Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Common Malware Types

15

Flashcards

0/15

Still learning
StarStarStarStar

Trojan

StarStarStarStar

Disguises itself as legitimate software to trick users into executing it. Unlike viruses and worms, it does not replicate itself. Example: Zeus Trojan.

StarStarStarStar

Ransomware

StarStarStarStar

Malware that encrypts the victim's files and demands payment for the decryption key. Example: CryptoLocker.

StarStarStarStar

Spyware

StarStarStarStar

Designed to spy on the user's actions without consent and report back to the author. It can steal sensitive information. Example: CoolWebSearch.

StarStarStarStar

Botnet

StarStarStarStar

A network of private computers infected with malicious software and controlled as a group. Example: Mirai Botnet.

StarStarStarStar

Exploit Kit

StarStarStarStar

Software tools that run on servers and identify vulnerable computers to spread malware. Example: Angler Exploit Kit.

StarStarStarStar

Virus

StarStarStarStar

A type of malware that attaches itself to clean files and spreads to other files. It can only spread when the infected file is executed. Example: ILOVEYOU virus.

StarStarStarStar

Keylogger

StarStarStarStar

Records the user's keystrokes on a keyboard and transmits this information to a malicious party. Example: HawkEye Keylogger.

StarStarStarStar

Adware

StarStarStarStar

Automatically delivers advertisements. It can be intrusive and sometimes covertly installed. Example: Adware.BrowseFox.

StarStarStarStar

Fileless Malware

StarStarStarStar

A type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. It leaves no footprint and is memory-based. Example: APT38’s fileless attack.

StarStarStarStar

Dropper

StarStarStarStar

A small piece of software that installs a malware payload onto a target system. Example: StarDust Dropper used to spread the Stardust botnet.

StarStarStarStar

Logic Bomb

StarStarStarStar

A malicious program that is triggered by a specific event or condition, such as a date. Example: The triggered event of a logic bomb in Da Vinci Virus.

StarStarStarStar

Rogue Security Software

StarStarStarStar

Masquerades as legitimate security software and claims that the computer is infected with viruses, tricking the user into paying for fake removal tools. Example: WinFixer.

StarStarStarStar

Worm

StarStarStarStar

Malware that spreads across networks and devices without needing to attach itself to a host file. It exploits vulnerabilities or uses trickery to copy itself onto other computers. Example: WannaCry.

StarStarStarStar

Backdoor

StarStarStarStar

Malware that bypasses normal authentication procedures to access a system, allowing remote control of the computer. Example: Back Orifice.

StarStarStarStar

Rootkit

StarStarStarStar

Designed to grant unauthorized root level or administrative access to a computer, often hiding the existence of other malware. Example: Stuxnet.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.