Additional Malware Terminology

This text lesson outlines additional Malware terminology that's important to know.

Payload: the part of the malicious code that performs the harmful action. For example stealing data, or connecting to a server.

Shell: program or part of program that allows an attacker to execute commands on a system. The most common type of network shell is a Reverse Shell where the shell connection originates from the infected target and connects back to the attacker.

Botnet: A network of compromised machines controlled by an attacker, the compromised machines are sometimes referred to as Zombies.

Backdoor: Hidden access point into a system, could be put there by developers or via supply chain attacks

Dropper: Malware whose main purpose is to install other malicious files onto the system.

Command and Control (C2): Infrastructure that malware communicates with to receive instructions.

Obfuscation: Techniques that make malware code harder to detect and/or analyze.

Logic Bomb: Malicious code that is triggered when a specific condition is met, for example an employee is let go from a company.

Adware/Bloatware: Displays unwanted ads or has unwanted functionality. Often is bundled in with other legitimate software.

Scareware: Malware that tricks users into thinking they have an infection in order to sell fraudulent or fake solutions.

Persistence: Refers to a malwares ability to survive system reboots.

Cryptominer: A type of malware or payload of malware that uses the infected systems computing resources to mine cryptocurrency.

Last updated