We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
What is Malware?
Malware, or malicious software, encompasses a wide range of programs
designed to harm computer systems and their users. This guide will delve into six common types of malware, providing definitions, explanations, and real- world examples of each. Type of Name Example A Example B Example C Malware Viruses are The "I LOVE The "Melissa" The "Code self- YOU" virus, virus spread Red" worm, Viruses replicating also known as through which programs that the "Love Microsoft exploited a attach Letter" virus, Word vulnerability themselves to spread documents in in Microsoft other files, through email 1999. It would IIS web server spreading attachments automatically in 2001. It through the in 2000. send itself to spread network by Disguised as the first 50 rapidly, infecting a love letter, contacts in infecting other the virus the user's thousands of programs or exploited a address book, servers and files. They vulnerability overwhelming causing can corrupt in Microsoft email servers widespread data, disrupt Outlook, and causing denial-of- system allowing it to widespread service operations, replicate and disruption. attacks. and even spread steal sensitive rapidly. It information. caused widespread damage by deleting files and corrupting data on infected systems. Worms are Stuxnet was a Conficker was Mydoom was self- sophisticated a worm that a worm that Worms replicating worm spread rapidly spread rapidly programs that discovered in in 2008, in 2004, spread 2010 that exploiting exploiting through targeted vulnerabilities vulnerabilities networks industrial inMicrosoft in Microsoft without control Windows. It Outlook and requiring user systems. It infected other email interaction. was designed millions of clients. It They can to disrupt the computers caused exploit operation of worldwide, widespread vulnerabilities centrifuges causing email in network used in Iran's network disruption protocols or nuclear disruption and slowed operating program, and making it down internet systems to demonstratin difficult for traffic. propagate g the users to themselves, potential for access their often causing worms to systems. network cause disruptions, significant data loss, or real-world system damage. crashes. Trojans are Emotet is a Zeus was a DarkComet is malicious notorious sophisticated a remote Trojans programs that Trojan that Trojan that access Trojan disguise has been targeted (RAT) that themselves as used in online allows legitimate various banking attackers to software. attacks, systems. It control They often including could steal infected trick users phishing login computers into installing campaigns credentials, remotely. It them by and malware track can be used offering distribution. It keystrokes, to steal data, desirable can steal and even launch features or banking transfer funds attacks, and functionalities credentials, from victims' even monitor . Once spread accounts. thevictim's installed, ransomware, activity. Trojans can and even steal data, launch denial- grant of-service attackers’ attacks. remote access to the system, or even launch other malicious programs. Adware is Gator was a Bundled "Search- software that notorious software is a redirect" Adware displays adware common adware can unwanted program that method for change a advertisemen plagued users adware user's default ts on a user's in the early distribution. search engine computer. It 2000s. It was Free software or redirect often comes known for its often comes their web bundled with aggressive bundled with searches to free software pop-up ads adware, malicious or is installed and deceptive which is websites. It without the marketing installed can also user's practices, without the display knowledge. often tricking user's unwanted ads Adware can users into knowledge. on web pages be intrusive, installing it Users may and search slow down with other not realize results. system software they are performance, installing and even adware until redirect users they start to malicious seeing websites. unwanted ads on their computer. Spyware is Darkhotel is a Keyloggers "Screen malicious sophisticated are a capture" Spyware software spyware common type spyware can designed to campaign of spyware take secretly that targeted that records screenshots monitor and high-profile every of a user's collect individuals in keystroke a computer information luxury hotels. user makes. screen from user's It exploited This without their computer. It hotel Wi-Fi information knowledge. can track networks to can be used This keystrokes, infect devices to steal information record and steal passwords, can be used browsing sensitive credit card to monitor history, steal information, numbers, and their activity, passwords, including other steal sensitive and even financial data sensitive data, or even capture and business data. blackmail screenshots. secrets. them. Spyware can be used for various purposes, including identity theft, financial fraud, and corporate espionage.
Ransomware WannaCry Ryuk is a Crypto Locker
is a type of was a global ransomware was a Ransomware malware that ransomware strain that ransomware encrypts a attack that targets strain that user's files spread rapidly enterprise emerged in and demands in 2017, environments. 2013. It used a ransom exploiting a It is known for strong payment for vulnerability its high encryption their in Microsoft ransom algorithms to decryption. It Windows. It demands and encrypt can target infected its ability to victims' files individuals, hundreds of spread and businesses, thousands of quickly demanded a and even computers through ransom governments, worldwide, networks. payment for causing encrypting decryption. significant files and financial demanding losses and ransom disruption. payments in Bitcoin.