Computer Virus Classification

Computer Virus Classification

Computer Virus Classification

Type Main Characteristics Infection Method / Behavior Examples
File Infector Attaches to executable files and replicates when executed. Infects .exe or .com files. CIH (Chernobyl)
Boot Sector Virus Infects boot sector; runs when the OS boots. Via bootable media like USB or floppy disks. Stoned, Michelangelo
Macro Virus Embedded in Office macros (e.g. Word, Excel). Via email attachments or documents. Melissa, Concept
Worm Self-replicates and spreads over networks. Email, shared folders, or exploits. ILOVEYOU, Blaster
Trojan Horse Masquerades as legitimate software but performs malicious actions. Disguised downloads; does not self-replicate. Zeus, Emotet
Ransomware Encrypts files and demands ransom. Email, malicious sites, or Trojans. WannaCry, Locky
Spyware Secretly collects user information. Bundled with freeware or ads. CoolWebSearch
Adware Displays unwanted ads, often considered nuisance. Via free apps or browser plugins. Fireball, Gator
Rootkit Hides malware deep in OS to avoid detection. Installed post-intrusion to conceal presence. HackerDefender
Backdoor Provides remote control for attackers. Often installed with Trojans. Sub7, NetBus
Bot / Botnet Turns infected machines into controllable units for mass attacks. Communicates with C&C servers after infection. Mirai, Srizbi
Polymorphic Virus Mutates code to avoid detection. Often part of worms or infected files. Storm Worm

Comments

Popular posts from this blog

Japan Jazz Anthology Select: Jazz of the SP Era

In practice, the most workable approach is to measure a composite “civility score” built from multiple indicators.