You are on page 1of 4

Type of malicious

How it works The targets Examples


software
deleting files,
a type of malware
deleting the
that can be
operating system,
introduced into
disabling data
the code of other
storage
programs, system
structures,
memory areas, Strorm, Sasser,
Viruses disrupting
boot sectors and Melissa
network
distribute copies
structures,
of itself through
stealing personal
various
data, extortion,
communication
blocking users'
channels.
work, etc.
A computer
worm is a self-
replicating
computer
program similar
to a computer
virus. The main
difference is that
the virus needs a File infection and Code Read, Code
Worms
host. In addition further spread Reed II, Stuxnet
to replication, a
worm can have
additional
procedures built
in, such as
destroying the
file system or
sending mail.
Trojan Horses a type of malware collection of HookDump, Back
that infiltrates a information about Orifice, Pinch,
computer under bank cards, TDL-4,
the guise of transfer of this Trojan.Winlock.
legitimate information to an
software attacker, as well
as use, deletion or
malicious
modification,
disruption of
computer
performance, use
of computer
resources for
mining, use of IP
for illegal trade.
a type of
malicious
software designed
to extortion,
blocking access
to a computer
system or blocks access to
Win32.Cryzip /
preventing the the computer
Gpcode / Rector /
data written on it system or
Ransomware Xorist;
from being read prevents reading
WannaCry 2.0;
(often using the data recorded
Petya; Bad Rabbit
encryption in it
methods), and
then demanding a
ransom from the
victim to restore
it to its original
state.
Rootkit allows an
attacker to gain a masking objects
foothold in a (processes, files,
compromised directories,
system and hide drivers);
traces of their management TDSS, Alureon,
Rootkits
activities by (events occurring Olmarik, Tidserv
hiding files, in the system);
processes, and the collection of data
very presence of (system
the rootkit in the parameters).
system.
an algorithm
defect that is
intentionally built
into it by the
developer and secret and quick
allows access to data, in
Sticky Attacks,
Backdoors unauthorized most cases - to
DoublePulsar
access to data or encrypted and
remote control of protected.
the operating
system and the
computer as a
whole.
Spyware a program that is visited sites, Hijackers
secretly installed control of
on a computer for keystrokes on the
the purpose of keyboard, control
of screenshots of
the computer
full or partial
monitor screen,
control over the
unauthorized
interaction
remote control
between the user
and management
and the computer
of computers by
without the user's
installing
consent.
additional
programs.
is a program that
is secretly
installed on the
victim's device spamming, brute-
and allows an force attacks on a Mariposa,
Botnets attacker to remote system, Zeus,
perform certain denial of service Bredolab
actions using the attacks
resources of an
infected
computer.
intercept other
is a program for Ardamax,
people's
secretly recording Keylogger,
information, get
Keyloggers information about Actual Spy,
unauthorized
the keys pressed EliteKeylogger,
access to logins
by the user. The Rat!
and passwords
malware designed
to steal money by
invoicing phone
calls to premium
phone numbers.
The program
access to phone
Dialers breaks the current
or modem
connection, turns
off the modem
speaker, dials up
to the toll line
phone number
stored in it
Grayware is a term used to manipulation or
describe deletion of files
computer or technical
programs that hacking of
perform security software
unwanted and and other security
possibly harmful devices
functions by the
user. Since the
user usually does
not tolerate
malware,
malicious
functions are
usually disguised
or software runs
completely
invisible in the
background
a virus that
displays ads on
the device
collects
(mainly in
Adware information about Movieland
browsers). This
the user
virus is not so
much harmful as
it is annoying.

You might also like