Common methods of attack and types of malware

Authors Avatar by bheath (student)

Common methods of attack and types of malware

Some of the more common types of attacks are hoaxes, password cracking, denial of service attacks/distributed denial of service attacks, fake antivirus attacks, etc.  Other terms to be familiar with include spoofing, which is essentially impersonating, phishing, which is impersonating and trying to get information; spear phishing which is replicating a common site to try to get more information from people; whaling – which is focusing on trying to get specific information on high-profile people; and vhishing which is using voice mail to drive to a website.

Malware is simply unauthorized software that’s placed on someone’s computer with their knowledge or consent.  Malware is meant to infect a computer system, conceal the actions and make some monetary gain.  There are a number of types of malware, including:

  1. Viruses – requires a transport vehicle, like e-mail, and user action (like opening a file) to launch a program that can do various types of activities like erasing files, causing crashes, etc.
  2. Worms – unlike viruses, worms do not require a user action and they can travel by themselves.  Worms perform similar functions as viruses
  3. Trojan Horse – program that’s advertised to perform one function, but actually perform a malicious function.
  4. Rootkit – software to break into a computer to perform unauthorized functions – VERY difficult to find an remove
  5. Logic bombs – program that’s designed to trigger based on some logic
  6. SPAM – unsolicited e-mail
  7. Spyware – designed to spy – includes adware and key-loggers
Join now!

Who are the attackers?

Attackers can be a variety of people – hackers, script kiddies, employees, spies, cyber-terrorists or cyber-criminals.

  1. Hackers are essentially anyone who illegally breaks into a computer or uses a computer for use not originally authorized for.  Most hackers have strong technical skills, are motivated by thrill or some sense of power, and typically do damage as a by-product of their illegal activity
  2. Script kiddies, like hackers, illegally break into a computer or use it for unauthorized purposes.  Unlike hackers, they are not as technically savvy – they usually download scripts from ...

This is a preview of the whole essay