Types of Malware &Their Indicators Flashcards
Ransomware
Locks users out of their files or device (typically uses encryption) until a ransom payment is made to restore access
Trojan
Piece of software that disguises itself as a legitimate application, but is malware that creates a backdoor and must be copied and installed by the user
Worms
Pieces of code that attempt to penetrate networks/computer systems that are self replicating (can spread on its own)
Potentially Unwanted Programs (PUP)
Programs that you agree to download and have an adverse effect on a computer’s security system or privacy
Fileless Virus
Malware operating in only memory that continues to run until the device is powered off
Command and Control
Attackers control a PC and use it to inject malware into other computers connected to the same network
Bots
Functioning pieces of software that performs some task under the control of another program that can be malicious
Cryptomalware
Malware that uses a system’s resources to mine cryptocurrency
Logic bombs
Piece of code (typically installed by unauthorized user) that sits dormant for a period of time until some event or date invokes its malicious payload
Spyware
Software that spies on users, recording and reporting on their activities (keystrokes, softwae, etc.)
Keyloggers
Software that logs all the keystrokes that a user enters
Remote Access Trojan (RATs)
Programs that allow covert surveillance or unauthorized access to a victim PC and mimic similar behaviors to keylogger applications
Rootkit
Designed to modify the operation of the OS by obtaining root level access
Adware
Malware that forcefully shows ads by modifying the victims system configuration
Backdoor
Used to create a converted channel for aiding adversaries that can be used to access and control the compromised system