196 terms
Malware and exploit terms
Malware and exploit terms describe threats such as malicious software and vulnerability exploitation techniques. Malicious actors may use these techniques to compromise system integrity, confidentiality, and availability.
Potentially unwanted search engine
A potentially unwanted search engine (PUSE) is a program that alters a user's web browser settings without explicit consent, often redirecting their searches to unwanted sites or displaying excessive advertisements.
NXDOMAIN attack
NXDOMAIN attack is a type of Distributed Denial of Service (DDoS) attack that floods a DNS server with requests for domains that don’t exist.
Volumetric attack
Volumetric attack, also known as volumetric DDoS attack, is a type of Distributed Denial of Service (DDoS) attack that uses massive volumes of traffic to attack the target’s network and overwhelm its server resources, effectively making it unavailable to users.
Choke worm
The choke worm was a type of malware from 2001 that spread through MSN Messenger.
Browser modifier
A browser modifier is a type of software that changes how your web browser behaves or appears, often without your permission.
Pulsing zombie attack
During a pulsing zombie attack, compromised devices, called "zombies," send bursts of malicious traffic to a target, causing disruption and evading detection.
Asymmetric Cyberattack
An asymmetric cyberattack is when a small group of attackers or an individual hacker uses technology to cause serious damage to a larger, more powerful organization.
Tunneling Virus
A tunneling virus, or tunneling malware, is a type of malicious software that hides from regular security scans by using special techniques to go undetected.
Zombie computer
A zombie computer is an infected device controlled without its owners’ knowledge.
Zip bomb
A zip bomb is a malicious compressed file designed to crash the system trying to unarchive it.
Zeus virus
The Zeus virus is malicious software, designed to steal banking data through Windows devices.
Zero day
Zero day is a broad term that includes both vulnerabilities and exploits.
XPath injection
An XPath injection is a cyberattack that involves manipulating an application’s XPath (XML path) queries without proper input validation or sanitization.
XML Injection
XML Injection is a cyber attack that exploits vulnerabilities in web applications' handling of XML data.
XML bomb
An XML bomb is a type of DDoS attack where a small piece of code is sent to overwhelm the program that parses XML files and crash the server.
Website defacement
Website defacement is a malicious activity, an attack on a website that changes its visual appearance.
Web shell
A web shell is a program or a script that allows someone to gain access to a web server or website.
Wabbit
The Wabbit virus is self-replicating malware that can adversely affect computer systems.
Virus signature
A virus signature is a set of unique characteristics that a known malware type has.
URL injection
URL injection is a cyberattack where a fake page is created and inserted into a genuine website.
TrickBot
TrickBot is a sophisticated modular malware capable of system reconnaissance, data theft, and ransomware delivery.
Time bomb
A time bomb or a logic bomb is a specific kind of malware that is programmed to activate and execute malicious practices when a specific time comes or certain conditions are met.
TeslaCrypt
TeslaCrypt, a type of ransomware, is malicious software that encrypts files on a victim's computer and demands payment to decrypt them.
Template injection
Template injection is a vulnerability in web applications that generate dynamic content with templates.
SYN flood
A SYN flood, or TCP SYN flood, is a type of denial-of-service (DoS) attack that exploits part of the standard TCP/IP handshake process to overwhelm the targeted server's resources, rendering it unresponsive.
Storm worm
Storm worm refers to a notorious computer worm from 2007.
Stealth virus
A stealth virus is any virus that attacks while trying to avoid detection by antivirus software.
Stalkerware
Stalkerware is a spying software or app that allows someone else to track your device.
SQL injection
SQL injection is a cyberattack that uses malicious SQL code to manipulate a database and access sensitive information.
Spyware
Spyware is software that collects data on a device and passes it to third parties without the device owners’ knowledge or consent.
SpyEye
SpyEye is a type of malware that uses keystroke logging to steal sensitive information from a user’s device and access their online banking account.
Spamware
Spamware is malicious software designed to create, distribute, or facilitate spam, including unwanted messages and advertisements.
Spambot
A spambot is an automated computer program designed to send or post unsolicited spam messages on the internet.
Sneaker bot
A sneaker bot is software designed to automatically and quickly buy limited-edition sneakers or other apparel from online stores.
Snake malware
Snake malware is a sophisticated cyber-espionage tool developed by the Federal Security Service (FSB) of Russia in 2003.
Smurfing
Smurfing is a type of DoS attack that involves sending a large number of ICMP (Internet Control Message Protocol) packets to a target computer or network.
Smurf attack
A smurf attack is a certain type of denial-of-service (DoS) attack.
Shylock
Shylock is a sophisticated banking Trojan malware that is ill-famed for its ability to steal sensitive financial information and carry out fraudulent transactions.
Sharking
Sharking is a cyber exploit that is usually directed toward a card player.
Shamoon
Shamoon is destructive malware designed to overwrite and wipe targeted files, rendering infected systems unusable.
Self-replicating machine
A self-replicating machine is a theoretical concept of a mechanical system that can replicate itself using raw materials from its environment.
Scumware
Scumware is a malicious or undesirable software application that engages in unethical or deceptive practices.
Ryuk ransomware
Ryuk ransomware is ransomware that encrypts essential files on Windows computers and holds companies for Bitcoin ransom.
Rubber ducky attack
A rubber ducky attack, also known as a USB Rubber Ducky attack, is a type of cyberattack that involves a malicious USB device posing as a keyboard.
Rogueware
Rogueware, a subset of scareware, refers to malicious software disguising itself as legitimate security software (an antivirus) or system utilities.
Rogue security software
Rogue security software is harmful software that tricks users into thinking their computer has viruses or malware.
Riskware
Riskware is legitimate software that can be exploited or reused by hackers to wreak havoc on a computer and the whole network.
REvil ransomware
REvil ransomware is a virus that encrypts the victim’s files and holds them hostage until a ransom is paid.
Reverse brute-force attack
A reverse brute-force attack is an indiscriminate cyberattack where the hacker tries one password on as many accounts as possible.
Resource exhaustion
Resource exhaustion happens when a system or system user uses up all the available resources that the system has, leading it to be completely drained.
Resident virus
A resident virus is malware that embeds in the computer memory, enabling it to infect other computer files without even being executed.
Remote access trojan
A remote access trojan is a type of trojan malware that disguises itself as a harmless program but includes a back door for administrative control over the target device.
Quantum hacking
Quantum hacking is the process of finding and using vulnerabilities in quantum communication systems to capture or manipulate the quantum data being transferred.
Qbot
Qbot is a type of Trojan virus that can infect devices with malware.
Pseudoransomware
Pseudoransomware refers to a type of malware that mimics the behavior of ransomware, a virus that encrypts the data on the device and demands a ransom to give it back.
Proxy Trojan
A proxy Trojan is malware that turns an infected computer into a proxy server, allowing attackers to route their internet traffic through it anonymously.
Process hollowing
Process hollowing is a code injection method that replaces parts of the code in a legitimate process without changing how it appears to work.
Poweliks
Poweliks is a type of Trojan malware that can hide in the Windows Registry, making it challenging to detect and remove.
Potentially unwanted application
A potentially unwanted application is an application that installs itself alongside another type of software.
Polymorphic virus
A polymorphic virus is a complex form of malware that creates modified versions of itself (mutates) to avoid detection by security systems.
Polymorphic malware
Polymorphic malware is a wider term for malicious software that can change or mutate its code and appearance to avoid detection.
Pirated software
Pirated software is unauthorized software that entities copy and distribute without permission from the copyright holder.
Ping of death
A ping of death is a denial of service (DoS) attack in which a hacker sends oversized or malformed data packets to crash, destabilize, or freeze the targeted computer.
PHP injection
PHP injection is an application vulnerability allows attackers to exploit PHP applications when performing malicious actions.
Phlashing
Phlashing is a cyberattack that aims to “brick” (make completely useless, akin to a brick) the target system by destroying its firmware or hardware.
Petya
Petya is a family of encrypting ransomware that emerged in 2016.
Payload
A payload is a part of malicious software that performs the hostile action, such as deleting or encrypting data, logging your keystrokes, or sending out spam.
Passive attack
A passive attack refers to an unauthorized attempt to covertly access and monitor network traffic without actually altering or tampering with the data.
Pass the hash
Pass the hash is a hacking technique that allows an attacker to use a hashed password without actually knowing the user's plaintext password.
Packet monkey
Packet monkey is a pejorative term for individuals who intentionally flood servers with large volumes of data packets to cause a denial-of-service (DOS) attack.
Overwriting virus
In cybersecurity, an overwriting virus is a malware that targets files and changes the original code entirely with malicious code.
OGNL injection
OGNL injection is a software application security vulnerability where a hacker uses the OGNL (Object-Graph Navigation Language) to manipulate and execute malicious code within an application.
Nuker
A nuker is a hacker who carries out a nuke — a remote denial-of-service (DoS) attack aiming to bring a computer to a complete halt.
NTP amplification attack
An NTP amplification attack is a type of DDoS attack where the attacker relies on misconfigured or insecurely configured NTP servers that respond to requests from unauthorized sources in order to flood their victims with traffic.
NotPetya
NotPetya, sometimes referred to as Petya, is a destructive cyberattack that masquerades as ransomware.
Netwalker ransomware
Netwalker ransomware is a type of malicious software that encrypts a victim's data, rendering it inaccessible, and then demands a ransom in exchange for the decryption key.
Morris worm
The Morris worm is one of the oldest internet computer worms.
Mode of attack
Mode of attack refers to tactics and strategies attackers use to exploit vulnerabilities in a computer system or network.
Mobile malware
Mobile malware is malicious code or software that targets smartphones, tablets, and other widely used mobile devices to access and exploit private data.
Metamorphic malware
Metamorphic malware is a type of malware that rewrites its code as it makes its way through a system.
Memory rootkit
Memory rootkit refers to a type of malicious software that operates at the kernel or system level of a computer's memory, allowing it to hide and persistently control the compromised system.
Malware sandboxing
Malware sandboxing is a method where experts and analysts run possibly dangerous code or files in a protected space known as a sandbox.
Malware obfuscation
Malware obfuscation is the practice of modifying malicious software (malware) to make it more difficult for cybersecurity measures to identify.
Malware-as-a-service
Malware-as-a-service functions similarly to a legitimate business model like software-as-a-service — access to a user-friendly interface and control panel that lets “customers” manage the software’s activities remotely.
Malvertising
Malvertising is malicious advertising that criminals use to steal data or install malware onto their victims’ devices.
Malicious code
Malicious code is an umbrella term for a variety of harmful computer programming scripts designed to cause damage by creating or exploiting system vulnerabilities.
Malicious active content
Malicious active content is executable code embedded in web pages, emails, or software applications that’s designed to perform malicious actions.
Madware
Madware is a fusion of the words mobile and adware.
Macro virus
A macro virus refers to malicious software propagating via contaminated macro-enabled files, like those in Microsoft Word or Excel.
Logic bomb
A logic bomb is malicious code inserted into a computer system, network, or software, that lies dormant until specific conditions are met.
Locky ransomware
Locky ransomware is a serious global threat known for encrypting sensitive data on computers using complex encryption schemes, such as RSA and AES algorithms.
Leakware
Leakware is a subtype of ransomware, which attacks victims by stealing and threatening to leak sensitive or confidential information.
Kovter
Kovter is an invisible, fileless malware that targets the Windows operating system.
Killware
Killware is a cyberattack deployed to cause serious physical harm or even death.
Keylogger
A keylogger is software or hardware used to record (log) the keys being pressed on a keyboard, often without the user’s knowledge.
JSONP injection
JSONP injection is a security vulnerability that can occur when a website uses JSONP to bypass the same-origin policy in web browsers.
Jackware
Jackware is a type of malicious software that targets computers and IoT devices.
IoT botnet
IoT botnet is a network of IoT devices that are infected by malware and take commands from an attacker.
Internet worm
An internet worm is a type of malware that self-replicates and distributes copies of itself across a network.
Internet bot
An internet bot is a software application that performs automated tasks on the internet for another user or program.
InstallCore
InstallCore is a download manager for distributing and installing software.
Input validation attack
An input validation attack is an unauthorized manual injection of harmful information into a standard user input field.
Industroyer
Industroyer refers to a highly sophisticated and destructive malware that specifically targets industrial control systems (ICS) used in critical infrastructure sectors such as energy, transportation, and manufacturing.
ILOVEYOU
ILOVEYOU (also known as the Love Bug or Love Letter) is one of the most infamous computer worms in the history of malware.
Hybrid attack
A hybrid attack is a type of cyberattack where the perp uses more than one tool to get into a device or network.
Hug of death
The 'hug of death' refers to the unintentional crashing or slowing down of a website or server due to a sudden surge in traffic.
HTML Injection
HTML Injection is a cyberattack where hackers insert malicious code into a web page's input fields, comments, or other user-controllable sections.
Heuristic virus
A heuristic virus is a term that is used to describe viruses due to the way it’s discovered by antivirus software.
HermeticWiper
HermeticWiper is a type of disk-wiping malware designed to penetrate Windows devices and shut them down by destroying files, corrupting the master boot record (MBR), and distressing physical drives.
Greyware
Greyware refers to software that isn’t necessarily carrying malware but is still malicious.
GPS jamming
GPS jamming is the deliberate disruption of Global Positioning System (GPS) signals.
Ghostware
Ghostware refers to a type of malware designed to avoid detection by traditional security measures.
GhostNet
GhostNet is a large-scale cyber spying operation that was discovered in 2009.
GandCrab
GandCrab is a type of ransomware, a malicious software that encrypts a victim's files and demands a ransom to decrypt them.
Fragment overlap attack
A fragment overlap attack is a type of denial of service (DoS) attack that abuses the way devices send data in IP packets (datagrams).
Form grabber
A form grabber is a type of malware specifically designed to steal information that users enter into web forms on internet browsers.
Fork bomb
A fork bomb is a type of denial-of-service (DoS) attack that involves overloading systems by continuously using fork system calls until the systems slow down or become unresponsive.
Flooder
A flooder is malware used to send large amounts of garbage data (a “flood”) to the target, disrupting their communications.
FileRepMalware
FileRepMalware is a tag that many antivirus programs assign to potentially dangerous files.
Fileless malware
Fileless malware is malicious software that works without planting an actual file on the device.
File-infecting Virus
A file-infecting virus is a type of malicious software (malware) that attaches itself to legitimate executable files on a system.
File binder
A file binder is a type of software that combines multiple files into a single one.
Fault injection attack
A fault injection attack is a security breach where an attacker induces errors or “faults“ in a system to cause it to behave in unintended ways.
Fake antivirus
A fake antivirus is malicious software that masquerades as a genuine antivirus application, seeking to deceive users into downloading it.
Expression language injection
Expression language injection is a security vulnerability (weakness) where an attacker is able to insert malicious code into an application's expression (programming) language.
Email virus
Email virus refers to a type of a computer virus that spreads via email messages.
Email bomb
Email bombing is a cyberattack where cybercriminals send large volumes of messages to an email address to overwhelm it.
Elk Cloner
Elk Cloner was among the first computer viruses to spread outside a controlled laboratory environment.
Dyreza
Dyreza is a type of Trojan malware first discovered in 2014.
Duqu
Duqu refers to a sophisticated and stealthy malware discovered in 2011.
Dropper
A dropper is a type of trojan.
Drive-by attack
A drive-by attack is a cyberattack that secretly downloads and installs malicious files onto a user's computer or mobile device without any interaction needed from the user beyond loading the website.
Dridex
Dridex is a highly potent malware that infiltrates Windows-based computers to steal valuable financial information.
Downloader trojan
A downloader trojan is a type of malware designed to install malicious software or files onto a victim’s device (e.g., smartphone or computer) without them knowing.
DNS reflection attack
A DNS reflection attack, also known as a DNS amplification attack, is a type of DDoS attack that exploits open DNS servers to amplify the volume of traffic directed towards a target.
DLL injection
DLL injection is a method, frequently referred to as process injection, where developers and cyberattackers alter a program's functionality by executing extraneous code within another process's realm.
Disassociation attack
Disassociation attack refers to a type of denial of service (DoS) attack on a wireless network.
Data-Sending Trojan
A data-sending trojan is a type of malware.
Cyberthreat
A cyberthreat is any activity, device, software, or person that has the potential to steal, alter, deny, or delete data without permission.
Cyberattack
Cyberattack is a broad term for cybercrime that covers any deliberate assault on computer devices, networks, or infrastructures.
Cyber vandalism
Cyber vandalism is a destructive cyberattack without any obvious profit or ideological motive.
Cyber Pearl Harbor
A Cyber Pearl Harbor refers to a hypothetical cyberattack on the critical infrastructure of a city or nation.
CTB locker
A CTB locker is a type of ransomware and is part of the crypto-ransomware family.
Cryptowall
Cryptowall is a malicious program that encrypts a user's data, making it impossible to access, and then demands payment in cryptocurrency as ransom to restore it.
Cryptovirus
A cryptovirus is a type of malicious software that encrypts the victim's files, making them inaccessible until a ransom is paid.
Cryptovirology
Cryptovirology is the study of combining cryptographic techniques and computer virology to create powerful malware (e.g., ransomware).
Cryptolocker ransomware
Cryptolocker ransomware is a trojan virus that targets Windows devices.
Crypto malware
Crypto malware (or cryptojacking) is malicious software that mines cryptocurrencies on the victim’s computer without their knowledge or consent.
CryptBot
CryptBot refers to an infostealer targeting Windows operating systems.
Creepware
Creepware refers to malicious software, designed to invade the privacy of individuals without their knowledge or consent, spy on their activities, and report data back to the attacker.
Creeper virus
The Creeper virus was a worm, which is the type of virus that spreads itself by replicating and hopping from one device to another.
CoreBot
CoreBot is a notorious banking Trojan that emerged in 2015.
Copy-paste compromise
A copy-paste compromise is a cyberattack that primarily uses publicly available open-source code or exploits known vulnerabilities.
Conficker worm
Conficker is a type of computer worm that targets Microsoft Windows operating systems.
Computer worm
A computer worm is a type of malware that replicates — spreads copies of itself — from computer to computer.
Computer virus
Computer virus refers to malicious software created to harm a file or a device.
Computer network attack
A computer network attack seeks to harm the normal functioning of a system.
Command injection
Command injection is a cyber attack involving the execution of malicious commands in apps or computer systems.
Code injection
Code injection is an attack that involves malicious code being injected into an application.
Clop ransomware
Clop ransomware is a notorious malicious software that encrypts the victim's files, rendering them inaccessible until a ransom is paid.
Chernobyl packet
A Chernobyl packet triggers a broadcast storm in computer networks by exploiting vulnerabilities in network protocols or device configurations.
Chargeware
Chargeware is malware disguised as legitimate software, service, or a free application that often tempts users with enticing and unrealistic features.
C&C server
A C&C server is a centralized server or a network of servers used by attackers to manage and control compromised devices or systems within a botnet or malware network.
Carberp
Carberp is a type of malware that targets computers and is specifically designed to steal sensitive information, especially financial data.
Camfecting
In cybersecurity, camfecting refers to accessing and controlling a user's webcam without their knowledge or consent.
Brute-force attack
A brute-force attack is a a rapid trial-and-error approach to guess the correct password, PIN, or encryption keys to gain access to any password-protected account, platform, or system or to decrypt password-protected data.
Browser hijacking
Browser hijacking happens when a user’s internet browser settings are modified without the user’s permission.
Browser hijacker
Browser hijacker is a piece of malicious software that takes control of your browser, redirecting you to specific pages and altering your settings.
Bot herder
Bot herder refers to a person or group of individuals who control a botnet, a network of compromised computers.
Bootkit
A bootkit is a malicious program or malware that modifies a computer's master boot record.
Booter
Booter is a DDoS attack offered as a software-as-a-service by cybercriminals to anyone who wants to perform the attack.
Boot sector virus
A boot sector virus is a type of computer virus that infects the boot sector (space reserved for essential instructions on how to start up) of a storage device — typically the master boot record of a hard drive.
Bloatware
Bloatware is software you don’t want that slows down your device.
Blended threat
A blended threat is a type of cyberattack that combines multiple methods and techniques in order to exploit vulnerabilities of the target network or system.
Bladabindi
Bladabindi is trojan virus that allows the cybercriminal to gain access to the infected device through a back door.
BlackEnergy
BlackEnergy is a complex malware strain initially designed to launch distributed denial-of-service (DDoS) assaults.
Birthday attack
A birthday attack is an attack that occurs when someone exploits the mathematics behind the birthday problem in probability theory to launch a cryptographic attack.
Beaconing
Beaconing is a signal malware sends out to the command and control server, indicating that it has infected a device and asking for further instructions.
Bait app
Bait apps are mobile apps designed to lure users into downloading them by promising features that do not exist.
BadUSB
BadUSB is a type of cyberattack that uses compromised USB devices to execute malicious code.
Backdoor
A backdoor is an undocumented way to bypass existing cybersecurity measures and gain access to the target system.
Autorun worm
Autorun worms are types of malware that can spread through removable media or hardware, like CDs or USB flash drives.
Armored virus
An armored virus, or an encrypted virus, is a malicious computer program designed to conceal its code by encrypting its payload (the part responsible for carrying out malicious actions).
Anna Kournikova virus
Anna Kournikova virus was a cyber threat that began to spread worldwide in February 2001.
AFTS
AFTS (or Automatic Funds Transfer Services) is a payment processing platform specializing in secure money transfers and address verification.
Advanced persistent threat
An advanced persistent threat is a criminal group that gains access to a network and performs malicious activities.
Advanced evasion technique
An advanced evasion technique is a cyberattack that enables the hacker to access a network without authorization and detection.
Active attack
An active attack is when an attacker attempts to break into a system and change the existing data, affect operations, or take control of the hardware device.
The importance of malware and exploit terminology
Understanding the malware and exploit terminology helps you recognize, respond to, and prevent cyber threats before they can wreak havoc on online systems.
Know what to do
Learning the difference between a trojan and a worm can help you better understand how to combat these and malware and exploit threats.
Learn how cyber threat prevention works
Along with cyber threat terminology, the glossary provides steps to safeguard against the most common malware and exploit techniques.
Notice the threats before they occur
Understanding how malware and exploit works will help you spot potential cyber threats before they can cause harm.
Online security starts with a click.
Stay safe with the world’s leading VPN
Explore related articles
Explore related glossary categories
Can’t find an answer to your question?
Ask the questions that matter to you — and get answers from our cybersecurity experts.