Malware
Analyze indicators of compromise and determine the type of malware.
Viruses

Viruses are malware that require human-interaction to propagate.
Worms

Worms are malware that do NOT require human-interaction to propagate.
Crypto-malware
Crypto-malware encrypts data to make it unavailable.
Ransomware

Ransomware is a form of Crypto-Malware and requires payment for the keys that can recover data encrypted by the attacker.
Trojans

Trojans are malicious software hidden inside of benign software.
Rootkits
Rootkits are collections of tools designed to gain and/or maintain administrator access.
Keyloggers
Keyloggers, well, logs keystrokes. The point of them are to primarily learn user credentials, but can also be used to spy on people.
Adware
Adware can be described as enticing pop-ups loaded with malware. Examples are found on adult websites. If a website is promising you a good time, think twice.
Spyware

Spyware collects information about your computer activity. For example, logon times, files accessed, etc. might help an attacker learn more about you and/or your organization.
Bots
Computers under the control of an attacker.
Logic bombs
Logic Bombs are malware that executes when specific conditions are met. Said conditions may include date, time, or resource usage. Logic Bombs are often associated with insider threats.
Backdoors

Backdoors are entry points left behind by the attacker so she can maintain access in the future.
Last updated
Was this helpful?