Malware writers are sharpening their delivery techniques to avoid detection by system defenders. Malware mongers are becoming more savvy at countering defensive measures mounted against them. The new breed of APT attacks are not monolithic, rather they are blended, relying on numerous infiltration techniques. The report cited one APT attack that incorporated well-known documents and white papers into its phishing campaign to infect a target. The malware won’t run if it detects that it has landed on a virtual machine.”]