Type

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Type What It Does Real-World

Ransomware Disables victim's access to data until ransom is paid RY

Fileless Malware Makes changes to files that are native to the OS Asta

Spyware Collects user activity data without their knowledge Dark

Adware Serves unwanted advertisements Fire

Trojans Disguises itself as desirable code Em

Worms Spreads through a network by replicating itself Stux

Rootkits Gives hackers remote control of a victim's device Zac

Keyloggers Monitors users' keystrokes Olympic

Bots Launches a broad flood of attacks Ech

Mobile Malware Infects mobile devices Tria

Wiper Malware Erases user data beyond recoverability. Whisp

Malware-(Malicious Software) designed to cause harm or Exploit a computer system, server, client, or
computer network, leak private information, gain unauthorized access to information or systems,
deprive access to information, or which unknowingly interferes with the user's computer security and
privacy

Types of Malware
Ransomware
- Disables victim’s access to data unit ransom is paid

Fileless Malware
- Make changes to files that are native to the OS
Spyware
- Collects user activity data without their knowledge

Adware
-Serves unwanted advertisements

Trojans horse
- Disguieses Itself as desirable code

Worms
- Spreads through a network by replicating itself

Rootkits
- Gives hackers remote control of a victim’s device

Keyloggers
= Monitors users’ keystrokes

Bots
-launches a broad flood of attacks

Mobile malware
- Infects mobile devices

Wiper malware
-Erases User data beyond Recoverability

https://www.crowdstrike.com/cybersecurity-101/malware/types-of-malware/

You might also like