Line 1: |
Line 1: |
| '''Malware''', an abbreviated version of malicious software, is "software designed specifically to damage or disrupt a system."<ref>[http://www.webopedia.com/TERM/M/malware.html Malware] at Webopedia</ref> Malware remains a major security threat for Internet users. | | '''Malware''', an abbreviated version of malicious software, is "software designed specifically to damage or disrupt a system."<ref>[http://www.webopedia.com/TERM/M/malware.html Malware] at Webopedia</ref> Malware remains a major security threat for Internet users. |
| | | |
− | ==Common Examples of Malware== | + | ==Common Types of Malware based on Purpose== |
− | *'''Adware''': This software is responsible for undesired pop-ups and other kinds of aggressive advertisements.<ref name="vera">[http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Common Malware Types: Cybersecurity 101] (October 12, 2012), Veracode</ref><ref>[http://en.wikipedia.org/wiki/Adware Adware] at Wikipedia</ref> | + | *'''Adware''': This software is responsible for u'''ndesired pop-ups and other kinds of aggressive advertisements'''.<ref name="vera">[http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Common Malware Types: Cybersecurity 101] (October 12, 2012), Veracode</ref><ref>[http://en.wikipedia.org/wiki/Adware Adware] at Wikipedia</ref> |
| | | |
− | *'''Bots''': This software, once installed, operates based on orders given from an outside party, such as a hacker.<ref name="vera"/> While bots can be used for harmless purposes, they can also create large security threats if programmed to "infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices."<ref name="cisco">[http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html What Is the Difference: Viruses, Worms, Trojans, and Bots?], Cisco Systems</ref> Bots can be used in [[Botnet Attacks|botnets]], [[DDoS Attack|DDoS]], [[Spam|spam]] or [[Fast Flux|fast flux]] attacks. Botnets have become an increasing problem in recent years, and individuals with compromised computers may not be aware they are infected.<ref>[http://www.fbi.gov/news/news_blog/botnets-101 Botnets 101: What They Are and How to Avoid Them] (June 5, 2013), Federal Bureau of Investigation</ref> | + | *'''Bots''': This software, once installed, '''operates based on orders given from an outside party''', such as a hacker.<ref name="vera"/> While bots can be used for harmless purposes, they can also create large security threats if programmed to "infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices."<ref name="cisco">[http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html What Is the Difference: Viruses, Worms, Trojans, and Bots?], Cisco Systems</ref> Bots can be used in [[Botnet Attacks|botnets]], [[DDoS Attack|DDoS]], [[Spam|spam]] or [[Fast Flux|fast flux]] attacks. Botnets have become an increasing problem in recent years, and individuals with compromised computers may not be aware they are infected.<ref>[http://www.fbi.gov/news/news_blog/botnets-101 Botnets 101: What They Are and How to Avoid Them] (June 5, 2013), Federal Bureau of Investigation</ref> |
| | | |
− | *'''Ransomware''': this allows a malicious third party to essentially stop users from accessing their computers, often by locking the users' system or encrypting files, until a specified amount of money is paid.<ref name="micro ransom">[http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx Ransomware], Microsoft Malware Protection Center</ref><ref name="vera"/> Sometimes attackers using ransomware will pose as legitimate authorities.<ref name="micro ransom"/> McAfee security observed a large increase in ransomware in 2012 with 200,000 new versions of it found per quarter.<ref name=state>[http://www.scmagazine.com/the-state-of-malware-2013/slideshow/1255/#5 The state of malware 2013], ''SC Magazine''</ref> | + | *'''Ransomware''': this allows a malicious '''third party to essentially stop users from accessing their computers, often by locking the users' system or encrypting files, until a specified amount of money is paid'''.<ref name="micro ransom">[http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx Ransomware], Microsoft Malware Protection Center</ref><ref name="vera"/> Sometimes attackers using ransomware will pose as legitimate authorities.<ref name="micro ransom"/> McAfee security observed a large increase in ransomware in 2012 with 200,000 new versions of it found per quarter.<ref name=state>[http://www.scmagazine.com/the-state-of-malware-2013/slideshow/1255/#5 The state of malware 2013], ''SC Magazine''</ref> |
| | | |
− | *'''Spyware''': this software monitors the user's activities and then sends the information to other "interest parties."<ref>[http://ist.mit.edu/security/malware Viruses, Spyware, and Malware], Information Systems and Technology</ref> Spyware can track a user's Internet history, log keystrokes, and steal data.<ref name="vera"/> A recent Kindsight Security Report indicated that spyware is also targeting and spreading to mobile devices.<ref>[http://www.kindsight.net/sites/default/files/Kindsight-Q2-2013-Malware-Report.pdf Kindsight security Labs MaLware report – Q2 2013] (PDF), Kindsight</ref> | + | *'''Spyware''': this software '''monitors the user's activities and then sends the information to other "interest parties."'''<ref>[http://ist.mit.edu/security/malware Viruses, Spyware, and Malware], Information Systems and Technology</ref> Spyware can track a user's Internet history, log keystrokes, and steal data.<ref name="vera"/> A recent Kindsight Security Report indicated that spyware is also targeting and spreading to mobile devices.<ref>[http://www.kindsight.net/sites/default/files/Kindsight-Q2-2013-Malware-Report.pdf Kindsight security Labs MaLware report – Q2 2013] (PDF), Kindsight</ref> |
| | | |
− | *'''Trojans''': trojans or trojan horses are a fairly well known classification of malware. They disguise themselves as harmless files and downloads; however, after they are installed, they can severely hobble a computer or system by creating backdoors or distributing other malware.<ref name="cisco"/> Trojans can also harvest personal data, change files and settings, or allow a hacker to control the computer.<ref name="vera"/> | + | *'''Trojans'''/'''Backdoors''': trojans or trojan horses are a fairly well-known classification of malware. They disguise themselves as harmless files and downloads; however, after they are installed, they can severely hobble a computer or system by creating backdoors or distributing other malware.<ref name="cisco"/> Trojans can also harvest personal data, change files and settings, or allow a hacker to control the computer.<ref name="vera"/> |
| | | |
− | *'''Viruses''': this type of malware can spread from system to system, often by using infected attachments.<ref name="vera"/> Unlike some of the other kinds of malware listed, viruses can copy themselves or insert themselves into other programs.<ref name="cisco"/> | + | *'''Viruses''': this type of malware can '''spread from system to system''', often by using infected attachments.<ref name="vera"/> Unlike some of the other kinds of malware listed, viruses can copy themselves or insert themselves into other programs.<ref name="cisco"/> |
| | | |
− | *'''Worms''': this malware can also replicate itself and does not "require a host program or human help to propagate."<ref name="cisco"/> Worms often use system vulnerabilities to infect computers or networks.<ref name="cisco"/> | + | *'''Worms''': this malware can also '''replicate itself''' and does not "require a host program or human help to propagate."<ref name="cisco"/> Worms often use system vulnerabilities to infect computers or networks.<ref name="cisco"/> |
| + | |
| + | *'''Credential Stealers''': access, copy, or '''steal authentication credentials'''.<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Malware Families by Category, M-Trends 2021, pg. 22</ref> |
| + | |
| + | *'''Downloader''': A program whose purpose is to download (and launch) a file from a specified address. |
| + | |
| + | *'''Dropper''': A program whose purpose is to '''extract, install, and launch or execute''' one or more files. |
| + | |
| + | *'''Launcher''': '''executes or loads one or more files''' but does not contain or configure them. |
| + | |
| + | *'''Keyloggers''': |
| + | |
| + | *'''Point of sale (POS)''': |
| + | |
| + | *'''[[DNS Tunneling|Tunnelers''': |
| + | |
| + | *'''Data Miners''': |
| | | |
| ==Public Perception== | | ==Public Perception== |