Save
Types of Malware
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Simon Noveski
Visit profile
Cards (16)
Malware
is a piece of
software
designed to do something nefarious, combining "
malicious
" and "
software
" to form "
malware
"
Polymorphic
Malware
:
Changes its
code
after each use, making each replicant
different
for
detection
purposes
Re-writes itself every
10-15
seconds and changes the file
hash
Virus
:
Malicious
code that
replicates
by attaching itself to another piece of
executable
code
Armoured Virus:
Aims to stop
reverse
engineering
efforts by usually using
encryption
Crypto-malware
:
A type of attack that aims to create a
Denial of Service
(DoS) by
encrypting
certain files
Ransomware:
Encrypts files through
automated
means and demands
ransom
in exchange for the
encryption
key
Worm
:
Malware
that can
traverse
and
spread independently
once on a
network
Can
replicate
and
execute on its own
Trojan
:
A
program
that pretends to have one
functionality
but actually has a different
nefarious
purpose
Often disguised as
harmless
software like games or apps
Rootkit:
Malware designed to modify operations of the
operating system
to facilitate
non-standard functionality
Hard
to
detect
and
attacks
at the
operating system
level
Keylogger
:
Software
that logs every
keystroke
of an
end user
Adware:
Software
supported by
advertising
Some adware is
legal
and
legitimate
, where users agree to see
ads
in
exchange
for
reduced costs
Can also be a form of
malware
that presents
unwanted
ads, posing a
security threat
Spyware
:
Malware
that
spies
on
user activity
and
reports stolen information
Bots
:
Software
that performs
tasks
under the
control
of another
program
Remote-Access Trojan
(
RAT
):
Toolkit
designed to gain
unauthorized access
to the
targeted system
Logic Bomb
:
Deliberately installed software that
remains dormant
until triggered by an
event
, like a specific
date
or
time
, to execute its malicious payload
Often used when an employee
leaves
a company
Backdoor
:
Installed after gaining
unauthorized access
to a system
Ensures attackers can
regain entry
if their
initial access
is
discovered