SHARE
Facebook X Pinterest WhatsApp

Index Engines: Ransomware Shifting To Polymorphism & Wiper Attacks

Index Engines reports surge in polymorphic ransomware, shadow encryption, and directory corruption tactics in Q4 2025 study.

Written By
thumbnail
Luis Millares
Luis Millares
Feb 24, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Cyber resilience solutions provider Index Engines has released a new study from its CyberSense Research Lab, finding that threat actors are increasingly using polymorphism, shadow encryption, and directory corruption in their attacks.

Four ransomware developments observed in Q4 2025

According to the company, these techniques were used specifically to bypass traditional defenses, increase dwell time, and complicate both investigation and recovery efforts.

“We learned early on that the only way to stay current with emerging ransomware variants is to build a lab that analyzes them daily,” Index Engines CMO Jim McGann said. 

“This provides confidence that CyberSense remains current with the latest tactics used by bad actors, including new variants generated by advanced AI methodologies. As a result, our customers can trust that CyberSense data integrity scans will not be circumvented by new and innovative corruption methodologies.”

Advertisement

CyberSense Research Lab finds high prevalence of polymorphic ransomware and more

The CyberSense Research Lab automates the collection, detection, and analysis of emerging ransomware threats to continuously train its CyberSense MLMs, which the company says detect signs of ransomware-related corruption with 99.99% confidence and facilitate a clean recovery for thousands of organizations worldwide. 

Below is a closer look at the four ransomware behaviors the lab observed during Q4 2025:

  • High prevalence of polymorphic ransomware: Nearly 90 percent of samples analyzed exhibited polymorphic behaviors, including variants that replace legitimate files with executable content. These approaches can extend the investigation and recovery process and increase the risk of reinfection.
  • Widespread adoption of shadow encryption techniques: Approximately 80 percent of ransomware variants analyzed employed intermittent, partial, or slow encryption methods, up 33 percent from Q2 2025. These techniques are designed to avoid traditional detection while quietly corrupting data over time.
  • Emergence of directory-structure corruption: New variants target directory structures rather than individual files to speed up corruption and maximize business disruption. By impacting large, logically grouped data sets at once, these attacks complicate investigation efforts.
  • Emergence of wiper-style ransomware: The research lab observed a subtle rise in ransomware variants that prioritize destructive data corruption over financial extortion. These present as ransomware but behave like wipers, aiming to cause irreversible corruption.
Advertisement

Moving away from reactive recovery

In an official press release, the company emphasized that its research lab continuously updates its models as new ransomware variants emerge.

“Our research lab exists to stay ahead of how ransomware behaves in the real world,” McGann added. 

“By continuously analyzing how these attacks evolve, we’re helping organizations move from reactive recovery to informed, confident decision making when it matters most.”

Last year, we spoke with Index Engines CRO Neil DiMartinis about their patented AI-driven process designed to strengthen recovery from ransomware attacks. Learn more about their AI solution and how it reinforces their role in advancing cyber resilience.

thumbnail
Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

All Covered Launches Managed Vulnerability Service
Victoria Durgin
Feb 24, 2026
Exabeam Report: AI Key Driver in Cybersecurity Spend
Jordan Smith
Feb 24, 2026
Barracuda: Firewall Exploits Drive 90% of Ransomware Incidents
Luis Millares
Feb 20, 2026
Agentic AI Scales, SecOps Races to Catch Up
Victoria Durgin
Feb 19, 2026
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.