Malicious code that runs on a machine without the user’s knowledge, and this allows the code to infect the computer whenever it is run
Malware
A form of code that allows a virus to be embedded inside another document so that when that document is opened by the user, the virus is executed
Macro Virus
Tries to find executables or application file to infect with their malicious code
Computer Virus
A combination of a boot sector type virus and a program virus
Multipartite Virus
Designed to hide itself from being detected by encrypting its malicious code or payload to avoid detection by any antivirus software
Encrypted Virus
Advanced version of an encrypted virus, but instead of just encrypting the contents, it will actually change the virus’s code each time it is executed by altering the decryption module in order for it to evade dectection
Polymorphic Virus
Able to write itself entirely before it attempts to infect a given file
Metamorphic
Not necessarily a specific type of virus, as much as it is a technique used to prevent the virus from being detected by the anti-virus software
Stealth virus
Have a layer of protection to confuse a program or a person who’s trying to analyze it.
Armored Virus
A form of technical social engineering that attempts to scare end users into taking undersirable action or their system
Hoax
Piece of malicious software, much like virus, but it can replicate itself without any user interaction
Worm
A piece of malicious software that is disguised as a piece of harmless or desirable software
Trojan
Type of Trojan that is widely used by modern attackers because it provides the attacker with remote control of a victim machine
RAT
A type of malicious software that is designed to block access to a computer system or its data by encrypting it until a ransom is paid to the attacker
Ransomeware
Network of compromised computers or devices controlled remotely by malicious actors
Botnet
Responsible for managing and coordinating the activities of other nodes or devices within a network
Command and control Node
Type of software that is designed to gain administrative-level control over a given computer system without being detected
Rootkit
Allows a system to control access to things like device drivers, sound card, and monitor
Kernel Mode
Technique used to run arbitrary code within the address space of another process by forcing it to load a dynamic-link library
DLL Injection
Used to bypass the normal security and authentication functions
Backdoor
Placed by threat actor on the computer to help maintain persistent access to that system
RAT
Malicious code that’s inserted into a program, and will only executed when certain conditions have been met.
Logic Bomb
Piece of software where or software that records every single keystroke that is made on computer or mobile device
Keylogger
Type of malicious software that is designed to gether and send information about a user or organization
Spyware