Page 2 - D:\Lori\Documents\CyberSMR24Aug2020\
P. 2

Malware and Web Threats Reference Guide






          Guide Introduction                                                                             Click on each of the following boxes to learn more about the more common malware
                                                                                                         types being used by threat actors.
          This flipbook is quick reference guide to help you recognize: (1) the various types
          of malware used by attackers and (2) the various types of exploits used by threat
          actors against web-facing application. While the list of malware types and                   Malware Types
          exploits continue to grow and evolve, this basic knowledge will help you
          recognize their purpose and related impacts.                                                 Virus

                                                                                                       Macro Virus
          Types of Malware

          Malware (i.e., malicious code or software) has become the most common                        Boot Sector Virus
          approach used by threat actors to compromise a technology asset (e.g., network,
          PC, phone, etc.). This is to create this is to create more proper alignment for this         Stealth Virus
          content.
          Typically, the attack would begin with a social engineering attack where an email            Polymorphic Virus
          (for example) would be sent to their target in an attempt to entice the user to
          download an attachment, click an embedded link, etc., which would result in the              Multipart Virus
          malware being transferred to the asset and executed. This is to create proper al
                                                                                                       Self–garbling Virus
          The malicious activities conducted by malware may include:                                   Tunneling Virus
          • Encrypting some or all of the users’ files
          • Collecting personal data for the malware developer to resell
          • Redirecting web traffic so that people are pointed toward a specific product
            for purchase
          • Installing a key logger, which collect sensitive financial information for the
            malware author
          • Carrying out phishing attacks, fraudulent activities, or various information
            warfare activities
   1   2   3   4   5   6