Malware

Analyze indicators of compromise and determine the type of malware.

Malware is software designed to destroy, alter, or disclose information and/or computers.

Viruses

Viruses are malware that require human-interaction to propagate.

Worms

Worms are malware that do NOT require human-interaction to propagate.

Crypto-malware

Crypto-malware encrypts data to make it unavailable.

Ransomware

Ransomware is a form of Crypto-Malware and requires payment for the keys that can recover data encrypted by the attacker.

Trojans

Trojans are malicious software hidden inside of benign software.

Remote Access Trojans (RATs) are trojans although they provide remote access once executed.

Rootkits

Rootkits are collections of tools designed to gain and/or maintain administrator access.

Keyloggers

Keyloggers, well, logs keystrokes. The point of them are to primarily learn user credentials, but can also be used to spy on people.

Adware

Adware can be described as enticing pop-ups loaded with malware. Examples are found on adult websites. If a website is promising you a good time, think twice.

Spyware

Spyware collects information about your computer activity. For example, logon times, files accessed, etc. might help an attacker learn more about you and/or your organization.

Bots

Computers under the control of an attacker.

Logic bombs

Logic Bombs are malware that executes when specific conditions are met. Said conditions may include date, time, or resource usage. Logic Bombs are often associated with insider threats.

Backdoors

Backdoors are entry points left behind by the attacker so she can maintain access in the future.

Last updated

Was this helpful?