What Is Malware? - Definition and Examples - Cisco
What Is Malware? - Definition and Examples - Cisco
Security
Malware
What is malware?
By continuing to use our website, you acknowledge the
use of cookies.Malware, short for malicious software, refers to any intrusive
software developed by cybercriminals (often called hackers)
Privacy Statement Change Settings
to steal data!
andContact
damage or Cisco
destroy computers and
computer systems. Examples of common malware include
viruses, worms, Trojan viruses, spyware, adware, and
ransomware. Recent malware attacks have exEltrated data in
mass amounts.
Destruction or vandalism
Destroys computer systems to damage your network
infrastructure.
Monetary gain
Sells your organization's intellectual property on the dark
web.
Product
Cisco Umbrella
ETectively protect your users against malware in
minutes with fast, Uexible, cloud-delivered security.
Explore Umbrella
:
Product
Secure Email
Rapidly detect, quarantine, investigate, and
remediate cyberattacks that target your email.
Product
Secure Firewall
Improve security with intelligent control points,
uniEed, dynamic policies, and threat visibility.
7 types of malware
:
Virus
Viruses are a subgroup of malware. A virus is malicious
software attached to a document or Ele that supports macros
to execute its code and spread from host to host. Once
downloaded, the virus will lie dormant until the Ele is opened
and in use. Viruses are designed to disrupt a system's ability
to operate. As a result, viruses can cause signiEcant
operational issues and data loss.
Worms
A worm is a type of malicious software that rapidly replicates
and spreads to any device within the network. Unlike viruses,
worms do not need host programs to disseminate. A worm
infects a device through a downloaded Ele or a network
connection before it multiplies and disperses at an
exponential rate. Like viruses, worms can severely disrupt the
operations of a device and cause data loss.
Trojan virus
Trojan viruses are disguised as helpful software programs.
But once the user downloads it, the Trojan virus can gain
access to sensitive data and then modify, block, or delete the
data. This can be extremely harmful to the performance of
the device. Unlike normal viruses and worms, Trojan viruses
are not designed to self-replicate.
Spyware
Spyware is malicious software that runs secretly on a
computer and reports back to a remote user. Rather than
simply disrupting a device's operations, spyware targets
sensitive information and can grant remote access to
:
predators. Spyware is often used to steal Enancial or
personal information. A speciEc type of spyware is a
keylogger, which records your keystrokes to reveal
passwords and personal information.
Adware
Adware is malicious software used to collect data on your
computer usage and provide appropriate advertisements to
you. While adware is not always dangerous, in some cases
adware can cause issues for your system. Adware can
redirect your browser to unsafe sites, and it can even contain
Trojan horses and spyware. Additionally, signiEcant levels of
adware can slow down your system noticeably. Because not
all adware is malicious, it is important to have protection that
constantly and intelligently scans these programs.
Ransomware
Ransomware is malicious software that gains access to
sensitive information within a system, encrypts that
information so that the user cannot access it, and then
demands a Enancial payout for the data to be released.
Ransomware is commonly part of a phishing scam. By
clicking a disguised link, the user downloads the
ransomware. The attacker proceeds to encrypt speciEc
information that can only be opened by a mathematical key
they know. When the attacker receives payment, the data is
unlocked.
Fileless malware
Fileless malware is a type of memory-resident malware. As
the term suggests, it is malware that operates from a victim's
computer's memory, not from Eles on the hard drive.
:
Because there are no Eles to scan, it is harder to detect than
traditional malware. It also makes forensics more diQcult
because the malware disappears when the victim computer
is rebooted. In late 2017, the Cisco Talos threat intelligence
team posted an example of Eleless malware that they called
DNSMessenger.
What is a Erewall?
A Erewall decides whether to allow or block speciEc
traQc based on security rules.
Explore firewalls
What is phishing?
Phishing attacks are the practice of sending fraudulent
communications that appear to come from a reputable
source.
Explore phishing
What is cybersecurity?
Cybersecurity is the practice of protecting systems,
networks, and programs from digital attacks.
Explore cybersecurity
Explore ransomware
Report
Quick Links -
About Cisco
Contact Us
:
Careers
Help
Privacy Statement
Cookies
Accessibility
Trademarks
Sitemap