Malware 1
Malware 2
Malware 3
Malware 4
Malware 5
100

Software that is downloaded, installed, and seems harmless but does have a malicious intent

Trojan

100

Malware that encrypts, or locks, a victim's access to files and/or the system and demands a ransom to regain access

Ransomware

100

This attaches itself to files, programs, and system processes and uses them as carriers to enact on their intended effects - non-self-replicating

Virus

100

This malware gains valuable information from the keystrokes of the user

Keyloggers

100

What are the following examples of:

Virus, ransomware,trojan, worm, spyware, bloatware, RAT, Etc.

Malware

200

The ability to access a system or data by bypassing the security controls

Backdoors

200

Encrypts files, folders, or hard drives but the operating system itself may still be available

Cryptomalware

200

This malware doesn't need to rely on other programs or files to spread - self-replicating

Worm

200

A generic term applied to software utilized for malicious purposes

Malware

200

This is an attempt to gain sensitive information through fraudulent means such as a link or soliciting a response via email, text, or other messaging

Phishing

300

A type of trojan that combines the use of a backdoor allowing a malicious actor to have administrative and remote control of the host

Remote Access Trojans (RAT)

300

This can lock a user out of their device completely, preventing them from accessing anything on the device

Lockers or Locker-ransomware

300

This comes from software that installs additional advertising components, often leading to an influx of pop-up ads or toolbars in web browsers

Adware

300

This uses social interactions, such as relationships, persuasion, and body language to gain access to secretive or personal information or persuade someone to perform an action

Social Engineering

300

This is done with a real voice, digitally altered voice, or AI. 

Voice phishing of vishing

400

This can imitate pre-existing software that may need an update or serve to update pre-existing malware already install on the device

Downloader Trojan

400

This type of ransomware alerts a user of an issue and demands payment to fix it. This threat is often accompanied by pop-ups and other issues on the device

Scareware

400

A type of malware that monitors computer and internet usage. It typically tracks internet traffic, website visits, clicked advertisements, or other browsing habits.

Spyware


400

This type of phishing is directed at a specific target that has usually been under recon from the malicious actor

Spear phishing

400

This form of phishing uses text since messaging has become ingrained in society

SMS phishing or smishing

500

This Trojan will infect a victim's computers then perform a DDoS attack in hopes of disrupting network services

DDoS Trojan

500

This ransomware threatens to release the stolen data if the ransom is not paid.

Doxware, exortionware, or leakware

500

This malware refers to pre-installed software applications on devices or computer systems often deemed unnecessary or undesirable by users due to: consuming resources, taking up storage space, and providing minimal value

Bloatware

500

This type of phishing is directed at high profile targets such as a CEO or high-ranking officials.

Whaling

500

This phishing targets massive amounts of users with the hope that a fraction of them will fall victim

Spam

M
e
n
u