ELI5: What are Malware Types?

Malware is like different kinds of germs that can make your computer sick. Some germs spread when you touch something (like a virus that hides in files you download). Some travel on their own through the air (like worms that jump between computers). Others pretend to be medicine but are actually poison (like trojans that look like helpful programs). Just like doctors need to know different germs to treat them, security people need to know different types of malware to protect against each one.

Overview

Malware (malicious software) is any software intentionally designed to cause damage, gain unauthorized access, or disrupt operations. Understanding malware types is essential for the Security+ exam, as different types have distinct behaviors, delivery mechanisms, and indicators. Modern malware often combines multiple techniques and may operate entirely in memory to evade detection.

Key Concepts

  • Virus: Requires a host file to execute; spreads when the infected file is opened or executed
  • Worm: Self-replicating malware that spreads across networks without user interaction
  • Trojan: Disguised as legitimate software; provides backdoor access or delivers additional payloads
  • Rootkit: Hides deep in the OS (kernel-level or boot-level) to maintain persistent, stealthy access
  • Spyware: Secretly monitors user activity, capturing keystrokes, screenshots, or browsing habits
  • Keylogger: Records keystrokes to capture passwords, credit card numbers, and other sensitive input
  • RAT (Remote Access Trojan): Gives attackers full remote control of a compromised system
  • Fileless malware: Operates entirely in memory using legitimate tools (PowerShell, WMI) — leaves no files on disk
  • Logic bomb: Malicious code that triggers when specific conditions are met (date, user action, system event)
  • Potentially Unwanted Programs (PUPs): Adware, toolbars, and bundled software that may not be strictly malicious but degrades security
  • Polymorphic malware: Changes its code signature with each infection to evade signature-based detection
  • Metamorphic malware: Completely rewrites its own code while maintaining functionality
  • Adware — software that automatically displays or downloads advertisements; may track browsing habits
  • Cryptojacking — unauthorized use of computing resources to mine cryptocurrency

Exam Tips

Remember

Virus = needs host file. Worm = self-replicates over network. Trojan = disguised as legit. Rootkit = hides in OS. Fileless = lives in memory. Polymorphic = changes signature. Know the DELIVERY and BEHAVIOR of each type.

  • Fileless malware is increasingly common and evades traditional antivirus — requires behavioral detection
  • Rootkits may require a full OS reinstall to remove; boot-level rootkits survive standard removal
  • Logic bombs are often planted by malicious insiders

Connections

Practice Questions

Scenario

See case-malware-types for a practical DevOps scenario applying these concepts.