Types of Malware and their Function

Types of Malware

Viruses
A computer virus is a type of malware that replicates itself by modifying other computer programs and inserting its own code. When executed, it spreads by infecting other programs
.Worms
A computer worm is a standalone malware program that replicates itself to spread to other computers, typically using computer networks. Unlike viruses, worms don't need a host program to spread
.Trojans
A Trojan horse is malware that disguises itself as a standard program to mislead users about its true intent. It doesn't replicate itself but can cause damage once installed
.Remote Access Trojan (RAT)
A RAT is a type of malware that allows remote control of a computer through the internet. It can perform actions like moving the mouse, typing, or accessing the webcam
.Backdoor
A backdoor is a method that allows unauthorized users to bypass normal security measures and gain access to a system
.Rootkit
A rootkit is a collection of malicious software tools that provide remote access and control over a computer. They often prevent detection by deactivating antivirus software
.Spyware
Spyware is malware that secretly gathers information about the user, including browsing history, downloads, usernames, passwords, and emails
.Keylogger
A keylogger is a type of spyware that records every key pressed on a keyboard and sends this information to the cybercriminal
.Ransomware
Ransomware is malware that blocks access to the victim's personal data and computer unless a ransom is paid
.Fileless Malware
This type of malware exists only in the computer's memory (RAM) and doesn't write any part of its activity to the hard drive, making it harder to detect
.Adware
Adware is malware that displays unwanted advertisements and often collects user data for targeted advertising
.RAM Scraper
This malware typically targets point-of-sale systems to collect personal information like credit card numbers and PINs
.Browser Hijacker
Browser hijacking software changes web browser settings without user permission, often altering homepages, search engines, or injecting unwanted ads
.Cryptojacker
Cryptojacking malware secretly exploits a computer to mine cryptocurrencies, often slowing down the system significantly
.Rogue Security Software
This malware misleads users into believing their computer has a virus and tricks them into paying for a fake removal tool that actually installs more malware
.Wiper
A wiper is malware designed to erase a computer's memory, destroying all useful information in the process
.