Types Of MalwarePermalink

TrojanPermalink

A trojan is malware that is designed to look like legitimate applications. Once the application is installed the trojan can do what task it is designed to do, like install a back door. Since the user has to willingly install the application, social engineering or phishing is often used with this type of malware.

BackdoorsPermalink

This is a general term for any software or application which allows external privileged access to the system. These can lead to persistent access on the victim mahine.

WormsPermalink

This type of malware can self-replicate and spread to other systems. They can be designed to perform different actions on the victim system.

VirusPermalink

A virus attaches itself to the files on a victim system. This causes abnormal behaviour. They require user interaction to run.

RootKitsPermalink

This is designed to stay inconspicuous and covertly gather information. This can infect BIOS, bootloader, memory or applications and are very difficult to detect.

RansomwarePermalink

This encrypts the computer’s file system then requests payments to decrypt them.

APT MalwarePermalink

These are highly sophisticated and often state sponsored. They use custom-built malware to penetrate its targets.

TrickbotPermalink

  • Trojan
  • Seal sensitive user information
  • Can do web attacks, install malware and information from victims machines.
  • Developed into a worm then a malware solution then an all in one attack framework “the anchor”
  • Distributed through spam emails

SodinokibiPermalink

  • Ransomware
  • Though to be developed by APT Gold Garden
  • Uses a zip file that is downloaded.
  • Macros i the Zip will start the encryption process

mageCartPermalink

Used to steal payment information