SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Malware 
A worm is a malware type which replicates itself (without the need for
human interaction) and spreads to different computers/devices. It
doesn’trequireasoftwareprogramtobeattachedto(unlikeviruses).
WORM
A virus is a type of malware that spreads to other computers by
duplicating itself, but in order to do so, it relies on human activity, like
running the program where the virus is attached, opening a malicious
file, etc. They can also spread through script files or cross-site scripting
(XSS)vulnerabilities.
VIRUS
A Trojan type of malware has the logic of the real trojan horse. It
disguisesitselfasasafeprogram/filebutactuallyintendsattackingyour
device. Once the threat actor has stepped to your device, it can
steal/modifyfiles,monitoruseractivity,orinstallmoremalwaretoretain
itspersistence.
TROJAN
A bot is a software program that automatically performs specific
(malicious) operations and is controlled remotely by the threat actor. It
can be used in a botnet, which is a collection of computers (bots), and
withthat,thethreatactorcanperformDDoSattacks.
BOT & BOTNET
Aransomwareisamalwaretypethatspreadsasadownloadablefile,or
usuallythroughavulnerabilityinanetworkservice.Itattachesitselfina
computer, holds it captive by restricting user access, and demands the
userforaransominordertoremovetherestrictionsinthesystem.
RANSOMWARE
Spyware is a malware type that installs itself into a device, tracks user
activity (by keylogging), and steals user information. It spreads through
softwarevulnerabilitiesandhidesinlegitsoftware.
SPYWARE
Adwareisatypeofmalwarethatdelivers(unwanted)advertisementsto
the user's device, in the form of pop-up ads on a website, or other ads
displayedonasoftwareprogram.Theycanbecombinedwithspywareto
trackuseractivityorstealdata.
ADWARE
Rootkitisatypeofmalwarethatremotelyaccessesandcontrolsadevice.
The threat actor can execute files, steal information, install more
malware, and more. It spreads through software, application
vulnerabilities.
ROOTKIT
Types of 
www.socradar.io

Weitere ähnliche Inhalte

Was ist angesagt?

Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
adni_shadah
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
amoY91
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
guestc8c7c02bb
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
Spandan Patnaik
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
siti zulaikha
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
sumitra22
 

Was ist angesagt? (20)

virus
  virus  virus
virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Viruses
VirusesViruses
Viruses
 
Comp. Viruses
Comp. VirusesComp. Viruses
Comp. Viruses
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Viruspresentacion10
Viruspresentacion10Viruspresentacion10
Viruspresentacion10
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Malware
MalwareMalware
Malware
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
All about computer malwares
All about computer malwaresAll about computer malwares
All about computer malwares
 
Trojan horse and salami attack
Trojan horse and salami attackTrojan horse and salami attack
Trojan horse and salami attack
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Trojan Horse Virus
Trojan Horse VirusTrojan Horse Virus
Trojan Horse Virus
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)Presentation Virus (salami attack and trojan horse)
Presentation Virus (salami attack and trojan horse)
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Virus examples
Virus examplesVirus examples
Virus examples
 
Torjan horse virus
Torjan horse virusTorjan horse virus
Torjan horse virus
 
Presentación1
Presentación1Presentación1
Presentación1
 
Ahmad Pussycat Dolls
Ahmad Pussycat DollsAhmad Pussycat Dolls
Ahmad Pussycat Dolls
 

Ähnlich wie Type of Malware

Internet Security
Internet SecurityInternet Security
Internet Security
Manoj Sahu
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
mdameer02
 

Ähnlich wie Type of Malware (20)

Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Computer virus
Computer virusComputer virus
Computer virus
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Ethical hacking trojans, worms and spyware
Ethical hacking    trojans, worms and spywareEthical hacking    trojans, worms and spyware
Ethical hacking trojans, worms and spyware
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Presentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptxPresentation_malware_anti_malware.pptx
Presentation_malware_anti_malware.pptx
 
Virus Lecture #3
Virus Lecture #3Virus Lecture #3
Virus Lecture #3
 
Introductio to Virus
Introductio to VirusIntroductio to Virus
Introductio to Virus
 
describe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdfdescribe the differences and similarities between viruses, worms, an.pdf
describe the differences and similarities between viruses, worms, an.pdf
 
Virus&malware
Virus&malwareVirus&malware
Virus&malware
 
Atul trojan horse ppt 101
Atul trojan horse ppt 101Atul trojan horse ppt 101
Atul trojan horse ppt 101
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
malwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdfmalwareanti-malware-160630191004 (1).pdf
malwareanti-malware-160630191004 (1).pdf
 
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS MALICIOUS SOFTWARE VIRUS  WORM TROJAN HORSE ANTI VIRUS
MALICIOUS SOFTWARE VIRUS WORM TROJAN HORSE ANTI VIRUS
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
Presentation on Computer Viruses
Presentation on Computer Viruses Presentation on Computer Viruses
Presentation on Computer Viruses
 
malware ppt.pptx
malware ppt.pptxmalware ppt.pptx
malware ppt.pptx
 

Mehr von SOCRadar Inc

Mehr von SOCRadar Inc (8)

Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Dark Web Slangs-2
Dark Web Slangs-2Dark Web Slangs-2
Dark Web Slangs-2
 
Cost for Failed Certificate Management Practices
Cost for Failed Certificate Management PracticesCost for Failed Certificate Management Practices
Cost for Failed Certificate Management Practices
 
Types of impersonating
Types of impersonatingTypes of impersonating
Types of impersonating
 
Type of Threat Actor
Type of Threat ActorType of Threat Actor
Type of Threat Actor
 
Type of Cyber Attacks
Type of Cyber AttacksType of Cyber Attacks
Type of Cyber Attacks
 
Threat Intelligence Keys
Threat Intelligence KeysThreat Intelligence Keys
Threat Intelligence Keys
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 

Kürzlich hochgeladen

CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
Wonjun Hwang
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Kürzlich hochgeladen (20)

Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
The Ultimate Prompt Engineering Guide for Generative AI: Get the Most Out of ...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Vector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptxVector Search @ sw2con for slideshare.pptx
Vector Search @ sw2con for slideshare.pptx
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 

Type of Malware

  • 1. Malware  A worm is a malware type which replicates itself (without the need for human interaction) and spreads to different computers/devices. It doesn’trequireasoftwareprogramtobeattachedto(unlikeviruses). WORM A virus is a type of malware that spreads to other computers by duplicating itself, but in order to do so, it relies on human activity, like running the program where the virus is attached, opening a malicious file, etc. They can also spread through script files or cross-site scripting (XSS)vulnerabilities. VIRUS A Trojan type of malware has the logic of the real trojan horse. It disguisesitselfasasafeprogram/filebutactuallyintendsattackingyour device. Once the threat actor has stepped to your device, it can steal/modifyfiles,monitoruseractivity,orinstallmoremalwaretoretain itspersistence. TROJAN A bot is a software program that automatically performs specific (malicious) operations and is controlled remotely by the threat actor. It can be used in a botnet, which is a collection of computers (bots), and withthat,thethreatactorcanperformDDoSattacks. BOT & BOTNET Aransomwareisamalwaretypethatspreadsasadownloadablefile,or usuallythroughavulnerabilityinanetworkservice.Itattachesitselfina computer, holds it captive by restricting user access, and demands the userforaransominordertoremovetherestrictionsinthesystem. RANSOMWARE Spyware is a malware type that installs itself into a device, tracks user activity (by keylogging), and steals user information. It spreads through softwarevulnerabilitiesandhidesinlegitsoftware. SPYWARE Adwareisatypeofmalwarethatdelivers(unwanted)advertisementsto the user's device, in the form of pop-up ads on a website, or other ads displayedonasoftwareprogram.Theycanbecombinedwithspywareto trackuseractivityorstealdata. ADWARE Rootkitisatypeofmalwarethatremotelyaccessesandcontrolsadevice. The threat actor can execute files, steal information, install more malware, and more. It spreads through software, application vulnerabilities. ROOTKIT Types of  www.socradar.io