Malware - malicious software - is a common name for many types of harmful programs. A post by Ashely Linkheart, "The Different Types of Malware" in Cyber Security Intelligence lists ten types of malware with examples of how they are used.
- Adware attempts to direct a user to unwanted, potentially malicious advertising. According to Avast it is responsible for 72% of mobile malware.
- Spyware infects a device to collect keystrokes or data, or to study behavior without the user's knowledge. Spyware was used in the Target hack.
- Ransomware encrypts data, with criminals demanding a ransom in return for its release.
- Computer virus attaches to a host file and infects other files. Email attachments are a common vector.
- Computer worms are stand alone, self-replicating software that spreads through a network; NotPetya is an example.
- A Trojan horse or simply a "Trojan" is seemingly legitimate software that tricks a user into downloading it.
- Botnets are networks of "zombie" computers used for DDoS and spam email attacks.
- Rootkit is a collection of software tools that can gain access to an operating system.
- Fileless malware is malicious code that exploits legitimate programs and systems.
- Scareware is a scam that displays pop-ups to trick a user into installing fake security software.
Cyber criminals today may use hybrid forms of malware that are harder to detect, contain and remove.
It's easier to prevent a malware attack than remove it. prevention requires a positive approach using multiple strategies. Refer to the article at www.cybersecurityintelligence.com for details.