Page 2 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 2
Malware and Web Threats Reference Guide
Guide Introduction Click on each of the following boxes to learn more about the more common malware
types being used by threat actors.
This flipbook is quick reference guide to help you recognize: (1) the various types
of malware used by attackers and (2) the various types of exploits used by threat
actors against web-facing application. While the list of malware types and Malware Types
exploits continue to grow and evolve, this basic knowledge will help you
recognize their purpose and related impacts. Virus
Macro Virus
Types of Malware
Malware (i.e., malicious code or software) has become the most common Boot Sector Virus
approach used by threat actors to compromise a technology asset (e.g., network,
PC, phone, etc.). This is to create this is to create more proper alignment for this Stealth Virus
content.
Typically, the attack would begin with a social engineering attack where an email Polymorphic Virus
(for example) would be sent to their target in an attempt to entice the user to
download an attachment, click an embedded link, etc., which would result in the Multipart Virus
malware being transferred to the asset and executed. This is to create proper al
Self–garbling Virus
The malicious activities conducted by malware may include: Tunneling Virus
• Encrypting some or all of the users’ files
• Collecting personal data for the malware developer to resell
• Redirecting web traffic so that people are pointed toward a specific product
for purchase
• Installing a key logger, which collect sensitive financial information for the
malware author
• Carrying out phishing attacks, fraudulent activities, or various information
warfare activities