Malware is the short form of malware. As the name suggests, a legal code is one that makes things illegal. They are deliberately created with the aim of causing serious damage to the targeted system and performing various actions such as stealing, encrypting, deleting, changing sensitive data or capturing and monitoring the user's computer activities without their knowledge or permission.
There are different types of malware. These are computer viruses, worms, trojans, ransomware, spyware, adware, scammers, scaremongers, spam (or spam), bots, fileless malware.

Statistics from Earthweb show that 2023 will see a significant increase in malware incidents both in the US and around the world. These statistics provide valuable insight into the evolving landscape of cyber security threats.


Malware Classifications:

Computer Virus:

A virus is a small piece of malicious software code that can copy itself and spread from host to host by attaching itself. Initially, the virus is inactive until the file is opened and used. Viruses are designed to hinder system performance. Because the impact of these viruses can cause loss of confidential data and system failures.

Ex: Blaster, Slammer, Nimda, Code-Red, Creeper.

Computer Worms:

Worms are self-replicating malware that spread to any device on a network. Worms cause at least some damage to the network, while viruses always corrupt or modify sensitive files on the target computer.

Example: Morris worm, Daprosy worm, Kak worm.


Trojan horse virus:

A Trojan horse is a type of malware that is designed to perform one function, such as removing a virus, but actually performs a malicious function while performing it. Once downloaded by a user, a Trojan virus can enter a specific target system and perform its tasks, such as accessing a file, modifying or deleting data. Unlike common viruses and worms, Trojans are not designed to replicate.


Eg: Gov-ware Trojan, Trojan-Banker, Trojan DDOS, Trojan-Downloader, Trojan-Dropper.


Ransomware:


Ransomware is a type of cyberattack that requires payment to exchange decryption keys after launching a cyberattack on a computer system. This is usually part of a phishing practice and is becoming increasingly popular among cybercriminals, costing the organization millions each year. Once the attacker receives the payment, the data is unlocked.

Ex: Wanna Cry, Crypto-Locker, LOVE Ransomware.


Adware:


Adware is software that displays unwanted and multiple advertisements. The main purpose of adware is to collect information from users without showing their presence in the system. It is also used for marketing purposes and can slow down your computer. In most cases, this can be done using a cracked version or a freeware version.

Eg: windows that can be opened.


Spyware:


Spyware is unwanted software that infiltrates your computer device and steals your browsing history and sensitive information. In general, it is the collection of user information or computer activity without their knowledge and disclosure to advertisers or third parties.

For example: tracking cookies, startup, rootkit, keyloggers, system monitors.


Rogue Software:

Rogue Software is also a type of malware specially designed to damage or disrupt a computer system in the form of Internet fraud using computer malware to trick users into revealing financial and social account information. As their name suggests, these scam programs "spoof" the Internet and appear in simple Internet searches and social networks.

Ex: PCSecure-System, Antivirus-Master, Spion-Marshal.

Scareware :

Scareware uses social engineering platforms to exploit users' fear and trick them into installing fake antivirus software. This is a tactic that tricks users into believing they need to download or purchase malicious, useless software. It usually starts with unwanted pop-ups etc.,

Eg: AdwarePunisher, SpySheriff.

Spam or Spam:

Spam is the use of communication systems to deliver unsolicited e-mails to many Internet users. The main purpose of spamming is phishing, harassment and commercial advertising.

Eg: Instant messages, e-mails.


Bots:

A bot is a self-propagating malware that attacks a central server and uses multiple networks, commonly known as botnets, to infect. A botnet is a combination of a bot and a network. These are automated programs like crawler, spider. A botnet is often used to overwhelm a system in a Distributed Denial of Service (DDoS) attack.

Eg: execute credentials, open back doors of infected host, harvest emails.


Fileless Malware:

Fileless Malware is not really a separate class of malware, but rather a description of how it is exploited and persisted. This is simply an attack that is performed using methods such as injecting malicious code into scripts or loading malware into memory without writing to disk.

Eg: Windows registry manipulation, adding memory code, scripting techniques.