Vouched

Command Palette

Search for a command to run...

Kit

Kit

📹 Join the wait list

Kit

📹 Join the wait list

CShared byCertBros
From video: Malware Explained | Security+ SY0-701
Published: January 13, 2026

Video Description

FULL SECURITY+ IN 31 DAYS COURSE 📹 Join the wait list - https://certbros.kit.com/01730e35f7 BOSON PRACTICE EXAMS ✔ Best practice exams - https://www.certbros.com/security-plus/exsim HAVE A QUESTION? 💬 Discord - https://www.certbros.com/discord Disclaimer: Some of these are affiliate links. If you purchase using these links, I'll receive a small commission at no extra charge to you. --------------------------------------------------------------------------------------------------------------- In this video, you will learn what malware is, why threat actors use it, how malware spreads, and the most common types of malware you need to know for CompTIA Security+. What is malware Malware is short for malicious software. It is any software designed to cause harm, such as: - Stealing personal information or credentials - Spying on users through compromised devices - Encrypting files and demanding payment in ransomware attacks - Disrupting or destroying systems and data Malware evolves constantly and can range from simple scams to highly sophisticated targeted attacks. Why attackers use malware Attackers use malware for different goals at different stages of an attack, including: - Gaining initial access to a system or network - Stealing data such as passwords, banking details, or sensitive files - Maintaining persistence and running additional stages of an attack - Holding data hostage for ransom - Causing disruption or destruction Whether the motive is financial gain, espionage, or sabotage, malware helps threat actors achieve their objectives quickly and at scale. How malware infects systems Malware can be delivered in several ways. The most common infection vectors include: - Email attachments and malicious links. Attackers send phishing emails containing harmful files or links that download malware when opened or clicked. - Malicious websites. Some sites trick users into downloading malware disguised as legitimate software, tools, or games. - Drive by downloads. A drive by download can silently install malware by exploiting a vulnerability in the web browser or related plugins, sometimes with little or no user interaction. - Infected USB devices. Untrusted removable media can carry malware that runs when the device is plugged in. - Manual installation by attackers. If an attacker already has access, they may install additional malware to expand control, move laterally, or deploy ransomware. Types of malware explained Many people use “virus” to describe all malware, but a virus is only one type. In this lesson we introduce the main malware categories, including: - Viruses - Worms - Trojans - Spyware - Adware - Remote Access Trojans (RATs) - Ransomware - Rootkits - Logic bombs Attackers often combine these tools. For example, a trojan can be used to gain a foothold, then deploy ransomware to encrypt files or spyware to steal information in the background.