Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views2 pages

Malware Types

The document outlines various types of malware, including viruses, worms, trojan horses, ransomware, spyware, adware, rootkits, botnets, keyloggers, and fileless malware, along with examples of each. Each type is characterized by its method of operation and impact on systems, such as data theft, system damage, or unauthorized access. Notable examples include the 'ILOVEYOU' virus, 'WannaCry' worm, and 'Petya' ransomware.

Uploaded by

jazib1921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views2 pages

Malware Types

The document outlines various types of malware, including viruses, worms, trojan horses, ransomware, spyware, adware, rootkits, botnets, keyloggers, and fileless malware, along with examples of each. Each type is characterized by its method of operation and impact on systems, such as data theft, system damage, or unauthorized access. Notable examples include the 'ILOVEYOU' virus, 'WannaCry' worm, and 'Petya' ransomware.

Uploaded by

jazib1921
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Types of Malwares: Explanation and Examples

1. Virus

A virus is a type of malware that attaches itself to legitimate programs and replicates when
the infected program is executed. Example: The "ILOVEYOU" virus spread through email
attachments, overwriting system files and causing widespread damage.

2. Worm

Worms are self-replicating malware that spread without human intervention, often
exploiting security vulnerabilities. Example: The "WannaCry" worm exploited a Windows
vulnerability to spread ransomware worldwide.

3. Trojan Horse

Trojans disguise themselves as legitimate software but perform malicious activities once
installed. Example: The "Zeus" Trojan was used to steal banking credentials from infected
devices.

4. Ransomware

Ransomware encrypts files on a system and demands payment for decryption.

Example: The "Petya" ransomware encrypted hard drives, making data inaccessible until a
ransom was paid.

5. Spyware

Spyware secretly monitors user activities and collects sensitive information.

Example: "CoolWebSearch" was a spyware that hijacked web browsers and tracked user
activity.

6. Adware

Adware displays unwanted advertisements, often leading to malicious websites.


Example: "Fireball" adware infected millions of devices, manipulating web traffic for
revenue.

7. Rootkit

Rootkits hide deep within a system, allowing attackers to maintain persistent access.
Example: The "Stuxnet" rootkit was used for cyber-espionage against industrial control
systems.

8. Botnet

A botnet is a network of infected devices controlled remotely for cyberattacks.

Example: The "Mirai" botnet launched massive DDoS attacks by hijacking IoT devices.

9. Keylogger

Keyloggers record keystrokes to steal credentials and personal data.

Example: The "Revealer Keylogger" was used to capture passwords and financial
information.

10. Fileless Malware

This type of malware resides in memory rather than installing files on the system, making
detection difficult.

Example: "PowerGhost" used PowerShell exploits to mine cryptocurrency without leaving


a trace.

You might also like