Malware

Description

Worm

Malware that propagates itself from one infected host to other hosts via exploits in the OS interfaces typically the system-call interface

Trojan

Malware that masquerades as non-malware and acts maliciously once installed (opening backdoors, interfering with system behavior, etc.)

Adware

Malware that forces the user to deal with unwanted advertisements

Spyware

Malware that secretly observes and reports users’ computer usage and personal information accessible

Botnet

Malware that employs a user’s computer as a member of a network of infected computers controlled by a central malicious agency

Rookit

Malware that hides its existence from other applications and users. Often used to mask the activity of other malicious software

Virus

Malware that attaches itself to running programs and spreads itself through users’ interaction with various systems

Polymorphic Virus

A virus that when replicating to attach to a new target, alters its payload to evade detection, i.e., takes on a different shape but performs the same function

Metamorphic Virus

A virus that when replicating to attach to a new target, alters both the payload and functionality, including the framework for generating future changes

Ransomware

Malware that encrypts the user’s files (documents and photos) with a strong form of encryption and demands payments in exchange for the decryption key