How it typically works?
- Delivery: malware is introduced into a system through phishing, drive-by downloads, software vulnerabilities, or malicious USB devices.
- Execution: the code is run, often without the user noticing. It may disguise itself as a legitimate process.
- Persistence: malware ensures it remains active after reboots by modifying system settings or exploiting startup mechanisms.
- Payload: depending on its type, malware can encrypt data, steal credentials, spy on users, or spread to other systems.
Common techniques & variants
- Trojans: disguise as legitimate software to trick users into installation. Famous families include Zeus, Emotet, and TrickBot.
- Worms: self-replicating malware that spreads automatically. Examples include Conficker and SQL Slammer.
- Ransomware: encrypts files and demands ransom. Major outbreaks include WannaCry, NotPetya, and LockBit.
- Spyware: monitors activity and steals data. Notable cases include Pegasus and FinFisher.
- Fileless malware: runs in memory and abuses legitimate tools. Kovter and PowerShell-based attacks are well-known examples.
Impact
Malware can cause data breaches, financial losses, operational downtime, and reputational harm. The consequences extend beyond technical disruption: ransomware can halt hospitals, worms can paralyze corporate networks, and spyware can compromise government officials. For SecOps teams, malware is a top concern because it is constantly evolving, used in both broad criminal campaigns and advanced persistent threats. Its diversity—from stealthy spyware to destructive ransomware—means defenders must prepare for multiple attack vectors and maintain layered defenses.
Further reading
- NIST: Malware. Read more
- CISA: Malware Analysis Reports. Read more
- Europol: Emotet disruption operation. Read more
- Microsoft: Malware overview and trends. Read more
- Kaspersky: Types of malware explained. Read more