The Use of Code Mutation to Produce Multi-use Cyber Weapons | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Campus
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
        • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
        • Operation Roaring Lion
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Foreign Information Manipulation and Interference
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Antisemitism and Delegitimization
    • Iran and the Shi'ite Axis
    • Operation Roaring Lion
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Foreign Information Manipulation and Interference
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Privacy Policy and Terms of Use
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
  • Contact
  • עברית
  • Support Us
bool(false)

Publications

Home Publications INSS Insight The Use of Code Mutation to Produce Multi-use Cyber Weapons

The Use of Code Mutation to Produce Multi-use Cyber Weapons

INSS Insight No. 444, July 8, 2013

עברית
Daniel Cohen
Aviv Rotbart

A common misconception about cyberspace is that once a computer virus or other malware used in an attack is discovered by the security companies, it is rendered useless for future use, because the anti-virus software has identified it and developed immunity against it. But this is not the case. Similar to biological viruses, malicious code can also evolve, making it more resistant to anti-virus software. This kind of code is known as code mutation.


The increasing use of cyber weapons is creating the inevitable situation in which sophisticated versions of cyber weapons capable of generating strategic damage will fall into the hands of states that support terrorism, terrorist organizations, and criminal organizations. Cyber weapons will no longer be the exclusive province of the few. The Stuxnet virus attack on the Iranian nuclear facilities is one such example. For years it operated undetected, but the moment it was discovered the virus code was subjected to in-depth analysis. The results of this research can immediately be put to use to develop new viruses operating similarly to the Stuxnet virus. In other words, once a secret is out, weapons spread.

{image} In biology, the term genetic mutation is used to describe an error in DNA reproduction. Mutations cause differences between organisms; thanks to mutations, organisms can adapt to the environment. When a virus mutates, the virus has had its genes altered in some way, and this change affects some of its features, perhaps making it more resistant to the human immune system, or deadlier, or able to spread more easily. Every flu season there are new mutations in familiar viruses.

A common misconception about cyberspace is that once a computer virus or other malware used in an attack is discovered by the security companies, it is rendered useless for future use, because the anti-virus software has identified it and developed immunity against it, depriving it of its ability to cause damage. In other words, computer viruses are disposables, meant for one-time use. But this is not the case. Similar to biological viruses, malicious code can also evolve, making it more resistant to anti-virus software. This kind of code is known as code mutation. Its uniqueness lies in the fact that although it has similar functional features to the parent code from which it was created (to the point of being identical), the difference is syntactic (structural) rather than semantic, in order to elude the radar of software detecting malware.

How is code mutation created? Similar to a genetic mutation, the mutant code does not have to differ greatly from the original code. Computer code, including virus code, usually consists of several software components that communicate in order to carry out tasks. Sometimes, a small change in the way the components communicate with one another or in one of the components itself is enough to create a code mutation undetectable by the computer's immune system – the security and anti-virus software. At times more significant changes are necessary, processes that will cause the malicious code to look very different than the original code that was the basis for its creation. But these changes are for the sake of appearance only. After the virus passes the computer’s firewalls and other defensive measures, it reverts to its original form and starts to function like the original virus. Two known methods to alter computer code are called, in the world of computer software, obfuscation and packing. These will change the code (make it look like a picture, text, or a string of meaningless keystrokes) but will not impact its functionality.

The strategic environment of the cyber battlefield includes the use of cyber weapons to penetrate the enemy’s systems for espionage, psychological warfare, deterrence, or damage to telecommunications or physical systems. Cyberspace offers wide-ranging warfare opportunities for many players who can operate in it according to their specific interests using their particular capabilities. The weapons arsenal includes advanced capabilities, usually found in just a few countries, and includes the ability to penetrate enemy systems without detection, gather intelligence, disrupt activity without arousing suspicion, and even cause physical damage to systems connected to cyberspace. The arsenal also includes simpler, less expensive weapons – used by other players such as criminal organizations, terrorist organizations, and commercial institutions – that are generally used to achieve temporary network damage (denial of service attacks), penetrate computer networks lacking a high level of security, steal information, and cause disruption. Capabilities such as these are for sale on the internet, increasing the proliferation of cyber weapons and making them accessible also for those lacking technological capabilities but equipped with the money to buy them.

The ability to create code mutation has reduced the technological gap between cyberspace actors. While state capabilities are required to create a sophisticated cyber weapon, all that is needed to duplicate it or create mutations is a group of talented civilian hackers that can use it to their own ends or sell it and operate it for others in exchange for payment.

At present, the internet and other communications networks based on similar protocols are insufficiently secured against a motivated attacker. The state’s dependence on the internet and the reliance of a variety of sectors on cyberspace make the cyber realm highly attractive, both to terrorist organizations seeking to penetrate the public's consciousness and change an existing political reality, and to criminal organizations interested in financial profit. Both can achieve their goals through an attack in cyberspace, which is often cheaper and simpler than kinetic terrorism and crime but capable of attaining a similar effect.

The features of the cyber battlefield place the attacker before dilemmas stemming from the fact that cyber weapons are multi-use weapons. Their use informs the victim of their characteristics, allowing the victim to use them as well, even as a retaliatory measure against the attacker (the boomerang effect). Weapons with strategic destruction capabilities (such as Stuxnet) are liable to fall (or have already fallen) into the hands of states supporting terrorist and criminal organizations and provide them with a basis for cyber attacks.

The decreasing costs and increasing availability of cyber weapons to terrorist and criminal organizations are a threat to state security in general, and the State of Israel in particular. As states make increasing use of cyber weaponry, their proliferation at the hands of other nations and non-state entities is to be expected. Therefore, when analyzing cyber threats, cyber weapons must be regarded as multi-use weapons that can be exploited for future attacks.

The opinions expressed in INSS publications are the authors’ alone.
Publication Series INSS Insight
TopicsAdvanced Technologies and National Security
עברית

Events

All events
Iran, US, Israel, and the Global Jewish Community
10 March, 2026
12:00 - 13:00
Shutterstock

Related Publications

All publications
Shutterstock
The Pentagon’s AI-First Doctrine and Its Implications for Modern Warfare: Lessons from the Conflict with Iran
How has the new US policy—under which AI is positioned as a foundational component in the chain of command, intelligence gathering, and the planning of complex operations—been reflected on the battlefield, and what conclusions should be drawn in Israel?
19/03/26
Shutterstock
Digital Sovereignty: A Conceptual Framework for Israel and Policy Recommendations
Digital sovereignty has, in recent years, become one of the central components of national power, economic resilience, and security. Artificial intelligence, cloud computing, data, and capital-intensive computing infrastructure constitute foundational elements for governmental, military, and economic activity. Accordingly, control over digital infrastructure is not merely a technological or economic issue but a strategic concern of the highest order. Israel, as a powerhouse of technological innovation, currently finds itself in a paradox. It is a leader in the development of advanced technologies and benefits from a highly developed technological ecosystem. At the same time, it is increasingly dependent on digital infrastructures controlled by foreign actors, including global cloud providers, semiconductor supply chains, and a regulatory framework that is not always aligned with the scale of investment, the risks involved, and the unique characteristics of strategic digital infrastructure. This situation presents Israel with a strategic challenge: how to preserve openness and innovation while ensuring control, resilience, and sovereignty over critical digital assets. This paper aims to present a conceptual framework for digital sovereignty, to identify principal policy challenges, and to propose an infrastructural and regulatory agenda for integrated implementation that balances public, economic, and security interests.  
23/02/26
Subsea Data Centers: An Opportunity for the State of Israel
What are the opportunities, risks, and challenges involved in establishing data centers—intended, in part, for AI applications—within the sea?
09/02/26

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Antisemitism and Delegitimization
      • Iran and the Shi'ite Axis
      • Operation Roaring Lion
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Foreign Information Manipulation and Interference
      • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
    • Privacy Policy and Terms of Use
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat ,Yael Group.
Accessibility Statement
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.