Malware Types & Threat Mitigation

Key Takeaways

  • Ransomware encrypts user files and demands payment for the decryption key — the best defense is maintaining offline backups and never paying the ransom.
  • Trojans disguise themselves as legitimate software to trick users into installing them; worms self-replicate across networks without user interaction; viruses require a host file and user action to spread.
  • Rootkits are extremely dangerous because they embed themselves at the OS or firmware level, hiding from standard antimalware tools — they may require a full OS reinstall to remove.
  • Phishing uses fake emails/websites that impersonate trusted entities to steal credentials; spear phishing targets specific individuals; whaling targets executives.
  • Anti-malware best practices include keeping definitions updated, running real-time protection, performing regular scans, using multiple layers of defense, and educating users about social engineering.
Last updated: March 2026

Malware Types & Threat Mitigation

Malware Types

Malware TypeHow It WorksSpread Method
VirusAttaches to a host file; executes when the file is openedUser action (opening infected file)
WormSelf-replicating; spreads across networks independentlyNetwork exploitation (no user action needed)
TrojanDisguised as legitimate softwareUser downloads and installs it
RansomwareEncrypts files; demands payment for decryption keyEmail attachments, malicious websites, exploits
SpywareSecretly monitors user activity and steals informationBundled with software, malicious websites
AdwareDisplays unwanted advertisementsSoftware bundles, browser extensions
RootkitHides deep in the OS/firmware to avoid detectionExploits, bundled with other malware
KeyloggerRecords all keystrokes (passwords, messages)Trojans, physical devices, spyware
Botnet/ZombieInfected computer controlled remotely by attackerWorms, trojans
CryptominerUses device resources to mine cryptocurrency secretlyWebsites, malware, browser scripts
Logic BombMalicious code triggered by a specific event or dateInsider threat, hidden in legitimate code
Fileless MalwareOperates in memory only — no files written to diskPowerShell scripts, exploits, macros

Social Engineering Attacks

AttackDescription
PhishingFake emails impersonating trusted entities (banks, IT dept) to steal credentials
Spear PhishingTargeted phishing directed at a specific individual or organization
WhalingPhishing targeting high-level executives (CEO, CFO)
VishingVoice phishing — fraudulent phone calls
SmishingSMS/text phishing
Shoulder SurfingWatching someone enter passwords or sensitive information
TailgatingFollowing authorized personnel into a secured area
Dumpster DivingSearching trash for sensitive documents or information
Evil TwinFake Wi-Fi access point mimicking a legitimate network
PretextingCreating a fabricated scenario to manipulate the victim
BaitingLeaving malware-infected USB drives for victims to find and plug in
Watering HoleCompromising a website frequently visited by the target group

Malware Detection and Removal

Detection Tools

ToolPurpose
Antivirus/AntimalwareReal-time protection and on-demand scanning
Windows DefenderBuilt-in Windows antimalware (free, adequate for most users)
Task ManagerIdentify suspicious processes consuming resources
Autoruns (Sysinternals)View ALL auto-start programs (more comprehensive than msconfig)
Process ExplorerAdvanced process viewer with VirusTotal integration
NetstatCheck for suspicious network connections

Malware Removal Process

  1. Investigate and verify — Identify symptoms of infection (slow performance, pop-ups, unknown processes, strange network activity)
  2. Quarantine the infected system — Disconnect from the network to prevent spread
  3. Disable System Restore — Prevents malware from hiding in restore points
  4. Boot to Safe Mode or use a bootable rescue disk
  5. Run a full antimalware scan with updated definitions
  6. Remove or quarantine detected threats
  7. Run a second scan with a different antimalware tool for verification
  8. Schedule a follow-up scan to ensure the threat is fully eliminated
  9. Re-enable System Restore and create a new restore point
  10. Educate the user on how the infection occurred to prevent recurrence

Special Case: Rootkit Removal

  • Standard antimalware may not detect rootkits
  • Use specialized rootkit scanners (GMER, Kaspersky TDSSKiller, Malwarebytes Anti-Rootkit)
  • May require booting from external media to scan
  • In severe cases, a full OS reinstall is the only reliable solution

Special Case: Ransomware

  • DO NOT pay the ransom — payment does not guarantee file recovery and funds criminal operations
  • Disconnect from the network immediately to stop encryption of network shares
  • Report to law enforcement (FBI IC3 in the US)
  • Restore from clean, verified backups
  • Check nomoreransom.org for free decryption tools
  • Implement stronger email filtering, user training, and backup procedures

Browser Security

ThreatDescriptionPrevention
Malicious browser extensionsExtensions that spy, inject ads, or steal dataOnly install from official stores, review permissions
Pop-up redirectsRedirects to malicious sitesEnable pop-up blocker, keep browser updated
Drive-by downloadsAutomatic download from visiting a websiteKeep browser/plugins updated, use content blockers
Certificate warningsInvalid or expired SSL certificatesDo NOT proceed — the site may be compromised or fake
Browser hijackingHomepage, search engine, or new tab changed without consentRun antimalware, reset browser settings
Test Your Knowledge

A user receives an email that appears to be from their bank, asking them to click a link and verify their account information. What type of attack is this?

A
B
C
D
Test Your Knowledge

Which type of malware self-replicates across networks WITHOUT requiring user interaction?

A
B
C
D
Test Your Knowledge

What is the FIRST step when you suspect a computer is infected with ransomware?

A
B
C
D
Test Your KnowledgeMatching

Match each social engineering attack to its description:

Match each item on the left with the correct item on the right

1
Spear Phishing
2
Vishing
3
Tailgating
4
Evil Twin