Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering
Malware code on target machine Dependent on users to spread to new machines Virus
Malware code on target machine Sends itself to new machines via , etc. Worm
Pretends to be a gift but hides malware payload inside it Trojan Horse
Rogue Security Software These Trojan horses pretend to be programs that protect you Beware any link that warns your computer may be infected!
After infection, botnets "call home" to command and control (C&C) centers Botnets
Builds from one intrusion to escalate privileges to the root user of a machine Rootkit
Collects data from your computer Spyware
Directs the user to commercial sites Often installs new default page or search engine into browser Adware