you brought up a lot in the book.
Speaker:and so I. I wanted to give you an opportunity to talk about it, to talk
Speaker:about what it is, why it matters, and is there anything we can do about it?
Speaker:And of course, what we're talking about today is polymorphic
Speaker:ransomware, AKA, the shapeshifter.
Speaker:Do you wanna start this out by talking about VeriLock?
Speaker:what was VeriLock or is VeriLock and, how does that factor into
Speaker:the, into this whole thing?
Speaker:Sure.
Speaker:Yeah, it was one of the most, talked about, polymorphic, malware, it
Speaker:functioned by compromising your computer with malware that had yet
Speaker:to be defined in a, anti-malware antivirus signature base, or heuristics.
Speaker:so it, it was designed to, to look different, to behave different, so
Speaker:that it could survive the filters.
Speaker:and it was usually delivered in a, in an attachment that.
Speaker:That you would expect.
Speaker:so if you worked in accounting, maybe it was an invoice if you worked
Speaker:in, the warehouse, maybe it was a shipping label, if you worked in, the
Speaker:computer room or the mail room, maybe it was a PO or something like that.
Speaker:So it was designed so that, you, you wouldn't suspect that attachment was,
Speaker:malware or something unsolicited.
Speaker:But yeah, when you open that attachment, the, it triggered the payload.
Speaker:The payload would drop, and start to slowly or, unsu suspiciously, deploy
Speaker:itself within the computer and start to, to, to then progress into the, the Mitre
Speaker:attack, phases of reconnaissance and.
Speaker:asset value identification spreading and those kind of things.
Speaker:So the polymorphic part of that was really designed so that, and backing up too.
Speaker:So a lot of antivirus software works on a schedule.
Speaker:So you could have the latest and greatest, antimalware in a
Speaker:ransomware software on your computer.
Speaker:Yeah, there is a period of time between infection and detection and some of that
Speaker:is analyzing how the software is behaving.
Speaker:Some of that is sending snippets of code or heuristics to the vendor and they're
Speaker:gonna sandbox it and do their analysis and then it pushes that back out as an update.
Speaker:until recently, those updates took about seven to 10 days.
Speaker:So you could be infected with something that the antivirus has
Speaker:never seen before that could maintain, persistence on that device for seven
Speaker:to 10 days before update comes.
Speaker:And that's why updates are important.
Speaker:The update comes and now your antivirus says, Hey, I found out that
Speaker:there's this thing on this computer.
Speaker:I need to clean it or quarantine it.
Speaker:So that's how it used to work.
Speaker:So now polymorphic code says, all right, now I know that on some
Speaker:periodic basis I need to change the way I look and the way I behave,
Speaker:so that even if, and I, this antivirus anti malware detected how I was
Speaker:looking and behaving yesterday, the update that comes in isn't gonna
Speaker:catch the way I look and behave today.
Speaker:Yeah, interesting.
Speaker:So hence the term polymorphic, right?
Speaker:So we morphic meaning changing and poly meaning many.
Speaker:So not only is it changing, it's changing multiple times, in a single deployment.
Speaker:Would that be the right term,
Speaker:We would call it a life
Speaker:so that, that payload has a lifespan and it would do these, these changes and.
Speaker:And I think we're gonna get into it in a little bit, but polymorphic
Speaker:code, it's coded, it's hard coded in the malware, how often to change
Speaker:the way it looks and behaves.
Speaker:could you go over what you mean by looks and behaves?
Speaker:is it, oh, I'm just changing my extension or my location where I'm running.
Speaker:Maybe it's the footprint of the malware itself, or is there like significant
Speaker:parts of the malware that change
Speaker:while it's
Speaker:changing it, it doesn't, the changing the extension or the
Speaker:file type or, or even some of the.
Speaker:The consumable content, is somewhat irrelevant to antivirus, antimalware.
Speaker:those tools are looking for, file type headers, the flags that say,
Speaker:even though it says it's a text file, it's an executable file.
Speaker:really what the polymorphic code is doing is changing the signature of
Speaker:the malware, and it doesn't take much.
Speaker:for example, If I install malware and it's hard coded to communicate back
Speaker:to a command and control server at a particular IP address, that is part
Speaker:of the signature now of that malware.
Speaker:And so when the update comes anti-malware gonna go, Hey, that file contains that
Speaker:IP address for a known bad command and control, and we're gonna quarantine it.
Speaker:So what the malware is hard coded to do is say, use that IP
Speaker:address for the first 72 hours.
Speaker:And then change it to this other IP address, increment
Speaker:by one or 10, or, some math.
Speaker:and that will coincide with the threat actors changing their
Speaker:lease on the command and control server, or they build a new one.
Speaker:and so that's an example of how that antivirus update is gonna miss the change
Speaker:that this malware made, to how it behaves.
Speaker:Gotcha.
Speaker:So it isn't necessarily as an example, changing out the underlying, say
Speaker:on a window system DLLs that it's leveraging or other things like
Speaker:Oh, it could for sure.
Speaker:Notepad Plus is in the news, and so maybe it's using Notepad plus.
Speaker:and some of the related, file structures and support files that are associated
Speaker:with Notepad puts plus, and that helps it do, the first day or two
Speaker:worth of activity and then it changes its behavior to start using, the
Speaker:DLLs, in Microsoft calculator or, or, maybe from the command and control.
Speaker:It downloads additional modules.
Speaker:And so now the file structure or the file, the malware itself has changed.
Speaker:It's no longer a 150 kilowatt file.
Speaker:Now it's a megabyte file, and because we've added stuff
Speaker:to it, it's been rewritten.
Speaker:So now, all the metadata's changed.
Speaker:and there's any number of examples.
Speaker:just get creative on how you can modify how a file looks and behaves.
Speaker:And bad guys are doing that because.
Speaker:Antivirus.
Speaker:In a lot of cases, most cases, those signatures are point in time things.
Speaker:And so you've got a, you've got a period of oper, of time to operate as malware
Speaker:before those signatures get updated.
Speaker:There's even malware that detects based on it.
Speaker:It'll detect what antivirus you're using and behave differently based on that.
Speaker:So if you've got trend micro versus eset versus.
Speaker:McAfee or some CrowdStrike.
Speaker:it will just, it will identify that first and then behave
Speaker:accordingly, based on the antivirus capabilities and update schedules.
Speaker:Let's go back to, when we, you were talking about Viralock.
Speaker:one of the things I read about it was that it would send a document that
Speaker:you were expecting, but change it so that it was actually an executable.
Speaker:And this is, this is going, this is gonna happen a lot, but that
Speaker:seems like something that, that the average person wouldn't fall for.
Speaker:You're changing invoice dot doc to invoice doc exe.
Speaker:And then people gonna click on that anyway.
Speaker:some people just don't realize it and some people are just very busy, right?
Speaker:So I've gotta get through a hundred invoices today, and
Speaker:there's another invoice, right?
Speaker:So they're just trying to do their job.
Speaker:and so yeah, very often bad guys, again are taking advantage of human
Speaker:nature, Right, We're just, we're too busy to be diligent.
Speaker:when you're like, Hey, I expected that sort of document to come here
Speaker:I'm gonna ask a dumb question
Speaker:in Windows it does, it, does it have to have, do XE to be an executable?
Speaker:I know there's DLLs, but don't, doesn't it have to have XE to
Speaker:actually be an executable, or can it just run with anything?
Speaker:So there are a few file types like, self-expanding, containers,
Speaker:like a zip or a tar ball.
Speaker:so there's a couple, and it doesn't have to say EXE in order to execute
Speaker:like an EXE because again, I can call a file, whatever, I can call
Speaker:it A DLL, and it'll look like a DLL.
Speaker:Because Windows is associating the file extension with what it thinks
Speaker:is necessary to open that file.
Speaker:So that's why that icon changes.
Speaker:But if you double click on it, windows goes, Hey, wait, I thought it was a
Speaker:DLL or a text file, and I'm opening what I think is associated with
Speaker:that file type and it's not working.
Speaker:So file corrupted, file not readable, whatever.
Speaker:Because I just changed the extension.
Speaker:But if you look at the file itself in the binary, there's actually
Speaker:file type flags and headers that identify it as an executable.
Speaker:So you just have to know how to address that file as an
Speaker:executable without double
Speaker:clicking on
Speaker:What I'm hearing you say is if you double click on it,
Speaker:it's got the wrong, extension.
Speaker:It's not gonna do the thing you want it to do, but there is a way to run it.
Speaker:Okay.
Speaker:All right.
Speaker:So if I think though about polymorphic ransomware.
Speaker:Isn't a lot of ransomware implementations where you're downloading modules from
Speaker:command and control servers, wouldn't all of those fall under this classification?
Speaker:No.
Speaker:so traditional, or we would call it static.
Speaker:and correct me if I misunderstood your question, but, all of the
Speaker:additional, so there is a, the point of polymorphic or metamorphic, which
Speaker:I think we'll get to in a minute, is to, evade detection and built in.
Speaker:There is also sometimes a capability of disabling antivirus because we're
Speaker:now resident on the machine and, we can escalate privileges and.
Speaker:Issue commands especially.
Speaker:And there's vulnerabilities disclosed recently, of pretty elementary ways of
Speaker:disabling windows Defender as an example.
Speaker:so there's that.
Speaker:then all the other files I call down, are just adding to, my base, executable.
Speaker:And so it's not my executable plus five other files.
Speaker:It is my base executable that's creating a new executable and in
Speaker:a lot of cases, cleaning up after my, cleaning up after myself.
Speaker:Gotcha.
Speaker:it's always evolving, if
Speaker:yep.
Speaker:And one other thing to add about, vi lock is, that made it a little
Speaker:different is that as it infected other files, it replicated itself.
Speaker:So it wasn't just ransomware, it was also a virus.
Speaker:And so you could.
Speaker:Let's say you, you paid the ransom and you decrypted all your files.
Speaker:now all those files still have the virus in them and could very well just
Speaker:become reinfected or communicable now,
Speaker:Oh.
Speaker:others that you might share those files
Speaker:Communicable.
Speaker:now you brought up the term metamorphic code.
Speaker:how is metamorphic versus polymorphic?
Speaker:So polymorphic is primarily hard-coded changes.
Speaker:this is going to happen in 24 hours.
Speaker:This is gonna change from this to that.
Speaker:Metamorphic does its own like almost AI analysis of what needs to change and it
Speaker:does it when it thinks it's necessary.
Speaker:So metamorphic is actually a lot more scary than polymorphic.
Speaker:Interesting.
Speaker:and is there.
Speaker:An understanding of like how common either of those two types are.
Speaker:Polymorphic iss probably pretty common 'cause that's just easy to do.
Speaker:Metamorphic is like nation state, CIA scary stuff, so probably pretty prevalent.
Speaker:You just, we just don't know about it.
Speaker:Do you have an example of a metamorphic ransomware attack out there?
Speaker:And it's okay if you don't off the top of your head.
Speaker:I don't.
Speaker:Okay.
Speaker:Okay.
Speaker:When, like nothing like VE lock, like not a tool like VE lock.
Speaker:I'll keep thinking about it as we
Speaker:talk, but, I, I've got scenarios in mind without necessarily
Speaker:any identifiable names to put
Speaker:on it.
Speaker:With the stuck net.
Speaker:which?
Speaker:Which is the
Speaker:one
Speaker:Stuck Stucks nut was hard coded.
Speaker:Okay.
Speaker:so that was polymorphic.
Speaker:even, Like some of the other ransomware, like the hit target, it was hard coded
Speaker:to look for point of sale systems it would move from one asset to the other.
Speaker:Cleanup after itself behave a little different, hard coded.
Speaker:Yep.
Speaker:Yeah, I could just see, I could just see the malware like
Speaker:crawling through the thing.
Speaker:Are you a point of sale system?
Speaker:Nope.
Speaker:I have I have a conceptual example of metamorphic code and it was
Speaker:called the Frankenstein virus.
Speaker:It was developed, I'm having trouble remembering his name, but it was developed
Speaker:out of the University of Texas at Dallas.
Speaker:Oh.
Speaker:And essentially what it would do is a framework would be downloaded that
Speaker:completely harmless, like nothing would think this framework was an
Speaker:issue at all, but as this framework executed, it would look for resources.
Speaker:it would feed off the land.
Speaker:So what software, what applications, what DLLs do you have on this computer?
Speaker:And it would assemble its malware based on what's available to it.
Speaker:That's crazy.
Speaker:be an example of metamorphic, but I don't think that made it out of the lab.
Speaker:Yeah, and I'm guessing with a lot of the AI stuff, we might
Speaker:see more of this in the future.
Speaker:Yep.
Speaker:making, making mean people smarter, but being stupid.
Speaker:something in the research that came up something called a waterhole attack.
Speaker:Mike, is this, does that, is that relevant in this discussion?
Speaker:It is.
Speaker:And so it, it's similar to that one,
Speaker:to many strategy that bad guys have.
Speaker:what's my least, level of effort that results in the largest possible gain?
Speaker:And looking for opportunities to attack victims in, in how they collaborate.
Speaker:So Microsoft Teams, zoom, WebEx, slack, SharePoint, all of those are
Speaker:what we would consider Waterholes.
Speaker:We, we go to those things to, interact with coworkers, update documents,
Speaker:share documents, store documents.
Speaker:So if I can compromise that water hole, then I've got a, I've got a
Speaker:larger pool of potential victims.
Speaker:if I can infect that one, that one file in SharePoint, that everybody like
Speaker:time, here's the time sheet template or the expense template, right?
Speaker:I'm gonna go infect that.
Speaker:So now everybody downloads that to do their time sheets in their
Speaker:expenses, and I'm infecting everybody that opens that template.
Speaker:Is that because they're, there are, they're using like macros?
Speaker:Is that what you're talking about there?
Speaker:It could be macros, it could be, you know, uh, polymorphic code.
Speaker:It could be viralocker on your time sheet template.
Speaker:It's just something that a whole bunch of people are accessing.
Speaker:right?
Speaker:That's a, that's an interesting, you want to talk about the things that
Speaker:a polymorphic, piece of code does to make sure that it continues to live.
Speaker:Yeah, so well, the life of polymorphic is somewhat known depending
Speaker:on the antivirus that you use.
Speaker:And so some of the older, traditional ones that code is only gonna live for,
Speaker:a couple of weeks, if you're using
Speaker:while malware is running wild in
Speaker:a couple of weeks.
Speaker:and I'll add to that, that single deployment of that code is a couple
Speaker:of weeks, but really what happens in the real world is that code will
Speaker:likely establish access that then can be multiplied into different threads.
Speaker:And so this is, here's another example of a red teaming exercise that we did.
Speaker:and this is a, an example of that coordinated effort among
Speaker:different attack skill sets.
Speaker:So one of the guy on our team, our chief engineer, knew how to write malware.
Speaker:I know how to break into buildings and social engineer people.
Speaker:another guy is on our team.
Speaker:we call him the ghost 'cause no one ever remembers seeing him.
Speaker:so very good social engineer, but also very technical.
Speaker:So he and I together infiltrated a physical building, social engineered
Speaker:employees as if we were from it.
Speaker:So I was dressed like this with a certain tie, and so I was the IT manager.
Speaker:And he just had a polo shirt on and, with, slacks.
Speaker:And so he was the IT engineer and together we, I had my cup of coffee and
Speaker:my clipboard and together we presented a level of legitimacy and confidence
Speaker:and we just started asking people, Hey, before you leave today, it looks
Speaker:like you're getting ready to leave.
Speaker:We just need to run an inventory application on your machine
Speaker:because we're doing some upgrades to make things work better.
Speaker:We all want things to work better.
Speaker:I don't need your password or anything.
Speaker:I just don't log off yet.
Speaker:with their current session, active, plug in a self deploying USB drive, that would
Speaker:create a shell, a reverse shell from that workstation all the way back to our chief
Speaker:engineer sitting at the hotel saying, all right, got one, move to the next desk.
Speaker:And so that malware and that thread lived on that computer for a week.
Speaker:But we would do that, 20 to 50 times.
Speaker:And.
Speaker:The reason you do that persistence, that multi-threaded persistence is because
Speaker:antivirus and most computers don't all do the same thing at the same time.
Speaker:So a week from now when antivirus signatures update to catch our
Speaker:malware, we would see those persistent threads start to drop, right?
Speaker:But because we have access to that computer, we've already got the next
Speaker:payload ready, and so we deploy our next.
Speaker:Payload to one of those active threads, and then it spreads backwards to the other
Speaker:machines that were previously compromised.
Speaker:So now we get our threads back because we managed to change
Speaker:the signature of our malware.
Speaker:And so even though the
Speaker:malware may only last a week or two, because I have access to the environment,
Speaker:I just need to deploy a new, a fresh copy that the antivirus hasn't seen before and
Speaker:restart the clock on another week or two.
Speaker:So it's basically like trying to play whack-a-mole.
Speaker:So as someone who's trying to defend against this, what do you do?
Speaker:Like it seems like you're never going to stay ahead of them.
Speaker:So
Speaker:I.
Speaker:but all of those things, are identifiable if you have a baseline.
Speaker:the way that malware works.
Speaker:If you have a baseline, you can start to look for deviations from that baseline.
Speaker:So that's your perimeter IP addresses.
Speaker:You're connected to data volume, network protocols being used,
Speaker:File access patterns.
Speaker:ingress, egress, ingress egress, file integrity.
Speaker:So who touched it?
Speaker:What did they do?
Speaker:network and endpoint behavior.
Speaker:User behavior.
Speaker:All of those things you can baseline and start to track deviations
Speaker:if you have the right tools.
Speaker:And bad guys know, a lot of people don't have the tools.
Speaker:And even if you did, there's a subset of people that do that's that, that,
Speaker:that don't look at it 24 hours a day.
Speaker:Yeah, so
Speaker:what's interesting about that, that, engagement I was describing where we
Speaker:deployed all that ransomware, we did.
Speaker:We did a ton of different things.
Speaker:We had thir 12 objectives to achieve, and they gave us like
Speaker:180 days to achieve 12 objectives.
Speaker:We achieved 11 objectives in seven days,
Speaker:Wow.
Speaker:and then we spent the rest of the time helping them, identify the
Speaker:problems and fix the problems.
Speaker:But one of the problems, and this goes back to the behavior, is because we
Speaker:had access and one of our objectives was to exfiltrate a lot of data.
Speaker:And we decided to do a little bit to achieve the objective and then do a lot to
Speaker:see how much it would take to get caught.
Speaker:And in the debrief, we were talking to the firewall admin and
Speaker:said, look, do you review your firewall logs and your bandwidth?
Speaker:And he is yeah, every morning I come in, I said, okay, the other
Speaker:day we pegged your bandwidth.
Speaker:what did you think about that?
Speaker:He said, I thought it was weird.
Speaker:But then the next day when I came in and it was still pegged,
Speaker:I just thought it was normal.
Speaker:yeah, you're can't help you buddy.
Speaker:so what you're talking about there is shifting from pattern, like file pattern
Speaker:recognition to behavioral, recognition.
Speaker:I'm not shifting to it.
Speaker:But adding, so
Speaker:security's all about layers.
Speaker:What, how many things can I put between me and the bad guys so that I can
Speaker:identify things faster and respond faster before they get to what they
Speaker:want or they spread and so yeah.
Speaker:It's like when I build a house, do I just need a yard?
Speaker:it'd be nice to have a sidewalk and a curb.
Speaker:It may be a fence, right?
Speaker:So it's all those things that are gonna help me determine when someone
Speaker:comes off the street towards my house.
Speaker:So it can detect things like the, the, it can detect just weird stuff
Speaker:like you talked about a mass upload tra, a mass upload of traffic.
Speaker:It could also obviously detect, a lot of encryption going on.
Speaker:what other
Speaker:But it could, it could,
Speaker:might it notice?
Speaker:it could also be, over the last six months, Curtis
Speaker:does not work after 6:00 PM.
Speaker:He does not log in, or if he does, he, this is what he does.
Speaker:he has this behavior during this period of
Speaker:time and this behavior during another period of time.
Speaker:And that could be during the day, it could be the weekends.
Speaker:you open Microsoft Word, you open the internet.
Speaker:but today you opened Excel and Notepad and you went to 50 websites, and those
Speaker:could
Speaker:Notepad.
Speaker:Those could all be harmless activities, but they'll be flagged
Speaker:as a deviation from normal behavior,
Speaker:and that's
Speaker:how you get ahead malware, not because
Speaker:it's identified as truly suspect.
Speaker:It's identified as a deviation.
Speaker:I don't work after four, by the way, just for the record,
Speaker:but.
Speaker:That's five o'clock.
Speaker:I know in one of the previous points you discussed sort of these
Speaker:tools, Curtis, I think at some point we're gonna have a podcast episode,
Speaker:maybe talking about some of these
Speaker:yeah, Of the various tools.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Can't cover everything in one episode or even 10 episodes.
Speaker:It's a lot.
Speaker:It's a lot to cover.
Speaker:so in this topic of polymorphic ransomware and also metamorphic ransomware, can
Speaker:you think of anything that we haven't covered that you think is important?
Speaker:So one of the things that.
Speaker:It is important to security cybersecurity specifically.
Speaker:'cause cybersecurity impacts everything.
Speaker:if it turns on and has value it, cybersecurity has a, there's a risk to it.
Speaker:So we're also limited.
Speaker:from a defense perspective, by our resources.
Speaker:So that's time, money, tech people,
Speaker:right?
Speaker:And so one of the things that's very important to an organization or even
Speaker:individuals is identify those things that are really valuable, where they are, and
Speaker:invest more in protecting that thing.
Speaker:and then start to, pull away from that to add layers as resources become available.
Speaker:But if you don't, if you don't identify or you don't know where the important things
Speaker:are and you just decide to blanket, cover everything, if you had a hundred computers
Speaker:and your budget's, a thousand dollars and that's $10 a computer, nine out of
Speaker:10 of those aren't as important and you could have invested more, in capabilities
Speaker:and recoverability in that one computer.
Speaker:Uh, and, do the kind of, the bare minimum good hygiene on the others.
Speaker:But then, segmentation, hardening, good policy, good monitoring, good response.
Speaker:Have a response plan, uh, good backups.
Speaker:what I'm hearing though is just like in, in backup and recovery,
Speaker:we talk about not everything is the same from a recovery perspective.
Speaker:there are applications that have a much.
Speaker:A higher business value and much higher business criticality.
Speaker:And so you're not gonna back up Joe's laptop the same way you buy, you
Speaker:back up the primary database server.
Speaker:And it sounds like the same is true of, cybersecurity.
Speaker:It is.
Speaker:And so yeah, your retention, classification, or even identification,
Speaker:that's all risk-based, value-based approach to applying resources to protect
Speaker:what you think is the most valuable.
Speaker:What's gonna keep your organization running, and how fast can we
Speaker:recover if something bad happens?
Speaker:All right.
Speaker:Mike, thank you for continuing to contribute to my cyber depression.
Speaker:Hey, don't pull your hair
Speaker:Yeah.
Speaker:too late.
Speaker:Too
Speaker:late.
Speaker:Yeah.
Speaker:Prasanna.
Speaker:Oh, too, that was hurtful right there at the end.
Speaker:Anyway, thanks Prasanna.
Speaker:You're welcome.
Speaker:And thank you to the listeners.
Speaker:That is a wrap.







