Adware : Serves unwanted advertisements
Example: Fireball
Spyware: Collects user activity data without their knowledge
Example: Pegasus
Ransonware: Disrupts the victim's access to their data and withholds it until a ransom is paid.
Example: WannaCry
Fileless Malware :Makes changes to files that are native to the OS
Example: Astaroth
Trojans :Disguises itself as desirable code
Example: Emotet
Worms: Spreads through a network by replicating itself
Example: Stuxnet
Rootkits : Gives hackers remote control of a victim's device
Example: Zacinio
Leyloggers: Monitors users Keystrokes
Example: Ardamax
Mobile Malware : Infects and compromises mobile devices
Example: Triada
Bots: Execute multiple synchronized attacks across various locations.
Example: Echobot
Example: Fireball
Spyware: Collects user activity data without their knowledge
Example: Pegasus
Ransonware: Disrupts the victim's access to their data and withholds it until a ransom is paid.
Example: WannaCry
Fileless Malware :Makes changes to files that are native to the OS
Example: Astaroth
Trojans :Disguises itself as desirable code
Example: Emotet
Worms: Spreads through a network by replicating itself
Example: Stuxnet
Rootkits : Gives hackers remote control of a victim's device
Example: Zacinio
Leyloggers: Monitors users Keystrokes
Example: Ardamax
Mobile Malware : Infects and compromises mobile devices
Example: Triada
Bots: Execute multiple synchronized attacks across various locations.
Example: Echobot