|
Common malware types | Primary characteristics |
|
Virus | Most common and well-known malware |
Attaches itself to other programs to replicate |
|
Worm | Spreads by using computer network |
Allows unauthorized access |
Often opens backdoor in the victim system |
|
Trojan Horse | Appears to be a normal program, but it is not |
Can open backdoors |
Can cause unauthorized access |
Can send critical information to the third party |
|
Backdoor | Bypasses traditional security mechanisms |
Opens system to remote access |
Usually installed by using Trojans and worms |
Used by viruses and worms for complex attacks |
|
Rootkit | Provides administrator-level access |
Hides their files from the operating system |
Can combine with other malware |
|
Ransomware | Encrypts the data on infected system |
Victim needs to pay ransom to view the data |
|
Spyware | Collects victim’s sensitive information and sends them to third parties |
Commonly used to access credit card information or to identify user habits |
|
Obfuscated malware | Can be any type of malware |
Uses obfuscation techniques to make detection process more difficult |
|