Types of Malware

Cards (16)

  • Malware is a piece of software designed to do something nefarious, combining "malicious" and "software" to form "malware"
  • Polymorphic Malware:
    • Changes its code after each use, making each replicant different for detection purposes
    • Re-writes itself every 10-15 seconds and changes the file hash
  • Virus:
    • Malicious code that replicates by attaching itself to another piece of executable code
  • Armoured Virus:
    • Aims to stop reverse engineering efforts by usually using encryption
  • Crypto-malware:
    • A type of attack that aims to create a Denial of Service (DoS) by encrypting certain files
  • Ransomware:
    • Encrypts files through automated means and demands ransom in exchange for the encryption key
  • Worm:
    • Malware that can traverse and spread independently once on a network
    • Can replicate and execute on its own
  • Trojan:
    • A program that pretends to have one functionality but actually has a different nefarious purpose
    • Often disguised as harmless software like games or apps
  • Rootkit:
    • Malware designed to modify operations of the operating system to facilitate non-standard functionality
    • Hard to detect and attacks at the operating system level
  • Keylogger:
    • Software that logs every keystroke of an end user
  • Adware:
    • Software supported by advertising
    • Some adware is legal and legitimate, where users agree to see ads in exchange for reduced costs
    • Can also be a form of malware that presents unwanted ads, posing a security threat
  • Spyware:
    • Malware that spies on user activity and reports stolen information
  • Bots:
    • Software that performs tasks under the control of another program
  • Remote-Access Trojan (RAT):
    • Toolkit designed to gain unauthorized access to the targeted system
  • Logic Bomb:
    • Deliberately installed software that remains dormant until triggered by an event, like a specific date or time, to execute its malicious payload
    • Often used when an employee leaves a company
  • Backdoor:
    • Installed after gaining unauthorized access to a system
    • Ensures attackers can regain entry if their initial access is discovered