Malware types and classifications: A comprehensive guide
Complete Malware Types & Classifications
Basic Malware Categories
Malware (Umbrella Term)
General term for any malicious software designed to harm, exploit, or gain unauthorized access to systems.
- Includes: All the types listed below
- Purpose: Catch-all category for malicious code
Virus
Self-replicating code that attaches to and infects other files or programs.
- Key trait: Needs a host file to survive and spread
- Spread method: When infected file is executed or shared
- Analogy: Like a biological virus that needs a host cell
- Examples: File infector viruses, macro viruses
Worm
Self-replicating malware that spreads independently across networks without needing a host file.
- Key trait: Can spread automatically without user action
- Spread method: Exploits network vulnerabilities, email, USB drives
- Analogy: Like a parasite that can move between hosts on its own
- Examples: Conficker, WannaCry, Stuxnet
Trojan (Trojan Horse)
Malware disguised as legitimate software that tricks users into installing it.
- Key trait: Appears harmless but contains malicious payload
- Spread method: Social engineering, fake software downloads
- Analogy: Like the wooden horse from Greek mythology
- Examples: Remote Access Trojans (RATs), banking trojans
Rootkit
Stealth malware designed to hide its presence and maintain privileged access.
- Key trait: Operates at system level to avoid detection
- Purpose: Maintain persistent, hidden access
- Detection: Very difficult, requires specialized tools
- Examples: Kernel-level rootkits, bootkit rootkits
Spyware
Surveillance malware that secretly monitors and collects user information.
- Purpose: Steal passwords, browsing habits, personal data
- Stealth: Often runs invisibly in background
- Examples: Keyloggers, screen capture tools, adware
Ransomware
Extortion malware that encrypts data and demands payment for decryption.
- Method: Encrypt files, display ransom demand
- Payment: Usually cryptocurrency for anonymity
- Examples: CryptoLocker, WannaCry, Ryuk
Adware
Advertising malware that displays unwanted advertisements.
- Purpose: Generate revenue through forced ad displays
- Annoyance: Pop-ups, browser redirects, slow performance
- Legality: Sometimes borderline legitimate
Bloatware
Unwanted pre-installed software that comes with new devices or software packages.
- Characteristics: Takes up space, slows system, hard to remove
- Examples: Trial software, manufacturer utilities, bundled apps
- Risk: May contain vulnerabilities or privacy issues
- Legality: Usually legitimate but unwanted
Keylogger
Monitoring software that records every keystroke made on a system.
- Purpose: Steal passwords, sensitive information, personal data
- Types: Hardware keyloggers (physical devices) or software-based
- Detection: Often runs silently in background
- Use cases: Both malicious (credential theft) and legitimate (parental controls)
Backdoor
Hidden access method that bypasses normal authentication to access a system.
- Purpose: Maintain unauthorized access for future use
- Installation: Often installed by other malware or during initial compromise
- Stealth: Designed to remain undetected by users and security tools
- Examples: Hidden user accounts, secret network ports, modified system files
Remote Access Trojan (RAT)
Trojan horse that provides complete remote control of an infected system.
- Capabilities: File access, screen capture, camera/microphone access, command execution
- Control: Attacker can control victim's computer as if sitting at it
- Examples: DarkComet, njRAT, Poison Ivy
- Detection: Often disguised as legitimate remote administration tools
Logic Bomb
Malicious code that remains dormant until triggered by specific conditions.
- Triggers: Specific date/time, system events, user actions, file deletions
- Purpose: Sabotage, revenge, or creating chaos at predetermined time
- Examples: Activate on employee's termination date, trigger after 30 days
- Detection: Very difficult to find until activated
Scareware
Fake security software that tricks users into believing their system is infected.
- Method: Display fake virus warnings, system alerts, security scans
- Goal: Trick users into purchasing fake antivirus or providing personal information
- Examples: "Your computer is infected! Buy our antivirus now!"
- Social engineering: Exploits fear and urgency
Cryptojacking
Unauthorized cryptocurrency mining using victim's computer resources.
- Method: Installs mining software secretly or runs in web browser
- Impact: Slow performance, high CPU usage, increased electricity bills
- Profit: Attacker earns cryptocurrency from victim's computing power
- Detection: Monitor for unexplained high CPU/GPU usage
Network-Based Malware & Botnets
Zombie (Bot)
Infected computer under remote control by cybercriminals.
- Control: Operates without user knowledge, follows commands
- Capabilities: Send spam, launch attacks, mine cryptocurrency, steal data
- Network: Usually part of larger botnet
- Infection: Through malware, viruses, trojans, or exploits
Botnet
Network of infected computers (zombies) controlled centrally by cybercriminals.
- Scale: Can include thousands to millions of infected devices
- Uses: DDoS attacks, spam distribution, cryptocurrency mining, credential theft
- Examples: Conficker, Zeus, Mirai (IoT botnet)
- Control: Managed through Command and Control (C&C) servers
LOC (Low-Observable Characteristics)
Stealth techniques used by advanced malware to avoid detection by security systems.
- Purpose: Remain hidden from antivirus, EDR, and security monitoring
- Techniques:
- Living off the land: Using legitimate system tools (PowerShell, WMI, certutil)
- Process hollowing: Injecting malicious code into legitimate processes
- Fileless operation: Operating entirely in memory
- Encrypted communications: Hiding C&C traffic in legitimate protocols
- Timing attacks: Operating only during specific hours or conditions
- Examples: APTs, advanced rootkits, state-sponsored malware
- Detection: Requires behavioral analysis and advanced threat hunting
File Infector Virus
Traditional virus that infects executable files (.exe, .com files).
- Method: Attaches to program files
- Activation: When infected program runs
- Spread: Through file sharing, infected software
Boot Sector Virus
System-level virus that infects the master boot record (MBR) or boot sectors.
- Location: Disk boot areas that load before operating system
- Impact: Can prevent system from starting
- Persistence: Very hard to remove, loads before antivirus
Macro Virus
Document-based virus that uses macros in office documents.
- Target: Word, Excel, PowerPoint files
- Method: Malicious VBA (Visual Basic) code in documents
- Spread: Email attachments, shared documents
- Examples: Melissa virus, I LOVE YOU worm
Script Virus
Interpreted code viruses using scripting languages.
- Languages: JavaScript, VBScript, PowerShell, Python, batch files
- Method: Malicious scripts that execute when opened
- Common: Email attachments with .js, .vbs, .ps1 extensions
Fileless Malware
Memory-resident malware that operates without creating files on disk.
- Method: Lives entirely in RAM, registry, or legitimate processes
- Detection: Very difficult for traditional antivirus
- Persistence: Uses legitimate system tools (PowerShell, WMI)
- Examples: Living-off-the-land attacks
Memory-Resident Malware
RAM-based malware that stays active in system memory.
- Persistence: Remains active even after initial infection
- Advantage: Faster execution, harder to detect
- Vulnerability: Lost when system reboots (unless has persistence mechanism)
Advanced Persistent Threats
APT (Advanced Persistent Threat)
Sophisticated, long-term cyberattack typically by nation-states or organized groups.
- Characteristics:
- Advanced: Uses zero-day exploits, custom malware
- Persistent: Maintains long-term access (months/years)
- Threat: Highly skilled, well-funded attackers
- Goals: Espionage, intellectual property theft, strategic advantage
- Examples: APT1 (China), Cozy Bear (Russia), Lazarus Group (North Korea)
- Tactics: Social engineering, supply chain attacks, living-off-the-land
AVT (Advanced Volatile Threat)
Note: This is not a standard cybersecurity term. You might mean:
- Advanced Virus Threat: Sophisticated virus variants
- Advanced Vulnerability Threat: Exploits using advanced techniques
- If this was from specific training material, could you clarify the context?
Quick Comparison Table
| Type | Self-Replicate | Needs Host | Network Spread | Stealth Level | Primary Goal | |------|---------------|------------|----------------|---------------|--------------| | Virus | Yes | Yes | No | Medium | Infect files | | Worm | Yes | No | Yes | Medium | Network spread | | Trojan | No | No | No | Medium | Deception/Access | | Rootkit | No | No | No | Very High | Hidden access | | Ransomware | Sometimes | No | Sometimes | Medium | Extortion | | Spyware | No | No | No | High | Data theft | | Keylogger | No | No | No | High | Keystroke capture | | RAT | No | No | Sometimes | Medium | Remote control | | Backdoor | No | No | No | Very High | Hidden access | | Logic Bomb | No | Yes | No | Very High | Time-delayed damage | | Botnet | Via bots | No | Yes | Medium | Distributed control | | Cryptojacking | Sometimes | No | Sometimes | High | Mining cryptocurrency | | Fileless | Varies | No | Varies | Very High | Evasion |
Modern Malware Trends
Hybrid Malware
- Combines multiple techniques (e.g., worm + ransomware)
- More effective and harder to classify
Polymorphic Malware
- Changes its code signature to evade detection
- Each infection looks different to antivirus
Metamorphic Malware
- Completely rewrites itself with each infection
- Most advanced evasion technique
AI-Powered Malware
- Uses artificial intelligence for targeting and evasion
- Adapts behavior based on environment
Key Distinctions for Security+
Virus vs Worm
- Virus: Needs host file, spreads when host is shared
- Worm: Self-sufficient, spreads automatically across networks
Trojan vs Virus
- Trojan: Doesn't replicate, tricks user into installation
- Virus: Replicates and spreads to other files/systems
Malware vs Virus
- Malware: Umbrella term for all malicious software
- Virus: Specific type of malware that replicates via host files
APT vs Regular Malware
- APT: Sophisticated, persistent, targeted, state-sponsored
- Regular Malware: Often automated, widespread, financially motivated
Fileless vs File-based
- Fileless: Operates in memory/registry, harder to detect
- File-based: Creates files on disk, easier for antivirus to find

Test Your Knowledge
Ready to apply what you've learned? Take a quiz and test your understanding of these concepts.