What is Polymorphic and Metamorphic Malware?

Generative artificial intelligence (AI) and deep learning models have already begun affecting the world. These technologies range from wildfire management systems to smart glasses for people with hearing impairments to apps that transform your photos into Renaissance portraits.
AI can help with essay creation, data crunching … or malware code to take down your computer networks.
Yes, there’s always a flip side to every tech application.
Hackers can use AI to create code the same way you use it to improve your writing. Generative AI’s rapid output and learning capabilities make it a formidable contender and a talented team member (from a cybercriminal standpoint). It can take old malware techniques and put a fresh spin on them, like code that morphs its appearance to evade cybersecurity detection systems.
Hackers have used polymorphic and metamorphic malware in malicious code like:
These aren’t new cyberattack methods, but they’re becoming more efficient with assistance from deep learning and large language models (LLMs) like ChatGPT. The ramifications of generative AI will transform the cybersecurity environment, forcing security experts to up their game yet again.
Cybersecurity systems typically scan for suspicious activity and intrusions on networked systems, including code patterns earmarked as malware. But generative AI can write code iterations on the fly, outpacing cybersecurity’s ability to identify it as a threat. This renders the threat nearly invisible on the cybersecurity radar. Hackers have done this manually for years, but AI raises the output to turbo levels.
Two varieties of mutable malware on the watch list are polymorphic and metamorphic. Both evade detection by changing their identity as they replicate through a network.
Polymorphic
Polymorphic malware uses an encryption key to change its signature (aka its appearance). The signature is what exposes it as malware to an antivirus scanner. Polymorphic malware uses a mutation engine to encrypt its code to evade detection, making it difficult for an antivirus scanner to recognize it.
Metamorphic
Metamorphic malware does not use an encryption key to scramble its code. Instead, it rewrites its code with every new iteration (as it infects new files). These rewrites cause code mutations, so subsequent “child” code iterations don’t look anything like the “parent” source codes. Continuous code revisions make metamorphic malware challenging to identify.
As Casey Crane, managing editor of the Hashed Out blog, put it, “polymorphic malware is a leopard that changes its spots; metamorphic malware is a tiger that becomes a lion.”
Current iterations of generative AI have built-in content filters to prevent harmful outputs, but nothing is failsafe. As with most technology, there’s usually a workaround.
To test the capabilities of generative AI, experts at the information security firm CyberArk asked ChatGPT to generate polymorphic malware. ChatGPT initially refused to engage in the malicious code request, according to a CyberArk report. It replied, “It is not appropriate or safe to write code that injects shellcode into a running process, as it can cause harm to the system and potentially compromise security.” But through a series of detailed parameters and demands, ChatGPT eventually produced functional code.
CyberArk also found the application programming interface version had a less restrictive filter than the web version.
ChatGPT isn’t connected to the internet and occasionally produces incorrect answers, according to its developer, OpenAI. ChatGPT has “limited knowledge of world and events after 2021 and may also occasionally produce harmful instructions or biased content,” which is why OpenAI recommends checking all outputs.
A disconnect from the internet is sad news for users seeking trending data, but good news for cybercriminals. That’s because computer code predates 2021.
AI is working on the other side of data security, too. LLMs and deep learning are available to assist intrusion detection systems in protecting computer networks. Work with your cybersecurity team or hire one to combat emerging threats.
At the very least, continue good cyber hygiene practices:
Threat actors are becoming more prolific thanks to generative AI. Keep pace with emerging cyber applications, whether nefarious or beneficial.
Call your broker to review your cyber liability insurance policy: Some policies even have perks, including cyber threat consultations.
This content is for informational purposes only and not for the purpose of providing, financial, medical or legal advice. You should contact your attorney, doctor, broker or advisor to obtain advice with respect to any particular issue or problem. Read more about our limitation of liability here.
2025
April
March
February
January
2024
December
November
October
September
August
July
June
May
April
March
February
January
2023
December
October
September
August
July
April
March
March 31, 2023
March 31, 2023
March 29, 2023
March 14, 2023
March 07, 2023
2022
December
November
October
August
July
June
May
April
March
January
2021
December
October
August
April
March
February
January
2020
December
November
October
September
August
July
June
May
April
March
January
2019
November
October
September
August
July
June
May
April
March
March 28, 2019
March 15, 2019
March 13, 2019
March 08, 2019
March 06, 2019
March 01, 2019
February
February 27, 2019
February 22, 2019
February 20, 2019
February 12, 2019
February 06, 2019
February 01, 2019
January
2018
October
September
August
July
June
May
May 22, 2018
May 22, 2018
May 22, 2018
May 22, 2018
May 22, 2018
May 22, 2018
May 22, 2018
May 22, 2018
May 09, 2018
May 02, 2018
April
2017
Email: hello@csinsure.ca
Phone: 1-833-277-9438
Or even start a live chat on our website!
Our 1-306-763-8651 phone number is not working.
Please Call 1-833-277-9438 for phone assistance.