What is Malware Threats

What is Malware Threats

What is Malware Threats

Malware re is malicious software which when enters the target host, gives an attacker full or limited control over the target. They can either damage or modify the functionalities of target host helping an attacker to steal or destroy information.

Various types of malware

  • Virus
  • Trojans
  • Worms
  • Rootkits
  • Spyware
  • Ransomware


A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector or document.


Trojans are malicious files which are used by the attacker to create a backdoor without the knowledge of the user. It usually deletes or replaces operating system critical files, steal data, send notifications to remote attacker, and remotely control the target. Trojans usually hide behind a genuine code or program or file to avoid getting noted by the user. Behind the original program, it establishes a backdoor connection with the remote attacker.


The worm is a standalone malicious program which spreads from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on the system, which is what allows it to travel unaided. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.


A rootkit is a collection of malicious computer software created to get access to a target computer and often hides its existence or the existence of other software. The term rootkit is a concatenation of “root” (the privileged account on Unix-like operating systems) and the word “kit” (which refers to the software components that implement the tool).

A rootkit can be installed by an attacker directly or remotely by exploiting a known vulnerability. Once installed, it hides and runs with administrator privilege. Rootkit detection is difficult because a rootkit intercepts operating system calls by antivirus and return a good version of the software. It either duplicates or replaces OS system files making it difficult to detect it.


This malware when installed on the target, monitor the Target for every action and report to the remote attacker. Cookie stealing, Password stealing, identity theft, information theft are few attacks which are common using spyware


These are malicious software which restricts access to computer system files and folders asking for an online ransom amount to remove the restrictions.

Usually, they encrypt the data, making the user pay them a huge ransom to get the decrypted data.

Tags: , , , , , , ,

Leave a Reply