There are many types of malware out there—here are a few of the most common.
Adware Adware installs itself on a device without the owner’s consent to display or download advertisements, often in popup form to make money off clicks. These ads often slow a device’s performance. More dangerous types of adware can also install additional software, change browser settings, and leave a device vulnerable for other malware attacks.
Botnets Botnets are networks of infected devices controlled remotely by attackers. These networks are often used for large-scale attacks like
distributed denial-of-service (DDoS) attacks, spamming, or stealing data.
Cryptojacking With the rise in popularity of cryptocurrencies, mining coins has become a lucrative practice. Cryptojacking involves hijacking a device’s computing power to mine cryptocurrencies without the owner’s knowledge, significantly slowing down the infected system. Infections of this type of malware often begin with an email attachment that attempts to install malware or a website that uses vulnerabilities in web browsers or takes advantage of computer processing power to add malware to devices.
Using complex mathematical calculations, malicious cryptojackers maintain the blockchain ledger, or decentralized, digital recordkeeping system, to steal computing resources that allow them to create new coins. Coin mining takes significant computer processing power, however, to steal relatively small amounts of cryptocurrencies. For this reason, cybercriminals often work in teams to maximize and split profits.
Not all coin miners are criminals, though—individuals and organizations sometimes purchase hardware and electronic power for legitimate coin mining. The act becomes criminal when a cybercriminal infiltrates a corporate network against its knowledge to use its computing power for mining.
Exploits and exploit kits Exploits take advantage of vulnerabilities in software to bypass a computer’s security safeguards and install malware. Malicious hackers scan for outdated systems that contain critical vulnerabilities, then exploit them by deploying malware. By including shellcode in an exploit, cybercriminals can download more malware that infects devices and infiltrates organizations.
Exploit kits are automated tools used by cybercriminals to find and exploit known software vulnerabilities, allowing them to launch attacks quickly and efficiently. Software that can be infected includes Adobe Flash Player, Adobe Reader, web browsers, Oracle Java, and Sun Java. Angler/Axpergle, Neutrino, and Nuclear are a few types of common exploit kits.
Exploits and exploit kits usually rely on malicious websites or email attachments to breach a network or device, but sometimes they also hide in ads on legitimate websites.
Fileless malware This type of cyberattack broadly describes malware that doesn’t rely on files—like an infected email attachment—to breach a network. For example, they might arrive through malicious network packets, or small segments of a larger dataset transferred over a computer network, that exploit a vulnerability and then install malware that lives only in the kernel memory. Fileless threats are especially difficult to find and remove because most antivirus programs aren’t built to scan firmware.
Ransomware Ransomware is a type of malware that threatens a victim by destroying or blocking access to critical data until a ransom is paid. Human-operated ransomware attacks target an organization through common system and security misconfigurations that infiltrate the organization, navigate its enterprise network, and adapt to the environment and any weaknesses. A common method of gaining access to an organization’s network to deliver ransomware is through credential theft, in which a cybercriminal could steal an actual employee’s credentials to pose as them and gain access to their accounts.
Attackers using human-operated ransomware target large organizations because they can pay a higher ransom than the average individual—often many millions of dollars. Because of the high stakes involved with a breach of this scale, many organizations choose to pay the ransom rather than have their sensitive data leaked or risk further attacks. However, payment doesn’t guarantee the prevention of either outcome.
As human-operated ransomware attacks grow, the criminals behind the attacks are becoming more organized. In fact, many ransomware operations now use a “ransomware as a service” model, meaning that a set of criminal developers create the ransomware itself and then hire other cybercriminal affiliates to hack an organization’s network and install the ransomware, splitting the profits between the two groups at an agreed-on rate.
Rootkits When a cybercriminal uses a rootkit, they hide malware on a device for as long as possible, sometimes even years, so that it steals information and resources on an ongoing basis. By intercepting and changing standard operating system processes, a rootkit might alter the information that your device reports about itself. For example, a device infected with a rootkit might not show an accurate list of programs that are running. Rootkits might also give administrative or elevated device permissions to cybercriminals, so they gain complete control of a device and can do things like steal data, spy on the victim, and install additional malware.
Spyware Spyware collects personal or sensitive information without the user's knowledge, often tracking browsing habits, login credentials, or financial details, which can be used for identity theft or sold to third parties.
Supply chain attacks This type of malware targets software developers and providers by accessing source codes, building processes, or updating mechanisms in legitimate apps. Once a cybercriminal has found an unsecured network protocol, unprotected server infrastructure, or unsafe coding practice, they break in, change source codes, and hide malware in build and update processes. When the compromised software is sent on to customers, it infects the customers’ systems as well.
Tech support scams An industry-wide issue, tech support scams use scare tactics to trick people into paying for unnecessary technical support services that might be advertised to fix a falsified problem on a device, a platform, or software. With this type of malware, a cybercriminal calls someone directly and pretends to be an employee of a software company or creates clickable advertisements designed to look like system warnings. Once they’ve gained someone’s trust, attackers often urge potential victims to install applications or give remote access to their devices.
Trojans Trojans masquerade as legitimate software to trick people into downloading them. Once downloaded, they might:
- Download and install additional malware, such as viruses or worms.
- Use the infected device for click fraud by artificially inflating clicks on a button, ad, or link.
- Record the keystrokes and websites that you visit.
- Send information (for example, passwords, login details, and browsing history) about the infected device to a malicious hacker.
- Give a cybercriminal control over the infected device.
Worms Mostly found in email attachments, text messages, file-sharing programs, social networking sites, network shares, and removable drives, a worm spreads through a network by exploiting security vulnerabilities and copying itself. Depending on the type of worm, it might steal sensitive information, change your security settings, or stop you from accessing files. Unlike viruses, worms don’t require any human interaction to spread—they replicate on their own.
Viruses Viruses are one of the oldest forms of malware, designed to disrupt or destroy data on infected devices. They typically infect a system and replicate when a victim opens malicious files or email attachments.
Follow Microsoft Security