Types of malware
Malware comes in many different forms, each with its own technology, objectives, effects, and threats. It is crucial for companies to be aware of the most important types so that they can detect attacks early and take appropriate protective measures. Below is an overview of common types of malware.
Adware
Adware displays unwanted advertising, often in the form of pop-ups or banners. It is often installed unnoticed with free software. In addition to being distracting, adware can also spy on user behavior and thus become a threat to data privacy.
Backdoor
A backdoor is a hidden access point to a system that allows attackers permanent access – often undetected by conventional security software. It is often installed by other types of malware to prepare for later attacks.
Malicious cryptomining (cryptojacking)
In cryptojacking, attackers use other people's systems to mine cryptocurrencies without their consent. The infected devices suffer from high utilization, performance degradation, and increased power consumption – a serious problem both economically and technically.
Botnet
A botnet is a network of infected devices (“bots”) that are remotely controlled to carry out mass attacks such as DDoS attacks. Companies often do not notice that their systems have become part of such networks until the damage is done.
Fileless malware
This malware operates exclusively in the working memory and does not leave any files on the hard drive. This allows it to evade many conventional antivirus programs. It exploits legitimate system processes and is particularly difficult to detect and remove.
Fileless malware with LOLBins
This type of malware uses so-called “Living off the Land Binaries” (LOLBins) – legitimate system tools such as PowerShell or WMIC – to execute itself inconspicuously. It leaves no classic traces on the hard drive, bypasses many security solutions, and makes forensic analysis much more difficult.
Exploits
Exploits specifically target vulnerabilities in software or operating systems to inject malicious code. They are often part of automated attacks and are used by attackers to exploit security vulnerabilities before updates are available.
Keyloggers
Keyloggers record keystrokes such as passwords, credit card details, or confidential information. They run unnoticed in the background and pose a particular threat to accounts and identities. They are often introduced via Trojans or phishing.
Living off the Land techniques
LotL attacks use existing system functions and trusted software to execute malware activities without introducing additional files. This often allows them to remain undetected by traditional security solutions. What makes them particularly dangerous is that they appear to be legitimate actions, but are actually part of targeted attacks.
POS malware
This malware targets point-of-sale systems and steals payment data, especially credit card information. POS malware poses a serious risk to customer data, particularly in retail and hospitality.
Ransomware
Hackers use ransomware to encrypt data and then demand a ransom for its release. It is one of the most dangerous forms of malware because it not only blocks data, but also paralyzes business processes and makes companies vulnerable to blackmail.
RAT (Remote Access Trojan)
A Remote Access Trojan (RAT) allows attackers to completely control a system remotely. This enables them to steal data, manipulate files, or install additional malware – usually without the victim noticing.
Rootkit
Rootkits give attackers deep control over a system and hide their activities from security programs. They are difficult to detect and are often used to permanently hide other malware.
Scareware
Scareware imitates security warnings to trick users into installing supposed protection software. In reality, these are malicious programs or paid software with no useful function – their sole purpose is to exploit fear.
Spyware
Spyware secretly monitors users' behavior, collects data, and forwards it to third parties. It poses a threat to privacy, is often bundled with harmless-looking software, and remains active for long periods of time without being detected.
Trojans
Trojans disguise themselves as useful programs but contain hidden malicious functions. They often open the door to further malware, such as backdoors or keyloggers, and are considered particularly malicious because they deceive users.
Viruses
A computer virus spreads by attaching itself to other files and replicating itself when they are executed. The virus can delete or modify files or disrupt programs – often at a high rate of propagation.
Worms
Worms spread independently across networks without any action on the part of the user. They can cause enormous damage by blocking resources or downloading additional malware. Their rapid spread makes them particularly dangerous.
Zero-day exploits
Zero-day exploits take advantage of previously unknown vulnerabilities in software or operating systems—i.e., security gaps for which no patch yet exists. Attackers can compromise systems before manufacturers can respond. These exploits are particularly valuable and are often used in targeted attacks.