Skip to content

Commit

Permalink
adding malware families
Browse files Browse the repository at this point in the history
  • Loading branch information
Amanda Rousseau committed Mar 20, 2017
1 parent 55584d4 commit 4ab7fce
Showing 1 changed file with 14 additions and 14 deletions.
28 changes: 14 additions & 14 deletions malware.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,20 +18,20 @@ title: Malware Techniques

| Class | Description |
| --- | --- |
| ###Virus### | code that propagates (replicates) across systems with user intervention |
| ###Worm | code that self-propagates/replicates across systems without requiring user intervention |
| ###Bot | automated process that interacts with other network services |
| ###Trojan | malware that is often disguised as legitimate software |
| ###Ransomware | malware that holds the victim's data hostage by cryptography or other means |
| ###Rootkit | masks its existence or the existence of other software |
| ###Backdoor | enables a remote attacker to have access to or send commands to a compromised computer |
| ###RAT | Remote Access Trojan, similar to a backdoor |
| ###Info Stealer | steals victims information, passwords, or other personal data |
| ###HackTool | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
| ###Hoax | program may deliver a false warning about a computer virus or install a fake AV |
| ###Dropper/Downloader | designed to "install" or download some sort of malware |
| ###Adware | automatically renders advertisements in order to generate revenue for its author.|
| ###PUP/PUA | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |
| **Virus** | code that propagates (replicates) across systems with user intervention |
| **Worm** | code that self-propagates/replicates across systems without requiring user intervention |
| **Bot** | automated process that interacts with other network services |
| **Trojan** | malware that is often disguised as legitimate software |
| **Ransomware** | malware that holds the victim's data hostage by cryptography or other means |
| **Rootkit** | masks its existence or the existence of other software |
| **Backdoor** | enables a remote attacker to have access to or send commands to a compromised computer |
| **RAT** | Remote Access Trojan, similar to a backdoor |
| **Info Stealer** | steals victims information, passwords, or other personal data |
| **HackTool** | admin tools or programs that may be used by hackers to attack computer systems and networks. These programs are not generally malicious |
| **Hoax** | program may deliver a false warning about a computer virus or install a fake AV |
| **Dropper/Downloader** | designed to "install" or download some sort of malware |
| **Adware** | automatically renders advertisements in order to generate revenue for its author.|
| **PUP/PUA** | Potentially Unwanted Program, sometimes added to a system without the user's knowledge or approval |

## Techniques Overview
* [Compression](#compression)
Expand Down

0 comments on commit 4ab7fce

Please sign in to comment.