Explore tens of thousands of sets crafted by our community.
Common Malware Types
15
Flashcards
0/15
Trojan
Disguises itself as legitimate software to trick users into executing it. Unlike viruses and worms, it does not replicate itself. Example: Zeus Trojan.
Ransomware
Malware that encrypts the victim's files and demands payment for the decryption key. Example: CryptoLocker.
Spyware
Designed to spy on the user's actions without consent and report back to the author. It can steal sensitive information. Example: CoolWebSearch.
Botnet
A network of private computers infected with malicious software and controlled as a group. Example: Mirai Botnet.
Exploit Kit
Software tools that run on servers and identify vulnerable computers to spread malware. Example: Angler Exploit Kit.
Virus
A type of malware that attaches itself to clean files and spreads to other files. It can only spread when the infected file is executed. Example: ILOVEYOU virus.
Keylogger
Records the user's keystrokes on a keyboard and transmits this information to a malicious party. Example: HawkEye Keylogger.
Adware
Automatically delivers advertisements. It can be intrusive and sometimes covertly installed. Example: Adware.BrowseFox.
Fileless Malware
A type of malicious activity that uses native, legitimate tools built into a system to execute a cyber attack. It leaves no footprint and is memory-based. Example: APT38’s fileless attack.
Dropper
A small piece of software that installs a malware payload onto a target system. Example: StarDust Dropper used to spread the Stardust botnet.
Logic Bomb
A malicious program that is triggered by a specific event or condition, such as a date. Example: The triggered event of a logic bomb in Da Vinci Virus.
Rogue Security Software
Masquerades as legitimate security software and claims that the computer is infected with viruses, tricking the user into paying for fake removal tools. Example: WinFixer.
Worm
Malware that spreads across networks and devices without needing to attach itself to a host file. It exploits vulnerabilities or uses trickery to copy itself onto other computers. Example: WannaCry.
Backdoor
Malware that bypasses normal authentication procedures to access a system, allowing remote control of the computer. Example: Back Orifice.
Rootkit
Designed to grant unauthorized root level or administrative access to a computer, often hiding the existence of other malware. Example: Stuxnet.
© Hypatia.Tech. 2024 All rights reserved.