Kit
📹 Join the wait list
Video Description
FULL SECURITY+ IN 31 DAYS COURSE
📹 Join the wait list - https://certbros.kit.com/01730e35f7
BOSON PRACTICE EXAMS
✔ Best practice exams - https://www.certbros.com/security-plus/exsim
HAVE A QUESTION?
💬 Discord - https://www.certbros.com/discord
Disclaimer: Some of these are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you.
---------------------------------------------------------------------------------------------------------------
In this video, you will learn what malware is, why threat actors use it, how malware spreads, and the most common types of malware you need to know for CompTIA Security+.
What is malware
Malware is short for malicious software. It is any software designed to cause harm, such as:
- Stealing personal information or credentials
- Spying on users through compromised devices
- Encrypting files and demanding payment in ransomware attacks
- Disrupting or destroying systems and data
Malware evolves constantly and can range from simple scams to highly sophisticated targeted attacks.
Why attackers use malware
Attackers use malware for different goals at different stages of an attack, including:
- Gaining initial access to a system or network
- Stealing data such as passwords, banking details, or sensitive files
- Maintaining persistence and running additional stages of an attack
- Holding data hostage for ransom
- Causing disruption or destruction
Whether the motive is financial gain, espionage, or sabotage, malware helps threat actors achieve their objectives quickly and at scale.
How malware infects systems
Malware can be delivered in several ways. The most common infection vectors include:
- Email attachments and malicious links. Attackers send phishing emails containing harmful files or links that download malware when opened or clicked.
- Malicious websites. Some sites trick users into downloading malware disguised as legitimate software, tools, or games.
- Drive by downloads. A drive by download can silently install malware by exploiting a vulnerability in the web browser or related plugins, sometimes with little or no user interaction.
- Infected USB devices. Untrusted removable media can carry malware that runs when the device is plugged in.
- Manual installation by attackers. If an attacker already has access, they may install additional malware to expand control, move laterally, or deploy ransomware.
Types of malware explained
Many people use “virus” to describe all malware, but a virus is only one type. In this lesson we introduce the main malware categories, including:
- Viruses
- Worms
- Trojans
- Spyware
- Adware
- Remote Access Trojans (RATs)
- Ransomware
- Rootkits
- Logic bombs
Attackers often combine these tools. For example, a trojan can be used to gain a foothold, then deploy ransomware to encrypt files or spyware to steal information in the background.