adding malware families

This commit is contained in:
Amanda Rousseau
2017-03-20 16:47:52 -07:00
parent 55584d4b4f
commit 4ab7fce668

View File

@@ -18,20 +18,20 @@ title: Malware Techniques
| Class | Description |
| --- | --- |
| ###Virus### | code that propagates (replicates) across systems with user intervention |
| ###Worm | code that self-propagates/replicates across systems without requiring user intervention |
| ###Bot | automated process that interacts with other network services |
| ###Trojan | malware that is often disguised as legitimate software |
| ###Ransomware | malware that holds the victim's data hostage by cryptography or other means |
| ###Rootkit | masks its existence or the existence of other software |
| ###Backdoor | enables a remote attacker to have access to or send commands to a compromised computer |
| ###RAT | Remote Access Trojan, similar to a backdoor |
| ###Info Stealer | steals victims information, passwords, or other personal data |
| ###HackTool | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
| ###Hoax | program may deliver a false warning about a computer virus or install a fake AV |
| ###Dropper/Downloader | designed to "install" or download some sort of malware |
| ###Adware | automatically renders advertisements in order to generate revenue for its author.|
| ###PUP/PUA | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
| **Virus** | code that propagates (replicates) across systems with user intervention |
| **Worm** | code that self-propagates/replicates across systems without requiring user intervention |
| **Bot** | automated process that interacts with other network services |
| **Trojan** | malware that is often disguised as legitimate software |
| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means |
| **Rootkit** | masks its existence or the existence of other software |
| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer |
| **RAT** | Remote Access Trojan, similar to a backdoor |
| **Info Stealer** | steals victims information, passwords, or other personal data |
| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV |
| **Dropper/Downloader** | designed to "install" or download some sort of malware |
| **Adware** | automatically renders advertisements in order to generate revenue for its author.|
| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
## Techniques Overview
* [Compression](#compression)