top of page
Search

Cybersecurity Zoo of Malware

  • Writer: parya hajimirzae
    parya hajimirzae
  • Aug 28, 2024
  • 2 min read

Imagine walking through a zoo filled with all sorts of wild and dangerous creatures, each with its own unique characteristics. But instead of animals, this zoo is filled with different types of malicious code, each designed to disrupt in its special way. From sneaky spies to destructive time bombs, and annoying worms. Understanding these creatures can help you protect yourself in the digital world.



Here’s a quick guide to the most common types of malicious code, so you can recognise the threats and keep your systems safe.

Code Type

Characteristics

Virus

Code that causes malicious behaviour and propagates copies of itself to other programs

Worm

Code that propagates copies of itself through a network; impact is usually degraded performance

Trojan horse

Code that contains unexpected, undocumented, additional functionality

Rabbit

Code that replicates itself without limit, to exhaust resources

Logic bomb

Code that triggers action when a predetermined condition occurs

Time bomb

Code that triggers action when a predetermined time occurs

Dropper

Transfer agent code only to drop other malicious code, such as a virus or Trojan horse

RAT (remote access Trojan)

Trojan horse that, once planted, gives access from a remote location

Spyware

A program that intercepts and covertly communicates data on the user or the user’s activity

Ransomware

Attack that transfers data offsite or, more usually, encrypts it; the attacker demands a ransom in exchange for returning the data or decryption key

Bot

Semi-autonomous agent, under the control of a (usually remote) controller or “herder”; not necessarily malicious

Zombie

Code or entire computer under the control of a (usually remote) program

Rootkit

Code installed in the “root” or most privileged section of the operating system; hard to detect

Trapdoor or backdoor

Code feature that allows unauthorised access to a machine or program; bypasses normal access control and authentication

Scareware

Not code; false warning of malicious code attack

Ref: Security in Computing, 6th Edition

 
 
 

Comments


ByteHerWay
Notice: The images on this website are generated using the AI tool provided by the WIX platform.
bottom of page