Types of Malware

Types of Malware

Cybercriminals use many different types of malicious software, or malware, to carry out their activities. Malware is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system.


  1. Spyware

Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. Spyware does this by modifying the security settings on your devices.

It often bundles itself with legitimate software or Trojan horses.

2. Adware

Adware is often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser.

It is common for adware to come with spyware.

3. Backdoor

This type of malware is used to gain unauthorized access bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands.

A backdoor works in the background and is difficult to detect.

4. Ransomware

This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting your data so that you can't access it.

Ransomware is often spread through phishing emails that encourage you to download a malicious attachment or through a software vulnerability.

5. Scareware

This is a type of malware that users 'scare' tactics to trick you into talking a specific action. Scareware mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation.

If you agree to execute the specific program, your system will become infected with malware.

6. Rootkit

This malware is designed to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely.

Rootkit can also modify system forensics and monitoring tools, making them very hard to detect. In most cases, a computer infected by required software reinstall.

7. Virus

A virus is a type of computer program that, when executed, replicates and attaches itself to other executable files, such as a document, by inserting its own code.

Viruses can be relatively harmless, such as those that display a funny image. Or they can be destructive, such as those that modify or delete data.

Viruses can also be programmed to mutate in order to avoid detection. Most viruses are spread by USB drives, optical disks, network shares or email.

8. Trojan horse

This malware carries out malicious operations by making its true intent. It might appear legitimate but is, in fact, very dangerous. Trojans exploit your user privileges and are most often found in image files, audio files or games.

Unlike viruses, Trojans do not self-replicate but act as a decoy to sneak malicious software past unsuspecting users.

9.Worms

This is a type of malware that replicates itself in order to spread from one computer to another. Unlike a virus, which requires a host program to run, worms can run by them selves. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network.

Worms share similar patterns: They exploit system vulnerabilities, they have a way to propagate themselves, and they all contain malicious code (payload) to cause damage to computer systems or networks.

Worms are responsible for some of the most devastating attacks on the Internet.

In 2001, the Code Red worm had infected over 300,000 servers in just 19 hours.


要查看或添加评论,请登录

Aniceto Jolela的更多文章

  • Full-stack-application

    Full-stack-application

    Good afternoon devs, I finished making a full-stack-application and decided to share with you. This application aims to…

  • Impact Reduction

    Impact Reduction

    While most organizations today are aware of common security threats and put considerable effort into preventing them…

  • Penetration Testing

    Penetration Testing

    Penetration testing, commonly known as pen testing, is the act of assessing a computer system, network or organization…

  • Other ways of detecting cyber threats

    Other ways of detecting cyber threats

    There are other ways of detecting cyber threats other than looking for malicious signatures. One way that's becoming…

  • Security Best Practices

    Security Best Practices

    Many national and professional organizations have published lists of security best practices. Some of the most helpful…

  • Protecting Against Malware

    Protecting Against Malware

    One way of defending against zero-day attacks and advanced persistent threats (APTs) is to use an enterprise-level…

  • Real-Time Detection

    Real-Time Detection

    Many organizations today are unable to detect attacks until days or even months after they occur. Detecting attacks in…

  • Firewalls

    Firewalls

    In computer networking, a firewall is designed to control or filter which communications are allowed in and which are…

  • Email and Web Browser Privacy

    Email and Web Browser Privacy

    The Internet is a great tool for not only accessing information quickly and easily but also for communicating with…

  • Discover Your Own Risky Online Behavior

    Discover Your Own Risky Online Behavior

    Do you know what information is safe to share on social media sites? It’s surprising what people post on social media…

社区洞察

其他会员也浏览了