
Cybersecurity Zoo of Malware
- parya hajimirzae
- Aug 28, 2024
- 2 min read
Imagine walking through a zoo filled with all sorts of wild and dangerous creatures, each with its own unique characteristics. But instead of animals, this zoo is filled with different types of malicious code, each designed to disrupt in its special way. From sneaky spies to destructive time bombs, and annoying worms. Understanding these creatures can help you protect yourself in the digital world.

Here’s a quick guide to the most common types of malicious code, so you can recognise the threats and keep your systems safe.
Code Type | Characteristics |
Virus | Code that causes malicious behaviour and propagates copies of itself to other programs |
Worm | Code that propagates copies of itself through a network; impact is usually degraded performance |
Trojan horse | Code that contains unexpected, undocumented, additional functionality |
Rabbit | Code that replicates itself without limit, to exhaust resources |
Logic bomb | Code that triggers action when a predetermined condition occurs |
Time bomb | Code that triggers action when a predetermined time occurs |
Dropper | Transfer agent code only to drop other malicious code, such as a virus or Trojan horse |
RAT (remote access Trojan) | Trojan horse that, once planted, gives access from a remote location |
Spyware | A program that intercepts and covertly communicates data on the user or the user’s activity |
Ransomware | Attack that transfers data offsite or, more usually, encrypts it; the attacker demands a ransom in exchange for returning the data or decryption key |
Bot | Semi-autonomous agent, under the control of a (usually remote) controller or “herder”; not necessarily malicious |
Zombie | Code or entire computer under the control of a (usually remote) program |
Rootkit | Code installed in the “root” or most privileged section of the operating system; hard to detect |
Trapdoor or backdoor | Code feature that allows unauthorised access to a machine or program; bypasses normal access control and authentication |
Scareware | Not code; false warning of malicious code attack |
Ref: Security in Computing, 6th Edition



Comments