TYPES OF MALWARE

TYPES OF MALWARE

This article is all about different types of malware and how it will effect the systems. In this modern era the Cyber Crimes have increased rapidly. All these attacks directly or indirectly happens with the help of this malicious software's used by different types of attackers. Every malware designed differently that causes damages to system, networks, etc. A hacker always tries lot of methods like malvertising, Social Engineering to inject various malware to get into their target.

WHAT IS MALWARE?

Malware defined as malicious software aim of this malware is to destroy or compromise the network systems. Every user should definitely have some kind of knowledge regarding this software's so they can protect their systems. These malware are divided into several categories. They are:

1. RANSOMWARE:

Ransomware is one of the deadliest malicious software in which the hacker blocks all of your system files with an encryption and add extensions to the hacked files then demands certain amount of money to get back your system into normal situation. The word ransomware started its journey from 1989 but the major ransomware attack happened in the year 2005.

2. SPYWARE:

The name itself says SPY as this malicious software spys on the target user to get all the keystrokes and to gain sensitive information of user. This harmful software gets into the system without knowing to the user as most of the malware's comes in that way too. It also causes damage and has ability to spread by digging out the vulnerabilities. Spyware came into this cyber world in the year 1995.

3. VIRUS:

Virus is one of the common malicious software that takes the help of host to do its duty i.e to damage the systems. It has the ability of recreating itself and spreads to other systems too. Basically, this viruses spreads through websites, sharing files, attachments, etc. Viruses has capability of creating botnets, stealing data and many more. Virus Started spreading from the year 1986 in the computer world.

4. WORMS:

This malicious computer Worm doesn't require any host as it is a standalone piece of software. Worms replicates themselves then starts spreading into the networks this causes increasing in traffic and it might slow downs the things. Worms has capability of carrying payloads that causes damages to system. Worms came into existence in the year 1988. They also have capability of creating back doors.

5. ADWARE:

We can clearly observe from the name itself as it shows ads repeatedly that will be some kind of malicious and infuriating that may result in slowing down of system. Adware spreads through a browser vulnerability as it continuously shows unnecessary ads and pop-ups. Adware started its advertising from the year 1990s. This also hijacks the browser and has ability of spying too.

6. TROJAN HORSES:

A Trojan horse is a piece of malware that behaves as regular normal software used to dig out the information from the target system. Whenever a Trojan enters into your system then the attacker may gain access to your system. Trojans has capability of performing DOS attacks on target web addresses and they will not replicate themselves. Trojan horses started their riding roughly from the year 1975.

7. ROOTKIT:

Rootkit is a type of malware that covers its identity to became hidden in the system allows remote hackers to take control of your system. It is designed to cover malicious payloads so that this malware can steal important data such as keys, passwords and many others. It will be somewhat difficult to detect rootkit because it discloses its identity every time. Rootkits started their journey from the year 1990s.

8. BOTS:

Bots are specific kind of software's that are embedded with malware so that a hacker can remotely control the bot. With the help of botnets a attacker can launch DDOS attack. These botnets has capability of carrying other types of malware. The first botnet is detected in the year 2000.

For more interesting hacking related topics stay connected to this blog by subscribing: hackersocietyblog



Post a Comment

0 Comments