Malware - A broad term for any software intentionally designed to cause damage or harm to a computer system., Virus - A program that attaches itself to a legitimate program or file and spreads to other files or systems., Worm - A self-replicating program that spreads without needing a host file, usually through networks, Trojan Horse (Trojan) - malicious software that disguises itself as legitimate software to trick users into installing it, then performs unauthorized and harmful actions on their device, such as stealing data, damaging the system, or creating a backdoor for further intrusion., Spyware - Software that secretly collects information about users, often for malicious purposes., Adware - Software that automatically displays or downloads unwanted ads, sometimes bundled with other programs., Ransomware - Malicious software that encrypts the victim’s files and demands payment for the decryption key., Rootkit - Software designed to gain unauthorized access to a system, often with the intent of hiding other types of malware., Keylogger - A type of spyware that records every keystroke made by a user, often used for stealing sensitive information like passwords., Backdoor - A secret method for bypassing normal authentication to access a system, often installed by a Trojan or virus., Botnet - A network of infected devices (often called "bots") that can be controlled remotely to launch attacks (like DDoS)., Fileless Malware - Malware that operates without being stored on disk, often living in memory to avoid detection., Downloader - Malware designed to download and install other malicious software on a compromised system., Macro Virus - A virus embedded in the macros of documents like Word or Excel files, which activates when the document is opened., Drive-by Download - Malware that is downloaded automatically when a user visits a compromised or malicious website., Phishing - A method of tricking users into giving up sensitive information like passwords or credit card numbers., Spear Phishing - A more targeted form of phishing aimed at specific individuals or organizations., Zero Day - A vulnerability that is exploited by attackers before it is discovered or patched by the software vendor., Polymorphic Malware - Malware that changes its code to avoid detection by antivirus software., Dropper - A type of malware that installs other malware files onto your device. Unlike a downloader, this type doesn't have to connect to the internet to drop malicious files., Obfuscator - A type of malware that hides its code and purpose, making it more difficult for security software to detect or remove., Password Stealer - A type of malware that gathers your personal information, such as usernames and passwords. It often works along with a key logger, which collects and sends information about the keys you press and websites you visit., Potentially Unwanted Program - Software or an app that you don’t explicitly want on your device which are usually bundled with freeware and often installs without your permission., File Hash - a unique, fixed-length string of characters that acts as a digital fingerprint for a file, generated by a one-way mathematical function called a hashing algorithm., Masquerading  - Attackers often rename malicious files to make them look like legitimate ones. This technique helps them avoid detection by security tools that may be looking for specific process names.,

Malware Analysis: Key Terms

Leaderboard

Visual style

Options

Switch template

Continue editing: ?