Episode 66 — Malware I: Types, Vectors, and Evasion

Behind every piece of malware lies a motive. The modern threat landscape is shaped as much by economics as by ideology. Some actors chase direct financial gain through extortion, fraud, or data resale. Others pursue espionage, leveraging implants to collect secrets quietly over time. State-sponsored groups use malware to destabilize infrastructure or gather strategic intelligence, while loosely organized criminals operate vast service economies that rent out access, tools, or entire botnets. This ecosystem thrives because malicious code can be commoditized—sold, shared, or franchised—allowing technical skill and malicious intent to meet in profitable marketplaces. Recognizing these motivations helps explain the diversity of tactics defenders encounter in practice.

Classifying malware begins with its operational behavior rather than its packaging. Viruses attach themselves to legitimate executables, relying on users to copy or run infected files. Worms automate that propagation, spreading independently across networks without user interaction. Trojans masquerade as useful software while delivering hidden payloads once installed. Spyware focuses on surveillance—capturing keystrokes, screen activity, or communications for later exfiltration. Although labels overlap, these categories clarify intent: replication, deception, or theft. What unites them is autonomy; once introduced, they follow their own logic, often outpacing the control of whoever first launched them.

The payload defines what the malware ultimately does. Some payloads focus on theft, stealing credentials, intellectual property, or financial data. Others hijack processing resources to mine cryptocurrency, turning compromised systems into revenue generators. Botnet clients connect infected hosts into centralized or peer-to-peer networks used for spam, denial-of-service attacks, or further distribution of new malware strains. Increasingly, payloads combine multiple functions—exfiltration, persistence, and monetization—so that each infection can be tuned to the attacker’s objectives. Understanding payload diversity reminds defenders that the same delivery mechanism can host entirely different end goals.

Delivery remains the most visible stage of infection, and traditional vectors continue to dominate. Email attachments remain reliable for spreading malicious code because social engineering often succeeds where technical defenses fail. Web exploits, such as drive-by downloads or malicious advertising scripts, deliver payloads to browsers and plugins. Removable media—though less common in corporate settings—still plays a role in isolated or industrial environments where network segmentation limits other avenues. The key observation is that malware follows people: where users communicate, click, and share, attackers embed their traps.

In recent years, attackers have also learned to poison the trust mechanisms that distribute legitimate software. Compromising a supplier’s build pipeline, hijacking update servers, or tampering with signed installers allows them to reach many victims simultaneously through normal maintenance processes. The so-called supply chain compromise inverts defenders’ assumptions, turning routine updates into attack delivery. Well-known incidents in which trusted software became a conduit for intrusion have prompted industries to adopt stricter code-signing practices, dependency auditing, and continuous validation of update integrity. Yet these efforts highlight how complex ecosystems multiply risk even as they improve efficiency.

Not all malware depends on external binaries or executables. The rise of “living off the land” tactics shows that attackers can achieve persistence and control using built-in administrative tools. Fileless techniques execute payloads directly in memory, invoke legitimate command interpreters, or embed scripts within registry keys and scheduled tasks. Because no obvious malicious file lands on disk, many traditional antivirus systems overlook them. Defending against these methods requires monitoring behavior and context rather than static signatures—watching for commands that make sense individually but form suspicious sequences collectively. The power of native tools becomes both a strength and a liability in such scenarios.

Evasion is the hallmark of professional malware design, and obfuscation plays a central role. Packing compresses or encrypts payloads to disguise their signatures and delay analysis. Polymorphic malware alters its appearance with each infection, changing code fragments or encryption keys so that no two samples are identical. Fully encrypted loaders hide entire sections of logic until runtime, defeating static scanners that rely on pattern matching. Even simple renaming or junk insertion techniques can frustrate basic detection pipelines. These layers of concealment buy attackers time—often just enough for the malware to execute before defenses can adapt.

Once active, malware seeks persistence to survive reboots, updates, and partial cleanups. On Windows systems, persistence may come from registry modifications, scheduled tasks, or service installation. Unix-like platforms see altered startup scripts, cron entries, or malicious kernel modules. Mobile and browser-based malware uses permission abuse or extension injection. In cloud environments, persistence often exploits misconfigured roles or automation tokens to recreate instances automatically. Each platform offers mechanisms designed for legitimate continuity, and adversaries simply repurpose them for their own endurance. Effective defense therefore depends on cataloging what “normal” persistence looks like and flagging deviations early.

Communication back to the attacker—known as command and control, or C2—is another defining trait. Early generations relied on hardcoded IP addresses or domains, making them easy to block once discovered. Modern frameworks use dynamic domain generation, fast-flux hosting, or encrypted tunnels over ordinary protocols such as H T T P S and D N S. Some even hide within social media platforms or public cloud services, blending with legitimate traffic. The objective is twofold: maintain reliable contact and resist takedown efforts. Detecting these channels requires behavioral analysis and correlation rather than simple blacklists, since infrastructure can shift hourly.

Within a compromised network, malware rarely remains isolated. Lateral movement enables an attacker to expand reach, harvest credentials, and escalate privileges. Techniques range from reusing cached passwords to exploiting misconfigured remote services or abusing administrative tools. Once higher privileges are achieved, persistence and payload deployment become much easier. These actions often mirror legitimate administrative activity, which makes distinguishing intrusion from routine maintenance difficult. Network segmentation, least-privilege access, and credential hygiene all reduce the scope of such movement, but defenders must also learn to interpret subtle context clues that automation alone cannot provide.

Indicators of compromise emerge across multiple domains. On hosts, defenders might notice unusual processes, scheduled tasks, or registry keys. In network telemetry, repeated outbound requests to rare domains, abnormal encryption patterns, or spikes in D N S queries can reveal control traffic. Behaviorally, the correlation of file access, system modification, and command execution timing often tells a clearer story than any single signature. Collecting these indicators consistently, labeling them with confidence levels, and sharing them responsibly across trusted communities transforms isolated detections into collective defense.

Attribution, the art of assigning responsibility for an intrusion, must always be approached with caution. Malware authors borrow, sell, and repackage code routinely, making technical artifacts unreliable markers of identity. Infrastructure overlaps as groups rent the same hosting or reuse domain registrars. Even language clues in binaries can be faked. Analysts therefore balance technical indicators with geopolitical context, timing, and intent, while avoiding premature conclusions. Sound attribution is probabilistic, not declarative, and its purpose is to inform response strategy rather than to declare guilt in public.

The study of malware underscores a simple paradox: the underlying patterns remain steady even as the details evolve. Infection still begins with human interaction, spreads through trust and convenience, hides through complexity, and persists by repurposing legitimate mechanisms. Each generation merely adapts these constants to new environments—mobile, cloud, or containerized. Recognizing this continuity empowers defenders to focus on fundamentals rather than chasing every new variant. When viewed through that lens, the contest between malware and defense becomes less about novelty and more about discipline, vigilance, and the continuous practice of sound engineering.

Episode 66 — Malware I: Types, Vectors, and Evasion
Broadcast by