Malware
Terms and concepts you should know
Paul Krzyzanowski
November 25, 2024
- Malware
- Worm
- Virus
- Spyware
- Wiper
- Denial of Service
- Backdoor
- Ransomware
- Infiltration
- Exfiltration
- Trigger (Logic Bomb)
- Dropper, multi-stage dropper
- Bot, botnet, command & control server
- Keylogger
- Windows Hooks
- Zero-day Vulnerability, Exploit
- Zero-click Exploit
- File Infector
- USB and infected firmware
- Autorun
- Data leakage
- Macro Viruses
- Social Engineering
- Deceptive download
- Deceptive pop-up
- Phishing
- Spear Phishing
- Smishing
- Hiding Malicious URLs
- Honeypots
- Trojan Horse, remote access trojan
- Overt vs. Covert Porpose
- Startup Services
- Bootkit
- Rootkit
- Kernel-mode, User-mode, and Hypervisor Rootkits
- File-less malware
- Typosquatting
- Masquerading links
- Malicious QR codes
- SPF (Sender Policy Framework)
- DKIM (DomainKeys Identified Mail)
- DMARC (Domain-based Message Authentication, Reporting, and Conformance)
- Signature-based Detection
- Behavior-based Detection (Heuristic Analysis)
- Signature Scanning
- Encrypted malware
- Packing, packer
- Polymorphic Virus
- Static Heuristic Analysis
- Dynamic Heuristic Analysis