Scenario: Polymorphic - One file two views
OVERVIEW: Polymorphism is used to evade pattern-matching detection relied on by security solutions like antivirus software. While certain characteristics of polymorphic malware change, its functional purpose remains the same.
For example, a polymorphic virus will continue to spread and infect devices even if its signature changes to avoid detection. By changing characteristics to generate a new signature, signature-based detection solutions will not recognize the file as malicious. Even if the new signature is identified and added to antivirus solutions’ signature database, polymorphic malware can continue to change signatures and carry out attacks without being detected.
BUSINESS PROBLEM: Employees may receive a file that claims to be "clean" because the polymorphic nature of the content has bypassed detection platforms.
THREAT: Polymorphism is hard to detect. Confused defences will allow files into a network.

TEST USING GX PLATFORM:
With CTR DISABLED
(i.e. the ICAP profile is disabled on the Web Proxy / or the browser is set to bypass)
With CTR ENABLED
ADVANCED
OUTCOME