Updated fall 2024/2025. 100% Correct.
2 components of Malware
propagation mechanism, payload
propagation mechanism
the way that a malware object spreads
payload
malicious action the malware performs
viruses
spread by human action
worms
spread by themselves
RTM worm
first major worm outbreak in 1988
Robert T. Morris
infected 10% of the internet
Stuxnet
created in 2010
infiltrated the iranian nuclear facility
first worm that crossed the virtual/physical barrier
damaged uranium enrichment equipment
trojan horse
disguised as beneficial programs
act as advertised and when they are run
deliver their malicious payload behind the scenes
remote access trojan (RAT)
provide backdoors to hacked systems
-allows an attacker to gain remote access to a system
adware
displays advertisements
, adware mechanisms
changes the default search engine
displaying pop-up advertisements
replacing legitimate ads with other ads
spyware
gathers information by key stroke logging
monitoring web browsers
searching hard drives and cloud storage
potentially unwanted programs (PUP)
are slipped onto a system by other software installers
ransomware
blocks access until a ransom is paid
encrypting files with a secret key then selling the key
crypto malware
mines cryptocurrency
steals compute capacity from a users system and uses it to mine cryptocurrency
preventing malware
antimalware software
security patches
user education
backdoors
provide workaround access
backdoor mechanisms
hardcoded accounts
default passwords
unknown access channels
logic bomb
deliver a triggered payload
logic bomb conditions
date/time reach
file contents
API call results
root account