Definition under: Definitions

What is Malware?

Malware, short for malicious software, is a general term for software designed to infiltrate, damage, or exploit computer systems, networks, or devices without the user's consent. Its primary purpose is to cause harm or gain unauthorized access to sensitive data, disrupt operations, or facilitate other malicious activities.

Dissecting Malware

The history of malware dates back to the early days of computing in the 1970s and 1980s. The first known malware, the Creeper virus, was created in 1971 as an experimental self-replicating program to demonstrate the potential risks associated with these types of software. As computer networks expanded and became more interconnected, malware evolved in complexity and purpose.

The profound impact of early malware outbreaks prompted heightened awareness in computer security, exemplified by the Morris Worm incident in 1988, which led to the crashing of thousands of computers due to a programming error. The damages from this incident ranged between $10 million and $100 million, illustrating the potential for large-scale disruptions caused by malware.

How Malware Works

Malware exploits vulnerabilities in software or firmware to access or even take control of devices or networks. While the specific workings of different types of malware may vary, they generally follow a common process:

  1. Infection: Malware needs to find a way onto a target device or network. This is often accomplished through tactics such as social engineering (e.g., phishing emails), drive-by downloads from malicious websites, exploiting software vulnerabilities, or bundling with seemingly legitimate software. Some malware, such as worms, can self-replicate and spread without any user interaction.
  2. Execution: Once on a target device, the malware needs to execute its malicious code. This can be triggered by the user opening an infected file or application or through an automated process like a scheduled task or script. Some malware may use persistence techniques, such as modifying registry entries or creating hidden files, to ensure that they remain active even after a reboot.
  3. Payload delivery: After execution, the malware delivers its payload, which is the specific action or set of actions it is designed to perform. This can include activities such as stealing sensitive data, encrypting files for ransom, creating backdoors for unauthorized access, or launching attacks on other devices or networks.
  4. Communication: Many types of malware communicate with remote command and control (C2) servers to receive instructions, transmit stolen data, or download additional malicious components. This communication is often encrypted or obfuscated to avoid detection by security software or network monitoring tools.
  5. Evasion: Malware often incorporates techniques to avoid detection and removal by security software, such as code obfuscation, polymorphism (changing its code to evade signature-based detection), or using rootkits to hide its presence on a system.
  6. Propagation: Some malware, like worms and certain types of ransomware, are designed to spread to other devices or networks. This can be accomplished through various means, such as exploiting network vulnerabilities, brute-forcing passwords, or using infected devices as launching points for further attacks.

Types of Malware

There are several types of malware, each with its own unique characteristics and objectives. Some of the most common types include:

  1. Virus: A specific subtype of malware that embeds itself within legitimate programs or files, propagating and inflicting damage when the infected file is executed. Viruses are known to alter, corrupt, or even delete files, and can disseminate through a variety of methods such as email attachments, removable media like USB drives, or by exploiting software vulnerabilities in targeted systems. Additionally, viruses can infect systems through file sharing and downloads from malicious websites.
  2. Worm: A self-replicating malware that autonomously spreads across networks or devices without user interaction. Worms consume resources, degrade device performance, and may transport harmful payloads, causing additional damage or facilitating cyberattacks. Worms exploit network protocols, software vulnerabilities, or social engineering tactics to proliferate.
  3. Trojan Horse: Disguised as legitimate software, Trojans deceive users into installing them. Once installed, they enable unauthorized system access, exfiltrate sensitive data, or propagate auxiliary malware. Trojans may be distributed through phishing campaigns, malicious websites, or social media.
  4. Ransomware: A malicious malware encrypting files or restricting device access, extorting victims for a decryption key or system unlocking. Ransomware affects individuals, businesses, or expansive networks and often relies on phishing emails or exploit kits to gain initial access to targeted systems.
  5. Spyware: Covertly monitoring users and accumulating information about their activities, spyware can track browsing patterns, intercept personal data, or access a device's camera or microphone. Spyware distribution includes malicious attachments, rogue software installations, or compromised websites.
  6. Adware: Bundled with free software, adware displays unwanted advertisements on a user's device, redirecting users to specific websites or generating revenue through click fraud. Some adware tracks user behavior, collects personal data, and shares it with third parties for marketing purposes.
  7. Rootkit: A sophisticated malware type that conceals its presence by obtaining deep system access, often with administrator-level privileges. Rootkits manipulate system functions, tamper with log files, and hide from security software. Rootkits are distributed through various attack vectors, including phishing emails, drive-by downloads, or pre-installed on compromised hardware.
  8. Keylogger: A specialized spyware form that records device keystrokes, capturing sensitive information such as login credentials or credit card numbers. Keyloggers are distributed through malicious attachments, rogue software installations, or bundled with other malware types, sending collected data back to the attacker for further exploitation.
  9. Fileless Malware: An elusive malware type residing within a system's memory or leveraging legitimate tools for malicious activities, difficult to detect using traditional security measures. Fileless malware employs scripting languages or system utilities to initiate attacks, spreading through malicious attachments, exploit kits, or watering hole attacks targeting specific user groups.

Recently Added Definitions