What is Malware And Different Kinds Of Malware?

 Malware and its types:

It is also known as malicious software. It includes a wide range of software that has malicious intent. Malware is not the software that users knowingly purchase or download and install. It is important to realize that there are several different types of malware that are discussed below

Virus:
Virus is the malicious code that attaches itself to the host application. The host application must be executed to run, and the malicious code executes when the host application is executed. When the virus is activated it delivers its payload. Payload might delete files, cause random reboots, join the computer to botnet or enable backdoor.

Worms:
Worm is self-replicating malware that travels throughout a network without the assistance of host application or user interaction. A worm resides in memory and can use different transport protocol to travel over the network. Worms can replicate themselves hundreds of times and spread to all the system in the network.

Logic Bomb:
Logic bomb is the string of code embedded into an application or script that will execute in response to an event. The event might be a specific date or time, or a user action such as when a user launches a specific program.

Backdoors:
Backdoor provides another way of accessing a system, similar to how a backdoor in a house provides another method of entry. Malware often installs backdoors on systems to bypass normal authentication methods.

Trojan:
Trojan also known as Trojan horse, looks like something beneficial, but it’s actually something malicious. Trojan horse can come as pirated software, a useful utility, a game, or something else that users might be noticed to download and try.

RAT:
Remote Access Trojan is a type of malware that allows attackers to take control of systems from remote locations. Once it is installed on a system attackers can then access the infected computer at any time and also can install additional malware.

Ransomware:
It is the specific type of trojan. Attackers encrypt the user’s data or take control of the computer and lock out the user. Then demand that the user pay a ransom to regain access to the data or computer.

Keylogger:
Keyloger attempts to capture a user’s keystrokes. The keystrokes are stored in a file, and are either sent to an attacker automatically, or the attacker may manually retrieve the file.

Spyware:
Spyware is a software installed on user’s systems without their awareness or consent. Its purpose is often to monitor the user’s computer and the user’s activity.

Rootkit:
It is the group of programs that hides the fact that the system has been infected or compromised by malware. Users might suspect something is wrong, but antivirus scans and other checks indicate everything is fine because the rootkit hides its running processes to avoid detection.

Comments

Popular posts from this blog

Analyzing Spear Phishing Email

Cyber Threat Intel

Advance Attacks on Network