0% found this document useful (0 votes)
20 views4 pages

Mal Ware

Uploaded by

khiahnreicamba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views4 pages

Mal Ware

Uploaded by

khiahnreicamba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

What is Malware?

Malware, or malicious software, encompasses a wide range of programs


designed to harm computer systems and their users. This guide will delve into
six common types of malware, providing definitions, explanations, and real-
world examples of each.
Type of Name Example A Example B Example C
Malware
Viruses are The "I LOVE The "Melissa" The "Code
self- YOU" virus, virus spread Red" worm,
Viruses replicating also known as through which
programs that the "Love Microsoft exploited a
attach Letter" virus, Word vulnerability
themselves to spread documents in in Microsoft
other files, through email 1999. It would IIS web server
spreading attachments automatically in 2001. It
through the in 2000. send itself to spread
network by Disguised as the first 50 rapidly,
infecting a love letter, contacts in infecting
other the virus the user's thousands of
programs or exploited a address book, servers and
files. They vulnerability overwhelming causing
can corrupt in Microsoft email servers widespread
data, disrupt Outlook, and causing denial-of-
system allowing it to widespread service
operations, replicate and disruption. attacks.
and even spread
steal sensitive rapidly. It
information. caused
widespread
damage by
deleting files
and
corrupting
data on
infected
systems.
Worms are Stuxnet was a Conficker was Mydoom was
self- sophisticated a worm that a worm that
Worms replicating worm spread rapidly spread rapidly
programs that discovered in in 2008, in 2004,
spread 2010 that exploiting exploiting
through targeted vulnerabilities vulnerabilities
networks industrial inMicrosoft in Microsoft
without control Windows. It Outlook and
requiring user systems. It infected other email
interaction. was designed millions of clients. It
They can to disrupt the computers caused
exploit operation of worldwide, widespread
vulnerabilities centrifuges causing email
in network used in Iran's network disruption
protocols or nuclear disruption and slowed
operating program, and making it down internet
systems to demonstratin difficult for traffic.
propagate g the users to
themselves, potential for access their
often causing worms to systems.
network cause
disruptions, significant
data loss, or real-world
system damage.
crashes.
Trojans are Emotet is a Zeus was a DarkComet is
malicious notorious sophisticated a remote
Trojans programs that Trojan that Trojan that access Trojan
disguise has been targeted (RAT) that
themselves as used in online allows
legitimate various banking attackers to
software. attacks, systems. It control
They often including could steal infected
trick users phishing login computers
into installing campaigns credentials, remotely. It
them by and malware track can be used
offering distribution. It keystrokes, to steal data,
desirable can steal and even launch
features or banking transfer funds attacks, and
functionalities credentials, from victims' even monitor
. Once spread accounts. thevictim's
installed, ransomware, activity.
Trojans can and even
steal data, launch denial-
grant of-service
attackers’ attacks.
remote
access to the
system, or
even launch
other
malicious
programs.
Adware is Gator was a Bundled "Search-
software that notorious software is a redirect"
Adware displays adware common adware can
unwanted program that method for change a
advertisemen plagued users adware user's default
ts on a user's in the early distribution. search engine
computer. It 2000s. It was Free software or redirect
often comes known for its often comes their web
bundled with aggressive bundled with searches to
free software pop-up ads adware, malicious
or is installed and deceptive which is websites. It
without the marketing installed can also
user's practices, without the display
knowledge. often tricking user's unwanted ads
Adware can users into knowledge. on web pages
be intrusive, installing it Users may and search
slow down with other not realize results.
system software they are
performance, installing
and even adware until
redirect users they start
to malicious seeing
websites. unwanted ads
on their
computer.
Spyware is Darkhotel is a Keyloggers "Screen
malicious sophisticated are a capture"
Spyware software spyware common type spyware can
designed to campaign of spyware take
secretly that targeted that records screenshots
monitor and high-profile every of a user's
collect individuals in keystroke a computer
information luxury hotels. user makes. screen
from user's It exploited This without their
computer. It hotel Wi-Fi information knowledge.
can track networks to can be used This
keystrokes, infect devices to steal information
record and steal passwords, can be used
browsing sensitive credit card to monitor
history, steal information, numbers, and their activity,
passwords, including other steal sensitive
and even financial data sensitive data, or even
capture and business data. blackmail
screenshots. secrets. them.
Spyware can
be used for
various
purposes,
including
identity theft,
financial
fraud, and
corporate
espionage.

Ransomware WannaCry Ryuk is a Crypto Locker


is a type of was a global ransomware was a
Ransomware malware that ransomware strain that ransomware
encrypts a attack that targets strain that
user's files spread rapidly enterprise emerged in
and demands in 2017, environments. 2013. It used
a ransom exploiting a It is known for strong
payment for vulnerability its high encryption
their in Microsoft ransom algorithms to
decryption. It Windows. It demands and encrypt
can target infected its ability to victims' files
individuals, hundreds of spread and
businesses, thousands of quickly demanded a
and even computers through ransom
governments, worldwide, networks. payment for
causing encrypting decryption.
significant files and
financial demanding
losses and ransom
disruption. payments in
Bitcoin.

You might also like