Type of Malwares

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Malware

Explanation
Type
A type of malicious software that attaches itself to legitimate programs or files and spreads by
Virus
infecting other files. It can cause damage, steal data, or disrupt system functionality.
A self-replicating malware that spreads across computer networks without the need for human
Worm interaction. It can exploit security vulnerabilities to infect multiple systems and can consume
network resources, causing performance issues.
Malware that disguises itself as a legitimate program or file to trick users into executing it. Once
Trojan Horse activated, it can perform various malicious activities, such as stealing data, damaging files, or
providing unauthorized access to a system.
A type of malware that encrypts a user's files or locks their system, making them inaccessible.
Ransomware The attacker demands a ransom to restore the files or unlock the system, often using
cryptocurrency for payment.
Malware that secretly monitors and gathers information about a user's activities without their
Spyware knowledge or consent. It can capture keystrokes, track browsing habits, steal sensitive data, and
transmit it to third parties without the user's authorization.
Software that displays unwanted advertisements on a user's computer, typically in the form of
Adware pop-up windows or banners. While not directly harmful, it can be intrusive, degrade system
performance, and compromise user privacy.
Malware that records and tracks keystrokes entered by a user on their keyboard. It can capture
Keylogger sensitive information, such as passwords, credit card details, or personal messages, and transmit
it to malicious actors who can exploit the data for illicit purposes.
A type of malware designed to gain privileged access and control over a computer or network
Rootkit without being detected. It can hide its presence, manipulate system components, and provide
unauthorized access to attackers, making it difficult to detect and remove.
A network of compromised computers, often referred to as "zombies" or "bots," that are under
the control of a central command-and-control (C&C) server. Botnets can be used to carry out
Botnet
coordinated cyber-attacks, distribute spam emails, or participate in distributed denial-of-service
(DDoS) attacks.
Malicious code that lies dormant within a computer system until triggered by a specific event or
Logic Bomb condition. Once activated, it can execute destructive actions, such as deleting files, corrupting
data, or disrupting system functionality.
An attack where users are redirected to a fake website that appears legitimate, usually through
Pharming DNS hijacking or DNS poisoning. The purpose is to steal sensitive information, such as login
credentials or financial details, by tricking users into providing them on the fake site.
Malware that operates directly in a computer's memory without leaving traces on the hard drive.
Fileless
It can exploit vulnerabilities in system processes or applications, making it difficult to detect and
Malware
remove using traditional antivirus or anti-malware tools.

Spyware vs. Keylogger:

 Spyware: Spyware is a type of malware that secretly monitors and gathers information about a user's
activities without their knowledge or consent. It can be installed on a computer through malicious
downloads, email attachments, or by exploiting security vulnerabilities. Spyware can track a user's
browsing habits, capture keystrokes, record login credentials, and collect sensitive information such as
credit card details. The collected data is often transmitted to third parties without the user's
authorization. Spyware is designed to operate covertly and can compromise user privacy and security.
 Keylogger: A keylogger is a specific type of spyware that focuses on recording and tracking keystrokes
entered by a user on their keyboard. It can capture every key pressed, including passwords, usernames,
messages, and other sensitive information. Keyloggers can be delivered through malicious downloads,
email attachments, or by exploiting vulnerabilities. The captured data is typically stored locally or sent
to the attacker, who can then use it for unauthorized access or other malicious purposes. Keyloggers can
be either software-based or hardware-based.

The main difference between spyware and keyloggers lies in their functionality and scope. While spyware is a
broader term encompassing various types of malware that covertly monitor user activities, a keylogger
specifically focuses on capturing keystrokes.

Virus vs. Worm:

 Virus: A virus is a type of malicious software that infects legitimate programs or files by attaching itself
to them. It spreads by replicating and attaching to other files, often through sharing infected files or
executing infected code. Viruses can cause harm by damaging or corrupting files, stealing data, or
disrupting system functionality. They typically require human interaction, such as opening an infected
file or running an infected program, to initiate their spread.
 Worm: A worm, on the other hand, is a self-replicating type of malware that can spread across computer
networks without requiring human interaction. It exploits vulnerabilities in computer systems, network
protocols, or software applications to automatically infect other systems connected to the network.
Worms can spread rapidly and consume network resources, causing performance issues. Unlike viruses,
worms can propagate themselves without the need to attach to files or programs.

The key distinction between viruses and worms is their method of spreading and replicating. Viruses rely on
human actions to propagate, while worms can spread automatically and independently through network
connections.

In summary, spyware and keyloggers differ in their focus, with spyware being a broader term for covertly
monitoring user activities and keyloggers specifically capturing keystrokes. Viruses and worms differ in their
propagation methods, with viruses requiring human interaction to spread through infected files and programs,
while worms can self-replicate and spread through network connections.

You might also like