Loading content...
Malware—malicious software—is the primary technical mechanism through which security threats materialize in computing systems. Understanding malware taxonomy is essential for security professionals because different malware types require different detection strategies, response procedures, and preventive controls.
The malware landscape has evolved from simple curiosity-driven viruses to sophisticated, profit-driven criminal enterprises. Modern malware often combines multiple techniques, blurring traditional category boundaries. Nevertheless, understanding the fundamental types provides the conceptual foundation for analyzing any malicious software encounter.
By the end of this page, you will understand the complete taxonomy of malware types, including viruses, worms, trojans, ransomware, rootkits, spyware, and advanced persistent threat tooling. You'll learn how each type operates, propagates, and persists—knowledge essential for both detection and defense.
Before examining specific types, we need to understand the dimensions along which malware is classified. Any piece of malware can be characterized by multiple attributes:
Primary classification dimensions:
| Dimension | Question Answered | Examples |
|---|---|---|
| Propagation Method | How does it spread? | Self-replicating (worm), requires host (virus), manual installation (trojan) |
| Payload | What does it do once installed? | Data theft, destruction, encryption, surveillance, resource hijacking |
| Persistence Mechanism | How does it survive reboots? | Registry entries, startup folders, bootkit, fileless techniques |
| Privilege Level | At what level does it operate? | User-mode, kernel-mode, firmware/BIOS-level |
| Stealth Technique | How does it avoid detection? | Encryption, polymorphism, metamorphism, rootkit techniques |
| Target Platform | What systems does it affect? | Windows, Linux, macOS, mobile, IoT, cross-platform |
The Blended Threat Reality:
Modern malware typically combines characteristics from multiple categories. Ransomware, for example, might initially spread like a worm (self-propagating), install itself like a trojan (masquerading as legitimate software), employ rootkit techniques for stealth, and deliver a destructive encryption payload.
The traditional categories we'll examine should be understood as building blocks—describing capabilities that are often combined in real-world threats. Understanding each building block helps you analyze complex, blended threats.
Malware naming is inconsistent across vendors. The same malware may be called 'Emotet' by one company, 'Geodo' by another, and 'Heodo' by a third. When researching specific malware, use identifiers like SHA-256 hashes rather than names for precision. Organizations like MITRE try to standardize naming, but the industry lacks universal conventions.
A computer virus is malicious code that attaches itself to a legitimate host program and requires that host to execute in order to run. Like biological viruses that need host cells to reproduce, computer viruses cannot run independently—they parasitize legitimate software.
Defining characteristics of viruses:
| Virus Type | Infection Target | Mechanism | Historical Example |
|---|---|---|---|
| File Infectors | Executable files (.exe, .com, .dll) | Prepends, appends, or inserts code into executable binaries | CIH (Chernobyl), Sality |
| Macro Viruses | Documents with macro support (Word, Excel) | Embeds in document macros; executes when document opens | Melissa, Concept |
| Boot Sector Viruses | Master Boot Record or Volume Boot Record | Loads before OS; extremely persistent and stealthy | Brain, Stoned, MBR threats |
| Script Viruses | Script files (VBS, JavaScript, PowerShell) | Infects scripts that are executed by interpreters | ILOVEYOU, Anna Kournikova |
| Multipartite Viruses | Multiple targets simultaneously | Combines file and boot infection for resilience | Tequila, Invader |
Virus Lifecycle:
The Importance of User Action:
Viruses are fundamentally limited by their dependency on user execution. A virus in an email attachment does nothing until someone opens it. This makes user education a powerful defense—trained users who don't execute suspicious files significantly reduce virus risk.
In popular usage, 'virus' has become a generic term for all malware—leading to confusion. Technically, viruses are only one malware category defined by their host-dependent, user-triggered replication. Worms spread automatically; trojans masquerade without replicating. Precision matters when discussing threats because each type requires different defenses.
A worm is self-replicating malware that spreads across networks without requiring a host program or user interaction. Unlike viruses that wait for users to execute infected files, worms actively exploit vulnerabilities or abuse network services to propagate automatically.
Key distinctions from viruses:
Worm Propagation Mechanisms:
Worms exploit various channels to spread:
The Exponential Danger:
Worms can spread exponentially because each infected system becomes an active infection vector. The Code Red worm infected 359,000 computers in under 14 hours. The Slammer worm infected 75,000 systems in 10 minutes, doubling infected hosts every 8.5 seconds at its peak. This speed makes worms devastating—they can saturate networks faster than humans can respond.
| Worm | Year | Propagation Method | Impact |
|---|---|---|---|
| Morris Worm | 1988 | Unix remote exploits | First major internet worm; 6,000+ systems; estimated $10M+ damage |
| Code Red | 2001 | IIS buffer overflow | 359,000 servers in 14 hours; defaced websites; DDoS attack |
| SQL Slammer | 2003 | SQL Server UDP overflow | 75,000 systems in 10 minutes; internet-wide slowdown |
| Conficker | 2008 | Windows MS08-067 + USB | 10-15 million systems; largest known botnet of its time |
| Stuxnet | 2010 | USB + network + zero-days | Targeted Iranian nuclear facilities; first known cyber weapon |
| WannaCry | 2017 | EternalBlue SMB exploit | 230,000 systems in 150 countries; hospital disruptions; $4B+ damage |
Every major worm outbreak exploited known vulnerabilities with available patches. WannaCry exploited MS17-010, patched two months before the outbreak. Organizations that applied patches were immune. Worms don't exploit zero-days—they exploit failure to patch known vulnerabilities. Timely patching is the primary worm defense.
A Trojan horse (or simply 'Trojan') is malware that disguises itself as legitimate software to trick users into installing it. Named after the Greek mythology of the wooden horse used to infiltrate Troy, trojans rely on deception rather than exploitation or self-replication.
Defining characteristics:
| Trojan Type | Primary Purpose | Operation Method | Examples |
|---|---|---|---|
| Remote Access Trojan (RAT) | Provide attacker remote control | Opens backdoor; allows remote command execution | DarkComet, njRAT, Poison Ivy |
| Banking Trojan | Steal financial credentials | Injects into browsers; captures banking sessions | Zeus, Emotet, TrickBot |
| Downloader | Fetch and install other malware | Minimal initial footprint; downloads payloads on demand | Many RATs, Smoke Loader |
| Dropper | Deploy malware already contained within | Extracts and executes embedded payloads | Used for modular malware delivery |
| Infostealer | Harvest credentials and sensitive data | Searches for stored passwords, cookies, keys | RedLine, Raccoon, Vidar |
| Proxy Trojan | Route attacker traffic through victim | Turns infected system into anonymization proxy | Used for C2 obfuscation |
Distribution Vectors:
Trojans reach victims through various deceptive channels:
The Social Engineering Core:
Trojans fundamentally exploit human psychology rather than technical vulnerabilities. The attack succeeds when users believe the malware is legitimate. This makes user awareness crucial—technical controls can filter known malicious software, but a convincing enough disguise can bypass technical defenses entirely.
Sophisticated attackers increasingly trojanize legitimate software through supply chain attacks. Rather than creating fake software, they compromise genuine software build processes. The SolarWinds attack (2020) injected malicious code into legitimate IT management software used by 18,000+ organizations. Victims installed trusted software that contained hidden malicious functionality—the ultimate trojan.
Ransomware is malware that denies victims access to their data or systems until a ransom is paid. It represents the industrialization of cybercrime—a business model where technical capability directly converts to revenue. Ransomware has evolved from nuisance attacks into existential threats to organizations.
Ransomware operational models:
| Type | Mechanism | Recovery Challenge | Technical Approach |
|---|---|---|---|
| Crypto Ransomware | Encrypts files with strong cryptography | Decryption requires key held by attacker | AES file encryption + RSA key encryption; keys stored on C2 servers |
| Locker Ransomware | Locks user out of system interface | System inaccessible but data intact | Disables input, blocks desktop access; technically easier to recover |
| Leakware/Doxware | Threatens to publish stolen data | Data already exfiltrated; encryption optional | Double extortion: encrypt + threaten publication |
| Wiper (disguised) | Destroys data while appearing as ransomware | Recovery impossible; destruction is goal | NotPetya destroyed data while displaying ransom demands |
The Ransomware Economy:
Ransomware has evolved into a sophisticated criminal ecosystem:
Modern Attack Pattern:
Modern ransomware groups steal data before encryption, creating double extortion: pay to decrypt AND pay to prevent publication. This defeats traditional backup-based recovery—even with perfect backups, stolen data remains with attackers. Organizations must now treat ransomware as data breach + availability attack. The 2023 MOVEit breach demonstrated mass data exfiltration affecting thousands of organizations.
A rootkit is malware designed to hide its presence (and the presence of other malware) from detection while maintaining persistent privileged access. The term originated from Unix 'root' (administrator) and 'kit' (software tools). Rootkits don't necessarily perform malicious actions themselves—they enable other malware to operate undetected.
Rootkit operating levels:
| Type | Operating Level | Stealth Capability | Detection Difficulty |
|---|---|---|---|
| User-mode Rootkit | Application level; runs as process | Hooks API calls; filters file listings; hides processes | Moderate—kernel-level tools can detect |
| Kernel-mode Rootkit | Operating system kernel; ring 0 | Modifies kernel structures; intercepts all system calls | High—requires specialized detection tools |
| Bootkit | Boot process; loads before OS | Infects MBR/VBR or UEFI; loads rootkit components during boot | Very High—runs before OS defenses load |
| Firmware Rootkit | BIOS/UEFI firmware | Persists in firmware; survives OS reinstallation and disk replacement | Extreme—requires firmware analysis |
| Hypervisor Rootkit | Below operating system; virtual machine layer | OS runs as VM under rootkit control; theoretically undetectable from within | Extreme—Blue Pill concept; mostly theoretical |
Rootkit Techniques:
Hooking: Rootkits intercept system calls and API functions, filtering results before returning to calling programs:
Direct Kernel Object Manipulation (DKOM): Kernel-mode rootkits modify kernel data structures directly:
Persistence Mechanisms:
Firmware rootkits represent the ultimate persistence. The Equation Group's firmware implants survived disk reformatting and OS reinstallation—they lived in hard drive firmware. The LoJax UEFI rootkit (2018) was the first in-the-wild UEFI rootkit discovered by security researchers. Firmware-level threats require hardware replacement or specialized firmware flashing for remediation.
Spyware is malware designed to collect information about a user or organization without consent. While all malware that exfiltrates data could be considered spyware, the term typically refers to software whose primary purpose is surveillance rather than immediate financial gain.
Spyware categories:
| Category | Purpose | Typical Targets | Legal Status |
|---|---|---|---|
| Commercial Spyware | Government surveillance of targets | Journalists, activists, political figures, criminals | Legal for governments; heavily regulated in some jurisdictions |
| Stalkerware | Individual surveillance (partners, family) | Intimate partners, children, employees | Illegal in many contexts; marketed deceptively |
| Corporate Spyware | Industrial espionage | Competitors, trade secrets, strategic plans | Illegal; conducted by criminal actors or nation-states |
| Adware/Tracking | Commercial data collection | General population; advertising profiles | Legal gray area; privacy regulations evolving |
Nation-State Spyware:
Government-grade spyware represents the most sophisticated surveillance capability:
Pegasus (NSO Group):
Predator (Cytrox/Intellexa):
FinFisher/FinSpy:
Data Collection Capabilities:
Modern spyware can capture:
Stalkerware—spyware marketed for monitoring partners, children, or employees—enables domestic abuse, harassment, and illegal surveillance. Despite being illegal when used to monitor adults without consent, stalkerware remains readily available. Studies show stalkerware installation is a common precursor to domestic violence. Security professionals should be aware that detecting stalkerware may alert an abusive partner, potentially escalating danger—victim safety organizations have protocols for this scenario.
A bot is malware that converts an infected system into a remotely controlled agent. When many bots are controlled by a single entity, they form a botnet—a distributed network of compromised systems that can be commanded collectively. Botnets represent force multiplication for attackers, enabling operations that would be impossible from a single system.
Botnet capabilities:
Botnet Architecture:
Centralized (Client-Server):
Decentralized (Peer-to-Peer):
Hybrid:
| Botnet | Peak Size | Primary Use | Status |
|---|---|---|---|
| Mirai | 600,000+ IoT devices | DDoS attacks; record-breaking 1+ Tbps attacks | Source code released; variants still active |
| Necurs | 6+ million systems | Spam; ransomware delivery | Disrupted by Microsoft-led operation (2020) |
| Emotet | 1.5+ million systems | Malware delivery platform | Disrupted, resurrected, disrupted again |
| TrickBot | 1+ million systems | Banking fraud; ransomware delivery | Disrupted but operators reformed under different projects |
| Qakbot | 700,000+ systems | Banking trojan; access broker | Disrupted by FBI (2023); historically resilient |
The Mirai botnet (2016) demonstrated the massive scale possible with IoT device compromise. By scanning for devices with default credentials, Mirai built armies of routers, cameras, and DVRs. The Dyn DDoS attack brought down Twitter, Netflix, Reddit, and major sites for hours. With billions of IoT devices deployed (many with poor security), IoT botnets remain a critical infrastructure threat.
Modern malware employs sophisticated techniques to evade detection, resist analysis, and maintain persistence. Understanding these techniques is essential for defenders because basic detection approaches fail against advanced threats.
Evasion and stealth techniques:
| Technique | Description | Defense Challenge |
|---|---|---|
| Polymorphism | Malware changes its code signature each time it replicates | Signature-based detection fails; behavioral analysis required |
| Metamorphism | Malware completely rewrites its code while preserving functionality | Even behavioral signatures may vary; requires semantic analysis |
| Packing/Encryption | Malicious code is encrypted; decrypted only at runtime | Static analysis sees only decryptor; dynamic analysis needed |
| Fileless Malware | Resides only in memory; no files written to disk | Traditional antivirus ineffective; requires memory forensics |
| Living-off-the-Land (LOTL) | Uses legitimate system tools (PowerShell, WMI, etc.) for malicious purposes | Legitimate tool usage makes detection difficult |
| Sandbox Evasion | Detects analysis environments and alters behavior | Analysis shows benign behavior; malicious actions hidden |
| Anti-debugging | Detects debugger presence; terminates or alters execution | Reverse engineering becomes more difficult |
| Domain Generation Algorithms (DGA) | Generates random domain names for C2 communication | Blocking specific domains impossible; pattern detection needed |
Fileless Malware Deep Dive:
Fileless malware represents a significant evolution in attack techniques:
Why fileless is dangerous:
Detection requires:
Malware development is an adversarial game. As defenders develop detection capabilities, attackers develop evasion techniques. Signature-based detection led to polymorphism. Sandboxes led to sandbox evasion. Behavioral analysis led to living-off-the-land. Modern defense requires layered approaches combining multiple detection methods—no single technique suffices against sophisticated threats.
We've surveyed the major categories of malicious software, from classic viruses to modern fileless threats. This taxonomy provides the vocabulary for discussing specific threats and the conceptual foundation for understanding how malware operates.
What's Next:
With malware types understood, we'll examine Attack Vectors—the pathways through which malware and other threats reach their targets. Understanding how threats are delivered is essential for implementing effective preventive controls.
You now understand the complete taxonomy of malicious software. Each category—virus, worm, trojan, ransomware, rootkit, spyware, botnet—has distinct characteristics that inform both detection strategies and defensive controls. Modern threats often blend multiple categories, but understanding the fundamentals enables analysis of even the most sophisticated malware.