Software that is downloaded, installed, and seems harmless but does have a malicious intent
Trojan
Malware that encrypts, or locks, a victim's access to files and/or the system and demands a ransom to regain access
Ransomware
This attaches itself to files, programs, and system processes and uses them as carriers to enact on their intended effects - non-self-replicating
Virus
This malware gains valuable information from the keystrokes of the user
Keyloggers
What are the following examples of:
Virus, ransomware,trojan, worm, spyware, bloatware, RAT, Etc.
Malware
The ability to access a system or data by bypassing the security controls
Backdoors
Encrypts files, folders, or hard drives but the operating system itself may still be available
Cryptomalware
This malware doesn't need to rely on other programs or files to spread - self-replicating
Worm
A generic term applied to software utilized for malicious purposes
Malware
This is an attempt to gain sensitive information through fraudulent means such as a link or soliciting a response via email, text, or other messaging
Phishing
A type of trojan that combines the use of a backdoor allowing a malicious actor to have administrative and remote control of the host
Remote Access Trojans (RAT)
This can lock a user out of their device completely, preventing them from accessing anything on the device
Lockers or Locker-ransomware
This comes from software that installs additional advertising components, often leading to an influx of pop-up ads or toolbars in web browsers
Adware
This uses social interactions, such as relationships, persuasion, and body language to gain access to secretive or personal information or persuade someone to perform an action
Social Engineering
This is done with a real voice, digitally altered voice, or AI.
Voice phishing of vishing
This can imitate pre-existing software that may need an update or serve to update pre-existing malware already install on the device
Downloader Trojan
This type of ransomware alerts a user of an issue and demands payment to fix it. This threat is often accompanied by pop-ups and other issues on the device
Scareware
A type of malware that monitors computer and internet usage. It typically tracks internet traffic, website visits, clicked advertisements, or other browsing habits.
Spyware
This type of phishing is directed at a specific target that has usually been under recon from the malicious actor
Spear phishing
This form of phishing uses text since messaging has become ingrained in society
SMS phishing or smishing
This Trojan will infect a victim's computers then perform a DDoS attack in hopes of disrupting network services
DDoS Trojan
This ransomware threatens to release the stolen data if the ransom is not paid.
Doxware, exortionware, or leakware
This malware refers to pre-installed software applications on devices or computer systems often deemed unnecessary or undesirable by users due to: consuming resources, taking up storage space, and providing minimal value
Bloatware
This type of phishing is directed at high profile targets such as a CEO or high-ranking officials.
Whaling
This phishing targets massive amounts of users with the hope that a fraction of them will fall victim
Spam