GCGA Ch. 6 Determining Malware Types (ST) Flashcards
(11 cards)
Malware types
include several different types of malicious code, including ransomware, Trojans, worms, spyware, bloatware, viruses, keyloggers, logic bombs, and rootkits.
Ransomware
a type of malware that takes control of a user’s system or data. Criminals demand a ransom payment before returning control of the computer.
Trojan
appears to be one thing, such as pirated software or free antivirus software, but is something malicious.
RAT
A remote access Trojan (RAT) is a type of malware that allows attackers to take control of systems from remote locations.
Worm
self-replicating malware that travels throughout a network without user intervention.
Spyware
software installed on user systems without the user’s knowledge or consent and it monitors the user’s activities. It sometimes includes a keylogger that records user keystrokes.
Bloatware
software installed when a user installs another program, often without the user’s knowledge. Some bloatware changes the default home page of a user’s browser or change the default search engine.
Virus
malicious code that attaches itself to a host application. The code runs and replicates to other systems when the application is launched.
Hardware or software keyloggers
track all of the keyboard activity on a system and report it back to the attacker.
Logic bomb
executes in response to an event, such as a day, time, or condition. Malicious insiders have planted logic bombs into existing systems, and these logic bombs have delivered their payload after the employee left the company.
Rootkits
take root-level or kernel-level control of a system. They hide their processes to avoid detection, and they can remove user privileges and modify system files.