mirror of
https://github.com/aljazceru/securedorg.github.io.git
synced 2025-12-20 15:34:19 +01:00
adding malware families
This commit is contained in:
28
malware.md
28
malware.md
@@ -18,20 +18,20 @@ title: Malware Techniques
|
||||
|
||||
| Class | Description |
|
||||
| --- | --- |
|
||||
| ###Virus### | code that propagates (replicates) across systems with user intervention |
|
||||
| ###Worm | code that self-propagates/replicates across systems without requiring user intervention |
|
||||
| ###Bot | automated process that interacts with other network services |
|
||||
| ###Trojan | malware that is often disguised as legitimate software |
|
||||
| ###Ransomware | malware that holds the victim's data hostage by cryptography or other means |
|
||||
| ###Rootkit | masks its existence or the existence of other software |
|
||||
| ###Backdoor | enables a remote attacker to have access to or send commands to a compromised computer |
|
||||
| ###RAT | Remote Access Trojan, similar to a backdoor |
|
||||
| ###Info Stealer | steals victims information, passwords, or other personal data |
|
||||
| ###HackTool | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
|
||||
| ###Hoax | program may deliver a false warning about a computer virus or install a fake AV |
|
||||
| ###Dropper/Downloader | designed to "install" or download some sort of malware |
|
||||
| ###Adware | automatically renders advertisements in order to generate revenue for its author.|
|
||||
| ###PUP/PUA | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
|
||||
| **Virus** | code that propagates (replicates) across systems with user intervention |
|
||||
| **Worm** | code that self-propagates/replicates across systems without requiring user intervention |
|
||||
| **Bot** | automated process that interacts with other network services |
|
||||
| **Trojan** | malware that is often disguised as legitimate software |
|
||||
| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means |
|
||||
| **Rootkit** | masks its existence or the existence of other software |
|
||||
| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer |
|
||||
| **RAT** | Remote Access Trojan, similar to a backdoor |
|
||||
| **Info Stealer** | steals victims information, passwords, or other personal data |
|
||||
| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
|
||||
| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV |
|
||||
| **Dropper/Downloader** | designed to "install" or download some sort of malware |
|
||||
| **Adware** | automatically renders advertisements in order to generate revenue for its author.|
|
||||
| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
|
||||
|
||||
## Techniques Overview
|
||||
* [Compression](#compression)
|
||||
|
||||
Reference in New Issue
Block a user