SlideShare a Scribd company logo
1 of 1
Download to read offline
Malware 
A worm is a malware type which replicates itself (without the need for
human interaction) and spreads to different computers/devices. It
doesn’trequireasoftwareprogramtobeattachedto(unlikeviruses).
WORM
A virus is a type of malware that spreads to other computers by
duplicating itself, but in order to do so, it relies on human activity, like
running the program where the virus is attached, opening a malicious
file, etc. They can also spread through script files or cross-site scripting
(XSS)vulnerabilities.
VIRUS
A Trojan type of malware has the logic of the real trojan horse. It
disguisesitselfasasafeprogram/filebutactuallyintendsattackingyour
device. Once the threat actor has stepped to your device, it can
steal/modifyfiles,monitoruseractivity,orinstallmoremalwaretoretain
itspersistence.
TROJAN
A bot is a software program that automatically performs specific
(malicious) operations and is controlled remotely by the threat actor. It
can be used in a botnet, which is a collection of computers (bots), and
withthat,thethreatactorcanperformDDoSattacks.
BOT & BOTNET
Aransomwareisamalwaretypethatspreadsasadownloadablefile,or
usuallythroughavulnerabilityinanetworkservice.Itattachesitselfina
computer, holds it captive by restricting user access, and demands the
userforaransominordertoremovetherestrictionsinthesystem.
RANSOMWARE
Spyware is a malware type that installs itself into a device, tracks user
activity (by keylogging), and steals user information. It spreads through
softwarevulnerabilitiesandhidesinlegitsoftware.
SPYWARE
Adwareisatypeofmalwarethatdelivers(unwanted)advertisementsto
the user's device, in the form of pop-up ads on a website, or other ads
displayedonasoftwareprogram.Theycanbecombinedwithspywareto
trackuseractivityorstealdata.
ADWARE
Rootkitisatypeofmalwarethatremotelyaccessesandcontrolsadevice.
The threat actor can execute files, steal information, install more
malware, and more. It spreads through software, application
vulnerabilities.
ROOTKIT
Types of 
www.socradar.io

More Related Content

What's hot

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 

What's hot (20)

virus
  virus  virus
virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Viruses
VirusesViruses
Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruspresentacion10
Viruspresentacion10Viruspresentacion10
Viruspresentacion10
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Malware
MalwareMalware
Malware
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus examples
Virus examplesVirus examples
Virus examples
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Presentación1
Presentación1Presentación1
Presentación1
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 

Similar to Type of Malware

Internet Security
Internet SecurityInternet Security
Internet Security
Manoj Sahu
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
mdameer02
 

Similar to Type of Malware (20)

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 

More from SOCRadar Inc

More from SOCRadar Inc (8)

Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Dark Web Slangs-2
Dark Web Slangs-2Dark Web Slangs-2
Dark Web Slangs-2
 
Cost for Failed Certificate Management Practices
Cost for Failed Certificate Management PracticesCost for Failed Certificate Management Practices
Cost for Failed Certificate Management Practices
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonating
 
Type of Threat Actor
Type of Threat ActorType of Threat Actor
Type of Threat Actor
 
Type of Cyber Attacks
Type of Cyber AttacksType of Cyber Attacks
Type of Cyber Attacks
 
Threat Intelligence Keys
Threat Intelligence KeysThreat Intelligence Keys
Threat Intelligence Keys
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

Type of Malware

  • 1. Malware  A worm is a malware type which replicates itself (without the need for human interaction) and spreads to different computers/devices. It doesn’trequireasoftwareprogramtobeattachedto(unlikeviruses). WORM A virus is a type of malware that spreads to other computers by duplicating itself, but in order to do so, it relies on human activity, like running the program where the virus is attached, opening a malicious file, etc. They can also spread through script files or cross-site scripting (XSS)vulnerabilities. VIRUS A Trojan type of malware has the logic of the real trojan horse. It disguisesitselfasasafeprogram/filebutactuallyintendsattackingyour device. Once the threat actor has stepped to your device, it can steal/modifyfiles,monitoruseractivity,orinstallmoremalwaretoretain itspersistence. TROJAN A bot is a software program that automatically performs specific (malicious) operations and is controlled remotely by the threat actor. It can be used in a botnet, which is a collection of computers (bots), and withthat,thethreatactorcanperformDDoSattacks. BOT & BOTNET Aransomwareisamalwaretypethatspreadsasadownloadablefile,or usuallythroughavulnerabilityinanetworkservice.Itattachesitselfina computer, holds it captive by restricting user access, and demands the userforaransominordertoremovetherestrictionsinthesystem. RANSOMWARE Spyware is a malware type that installs itself into a device, tracks user activity (by keylogging), and steals user information. It spreads through softwarevulnerabilitiesandhidesinlegitsoftware. SPYWARE Adwareisatypeofmalwarethatdelivers(unwanted)advertisementsto the user's device, in the form of pop-up ads on a website, or other ads displayedonasoftwareprogram.Theycanbecombinedwithspywareto trackuseractivityorstealdata. ADWARE Rootkitisatypeofmalwarethatremotelyaccessesandcontrolsadevice. The threat actor can execute files, steal information, install more malware, and more. It spreads through software, application vulnerabilities. ROOTKIT Types of  www.socradar.io