This document defines and describes different types of malicious software including viruses, worms, Trojan horses, ransomware, rootkits, backdoors, spyware, botnets, keyloggers, dialers, grayware, and adware. It explains how each type works, what targets it aims for, and provides examples of specific malware for each type.
This document defines and describes different types of malicious software including viruses, worms, Trojan horses, ransomware, rootkits, backdoors, spyware, botnets, keyloggers, dialers, grayware, and adware. It explains how each type works, what targets it aims for, and provides examples of specific malware for each type.
This document defines and describes different types of malicious software including viruses, worms, Trojan horses, ransomware, rootkits, backdoors, spyware, botnets, keyloggers, dialers, grayware, and adware. It explains how each type works, what targets it aims for, and provides examples of specific malware for each type.
software deleting files, a type of malware deleting the that can be operating system, introduced into disabling data the code of other storage programs, system structures, memory areas, Strorm, Sasser, Viruses disrupting boot sectors and Melissa network distribute copies structures, of itself through stealing personal various data, extortion, communication blocking users' channels. work, etc. A computer worm is a self- replicating computer program similar to a computer virus. The main difference is that the virus needs a File infection and Code Read, Code Worms host. In addition further spread Reed II, Stuxnet to replication, a worm can have additional procedures built in, such as destroying the file system or sending mail. Trojan Horses a type of malware collection of HookDump, Back that infiltrates a information about Orifice, Pinch, computer under bank cards, TDL-4, the guise of transfer of this Trojan.Winlock. legitimate information to an software attacker, as well as use, deletion or malicious modification, disruption of computer performance, use of computer resources for mining, use of IP for illegal trade. a type of malicious software designed to extortion, blocking access to a computer system or blocks access to Win32.Cryzip / preventing the the computer Gpcode / Rector / data written on it system or Ransomware Xorist; from being read prevents reading WannaCry 2.0; (often using the data recorded Petya; Bad Rabbit encryption in it methods), and then demanding a ransom from the victim to restore it to its original state. Rootkit allows an attacker to gain a masking objects foothold in a (processes, files, compromised directories, system and hide drivers); traces of their management TDSS, Alureon, Rootkits activities by (events occurring Olmarik, Tidserv hiding files, in the system); processes, and the collection of data very presence of (system the rootkit in the parameters). system. an algorithm defect that is intentionally built into it by the developer and secret and quick allows access to data, in Sticky Attacks, Backdoors unauthorized most cases - to DoublePulsar access to data or encrypted and remote control of protected. the operating system and the computer as a whole. Spyware a program that is visited sites, Hijackers secretly installed control of on a computer for keystrokes on the the purpose of keyboard, control of screenshots of the computer full or partial monitor screen, control over the unauthorized interaction remote control between the user and management and the computer of computers by without the user's installing consent. additional programs. is a program that is secretly installed on the victim's device spamming, brute- and allows an force attacks on a Mariposa, Botnets attacker to remote system, Zeus, perform certain denial of service Bredolab actions using the attacks resources of an infected computer. intercept other is a program for Ardamax, people's secretly recording Keylogger, information, get Keyloggers information about Actual Spy, unauthorized the keys pressed EliteKeylogger, access to logins by the user. The Rat! and passwords malware designed to steal money by invoicing phone calls to premium phone numbers. The program access to phone Dialers breaks the current or modem connection, turns off the modem speaker, dials up to the toll line phone number stored in it Grayware is a term used to manipulation or describe deletion of files computer or technical programs that hacking of perform security software unwanted and and other security possibly harmful devices functions by the user. Since the user usually does not tolerate malware, malicious functions are usually disguised or software runs completely invisible in the background a virus that displays ads on the device collects (mainly in Adware information about Movieland browsers). This the user virus is not so much harmful as it is annoying.