Changes

696 bytes added ,  2 years ago
Line 1: Line 1:  
'''Malware''', an abbreviated version of malicious software, is "software designed specifically to damage or disrupt a system."<ref>[http://www.webopedia.com/TERM/M/malware.html Malware] at Webopedia</ref> Malware remains a major security threat for Internet users.
 
'''Malware''', an abbreviated version of malicious software, is "software designed specifically to damage or disrupt a system."<ref>[http://www.webopedia.com/TERM/M/malware.html Malware] at Webopedia</ref> Malware remains a major security threat for Internet users.
   −
==Common Examples of Malware==
+
==Common Types of Malware based on Purpose==
*'''Adware''': This software is responsible for undesired pop-ups and other kinds of aggressive advertisements.<ref name="vera">[http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Common Malware Types: Cybersecurity 101] (October 12, 2012), Veracode</ref><ref>[http://en.wikipedia.org/wiki/Adware Adware] at Wikipedia</ref>  
+
*'''Adware''': This software is responsible for u'''ndesired pop-ups and other kinds of aggressive advertisements'''.<ref name="vera">[http://www.veracode.com/blog/2012/10/common-malware-types-cybersecurity-101/ Common Malware Types: Cybersecurity 101] (October 12, 2012), Veracode</ref><ref>[http://en.wikipedia.org/wiki/Adware Adware] at Wikipedia</ref>  
   −
*'''Bots''': This software, once installed, operates based on orders given from an outside party, such as a hacker.<ref name="vera"/> While bots can be used for harmless purposes, they can also create large security threats if programmed to "infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices."<ref name="cisco">[http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html What Is the Difference: Viruses, Worms, Trojans, and Bots?], Cisco Systems</ref> Bots can be used in [[Botnet Attacks|botnets]], [[DDoS Attack|DDoS]], [[Spam|spam]] or [[Fast Flux|fast flux]] attacks. Botnets have become an increasing problem in recent years, and individuals with compromised computers may not be aware they are infected.<ref>[http://www.fbi.gov/news/news_blog/botnets-101 Botnets 101: What They Are and How to Avoid Them] (June 5, 2013), Federal Bureau of Investigation</ref>
+
*'''Bots''': This software, once installed, '''operates based on orders given from an outside party''', such as a hacker.<ref name="vera"/> While bots can be used for harmless purposes, they can also create large security threats if programmed to "infect a host and connect back to a central server or servers that act as a command and control (C&C) center for an entire network of compromised devices."<ref name="cisco">[http://www.cisco.com/web/about/security/intelligence/virus-worm-diffs.html What Is the Difference: Viruses, Worms, Trojans, and Bots?], Cisco Systems</ref> Bots can be used in [[Botnet Attacks|botnets]], [[DDoS Attack|DDoS]], [[Spam|spam]] or [[Fast Flux|fast flux]] attacks. Botnets have become an increasing problem in recent years, and individuals with compromised computers may not be aware they are infected.<ref>[http://www.fbi.gov/news/news_blog/botnets-101 Botnets 101: What They Are and How to Avoid Them] (June 5, 2013), Federal Bureau of Investigation</ref>
   −
*'''Ransomware''': this allows a malicious third party to essentially stop users from accessing their computers, often by locking the users' system or encrypting files, until a specified amount of money is paid.<ref name="micro ransom">[http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx Ransomware], Microsoft Malware Protection Center</ref><ref name="vera"/> Sometimes attackers using ransomware will pose as legitimate authorities.<ref name="micro ransom"/> McAfee security observed a large increase in ransomware in 2012 with 200,000 new versions of it found per quarter.<ref name=state>[http://www.scmagazine.com/the-state-of-malware-2013/slideshow/1255/#5 The state of malware 2013], ''SC Magazine''</ref>
+
*'''Ransomware''': this allows a malicious '''third party to essentially stop users from accessing their computers, often by locking the users' system or encrypting files, until a specified amount of money is paid'''.<ref name="micro ransom">[http://www.microsoft.com/security/portal/mmpc/shared/ransomware.aspx Ransomware], Microsoft Malware Protection Center</ref><ref name="vera"/> Sometimes attackers using ransomware will pose as legitimate authorities.<ref name="micro ransom"/> McAfee security observed a large increase in ransomware in 2012 with 200,000 new versions of it found per quarter.<ref name=state>[http://www.scmagazine.com/the-state-of-malware-2013/slideshow/1255/#5 The state of malware 2013], ''SC Magazine''</ref>
   −
*'''Spyware''': this software monitors the user's activities and then sends the information to other "interest parties."<ref>[http://ist.mit.edu/security/malware Viruses, Spyware, and Malware], Information Systems and Technology</ref> Spyware can track a user's Internet history, log keystrokes, and steal data.<ref name="vera"/> A recent Kindsight Security Report indicated that spyware is also targeting and spreading to mobile devices.<ref>[http://www.kindsight.net/sites/default/files/Kindsight-Q2-2013-Malware-Report.pdf Kindsight security Labs MaLware report – Q2 2013] (PDF), Kindsight</ref>
+
*'''Spyware''': this software '''monitors the user's activities and then sends the information to other "interest parties."'''<ref>[http://ist.mit.edu/security/malware Viruses, Spyware, and Malware], Information Systems and Technology</ref> Spyware can track a user's Internet history, log keystrokes, and steal data.<ref name="vera"/> A recent Kindsight Security Report indicated that spyware is also targeting and spreading to mobile devices.<ref>[http://www.kindsight.net/sites/default/files/Kindsight-Q2-2013-Malware-Report.pdf Kindsight security Labs MaLware report – Q2 2013] (PDF), Kindsight</ref>
   −
*'''Trojans''': trojans or trojan horses are a fairly well known classification of malware. They disguise themselves as harmless files and downloads; however, after they are installed, they can severely hobble a computer or system by creating backdoors or distributing other malware.<ref name="cisco"/> Trojans can also harvest personal data, change files and settings, or allow a hacker to control the computer.<ref name="vera"/>
+
*'''Trojans'''/'''Backdoors''': trojans or trojan horses are a fairly well-known classification of malware. They disguise themselves as harmless files and downloads; however, after they are installed, they can severely hobble a computer or system by creating backdoors or distributing other malware.<ref name="cisco"/> Trojans can also harvest personal data, change files and settings, or allow a hacker to control the computer.<ref name="vera"/>
   −
*'''Viruses''': this type of malware can spread from system to system, often by using infected attachments.<ref name="vera"/> Unlike some of the other kinds of malware listed, viruses can copy themselves or insert themselves into other programs.<ref name="cisco"/>
+
*'''Viruses''': this type of malware can '''spread from system to system''', often by using infected attachments.<ref name="vera"/> Unlike some of the other kinds of malware listed, viruses can copy themselves or insert themselves into other programs.<ref name="cisco"/>
   −
*'''Worms''': this malware can also replicate itself and does not "require a host program or human help to propagate."<ref name="cisco"/> Worms often use system vulnerabilities to infect computers or networks.<ref name="cisco"/>
+
*'''Worms''': this malware can also '''replicate itself''' and does not "require a host program or human help to propagate."<ref name="cisco"/> Worms often use system vulnerabilities to infect computers or networks.<ref name="cisco"/>
 +
 
 +
*'''Credential Stealers''': access, copy, or '''steal authentication credentials'''.<ref>[https://content.fireeye.com/m-trends/rpt-m-trends-2021 Malware Families by Category, M-Trends 2021, pg. 22</ref>
 +
 
 +
*'''Downloader''': A program whose purpose is to download (and launch) a file from a specified address.
 +
 
 +
*'''Dropper''': A program whose purpose is to '''extract, install, and launch or execute''' one or more files.
 +
 
 +
*'''Launcher''': '''executes or loads one or more files''' but does not contain or configure them.
 +
 
 +
*'''Keyloggers''':
 +
 
 +
*'''Point of sale (POS)''':
 +
 
 +
*'''[[DNS Tunneling|Tunnelers''': 
 +
 
 +
*'''Data Miners''':
    
==Public Perception==  
 
==Public Perception==  
Bureaucrats, Check users, lookupuser, Administrators, translator
14,932

edits