CINXE.COM

Malware - Wikipedia

<!DOCTYPE html> <html class="client-nojs vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Malware - Wikipedia</title> <script>(function(){var className="client-js vector-feature-language-in-header-enabled vector-feature-language-in-main-page-header-disabled vector-feature-sticky-header-disabled vector-feature-page-tools-pinned-disabled vector-feature-toc-pinned-clientpref-1 vector-feature-main-menu-pinned-disabled vector-feature-limited-width-clientpref-1 vector-feature-limited-width-content-enabled vector-feature-custom-font-size-clientpref-1 vector-feature-appearance-pinned-clientpref-1 vector-feature-night-mode-enabled skin-theme-clientpref-day vector-toc-available";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy", "wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"48cda6fb-a3f1-45f2-b052-1cc04ef3bb56","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Malware","wgTitle":"Malware","wgCurRevisionId":1257292404,"wgRevisionId":1257292404,"wgArticleId":20901,"wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgCategories":["Webarchive template wayback links","CS1: long volume value","Articles with short description","Short description is different from Wikidata","Use dmy dates from August 2017","All articles with unsourced statements","Articles with unsourced statements from July 2024","All articles with failed verification","Articles with failed verification from July 2024","Commons category link from Wikidata","Malware","Security breaches","Computer programming","Cybercrime"],"wgPageViewLanguage":"en", "wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Malware","wgRelevantArticleId":20901,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":80000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":false,"wgEditSubmitButtonLabelPublish":true,"wgULSPosition":"interlanguage","wgULSisCompactLinksEnabled":false,"wgVector2022LanguageInHeader":true,"wgULSisLanguageSelectorEmpty":false,"wgWikibaseItemId":"Q14001", "wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.vector.search.codex.styles":"ready","skins.vector.styles":"ready","skins.vector.icons":"ready","jquery.makeCollapsible.styles":"ready","ext.wikimediamessages.styles":"ready","ext.visualEditor.desktopArticleTarget.noscript":"ready","ext.uls.interlanguage":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","jquery.makeCollapsible","mediawiki.toc","skins.vector.js", "ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.ReferenceTooltips","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","mmv.bootstrap","ext.popups","ext.visualEditor.desktopArticleTarget.init","ext.visualEditor.targetLoader","ext.echo.centralauth","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.uls.interface","ext.cx.eventlogging.campaigns","ext.cx.uls.quick.actions","wikibase.client.vector-2022","ext.checkUser.clientHints","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=ext.cite.styles%7Cext.uls.interlanguage%7Cext.visualEditor.desktopArticleTarget.noscript%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cjquery.makeCollapsible.styles%7Cskins.vector.icons%2Cstyles%7Cskins.vector.search.codex.styles%7Cwikibase.client.init&amp;only=styles&amp;skin=vector-2022"> <script async="" src="/w/load.php?lang=en&amp;modules=startup&amp;only=scripts&amp;raw=1&amp;skin=vector-2022"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&amp;modules=site.styles&amp;only=styles&amp;skin=vector-2022"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="viewport" content="width=1120"> <meta property="og:title" content="Malware - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="alternate" media="only screen and (max-width: 640px)" href="//en.m.wikipedia.org/wiki/Malware"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Malware&amp;action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Malware"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="alternate" type="application/atom+xml" title="Wikipedia Atom feed" href="/w/index.php?title=Special:RecentChanges&amp;feed=atom"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="skin--responsive skin-vector skin-vector-search-vue mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Malware rootpage-Malware skin-vector-2022 action-view"><a class="mw-jump-link" href="#bodyContent">Jump to content</a> <div class="vector-header-container"> <header class="vector-header mw-header"> <div class="vector-header-start"> <nav class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-dropdown" class="vector-dropdown vector-main-menu-dropdown vector-button-flush-left vector-button-flush-right" > <input type="checkbox" id="vector-main-menu-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-main-menu-dropdown" class="vector-dropdown-checkbox " aria-label="Main menu" > <label id="vector-main-menu-dropdown-label" for="vector-main-menu-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-menu mw-ui-icon-wikimedia-menu"></span> <span class="vector-dropdown-label-text">Main menu</span> </label> <div class="vector-dropdown-content"> <div id="vector-main-menu-unpinned-container" class="vector-unpinned-container"> <div id="vector-main-menu" class="vector-main-menu vector-pinnable-element"> <div class="vector-pinnable-header vector-main-menu-pinnable-header vector-pinnable-header-unpinned" data-feature-name="main-menu-pinned" data-pinnable-element-id="vector-main-menu" data-pinned-container-id="vector-main-menu-pinned-container" data-unpinned-container-id="vector-main-menu-unpinned-container" > <div class="vector-pinnable-header-label">Main menu</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-main-menu.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-main-menu.unpin">hide</button> </div> <div id="p-navigation" class="vector-menu mw-portlet mw-portlet-navigation" > <div class="vector-menu-heading"> Navigation </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-mainpage-description" class="mw-list-item"><a href="/wiki/Main_Page" title="Visit the main page [z]" accesskey="z"><span>Main page</span></a></li><li id="n-contents" class="mw-list-item"><a href="/wiki/Wikipedia:Contents" title="Guides to browsing Wikipedia"><span>Contents</span></a></li><li id="n-currentevents" class="mw-list-item"><a href="/wiki/Portal:Current_events" title="Articles related to current events"><span>Current events</span></a></li><li id="n-randompage" class="mw-list-item"><a href="/wiki/Special:Random" title="Visit a randomly selected article [x]" accesskey="x"><span>Random article</span></a></li><li id="n-aboutsite" class="mw-list-item"><a href="/wiki/Wikipedia:About" title="Learn about Wikipedia and how it works"><span>About Wikipedia</span></a></li><li id="n-contactpage" class="mw-list-item"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us" title="How to contact Wikipedia"><span>Contact us</span></a></li> </ul> </div> </div> <div id="p-interaction" class="vector-menu mw-portlet mw-portlet-interaction" > <div class="vector-menu-heading"> Contribute </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="n-help" class="mw-list-item"><a href="/wiki/Help:Contents" title="Guidance on how to use and edit Wikipedia"><span>Help</span></a></li><li id="n-introduction" class="mw-list-item"><a href="/wiki/Help:Introduction" title="Learn how to edit Wikipedia"><span>Learn to edit</span></a></li><li id="n-portal" class="mw-list-item"><a href="/wiki/Wikipedia:Community_portal" title="The hub for editors"><span>Community portal</span></a></li><li id="n-recentchanges" class="mw-list-item"><a href="/wiki/Special:RecentChanges" title="A list of recent changes to Wikipedia [r]" accesskey="r"><span>Recent changes</span></a></li><li id="n-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_upload_wizard" title="Add images or other media for use on Wikipedia"><span>Upload file</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> <a href="/wiki/Main_Page" class="mw-logo"> <img class="mw-logo-icon" src="/static/images/icons/wikipedia.png" alt="" aria-hidden="true" height="50" width="50"> <span class="mw-logo-container skin-invert"> <img class="mw-logo-wordmark" alt="Wikipedia" src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" style="width: 7.5em; height: 1.125em;"> <img class="mw-logo-tagline" alt="The Free Encyclopedia" src="/static/images/mobile/copyright/wikipedia-tagline-en.svg" width="117" height="13" style="width: 7.3125em; height: 0.8125em;"> </span> </a> </div> <div class="vector-header-end"> <div id="p-search" role="search" class="vector-search-box-vue vector-search-box-collapses vector-search-box-show-thumbnail vector-search-box-auto-expand-width vector-search-box"> <a href="/wiki/Special:Search" class="cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only search-toggle" title="Search Wikipedia [f]" accesskey="f"><span class="vector-icon mw-ui-icon-search mw-ui-icon-wikimedia-search"></span> <span>Search</span> </a> <div class="vector-typeahead-search-container"> <div class="cdx-typeahead-search cdx-typeahead-search--show-thumbnail cdx-typeahead-search--auto-expand-width"> <form action="/w/index.php" id="searchform" class="cdx-search-input cdx-search-input--has-end-button"> <div id="simpleSearch" class="cdx-search-input__input-wrapper" data-search-loc="header-moved"> <div class="cdx-text-input cdx-text-input--has-start-icon"> <input class="cdx-text-input__input" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f" id="searchInput" > <span class="cdx-text-input__icon cdx-text-input__start-icon"></span> </div> <input type="hidden" name="title" value="Special:Search"> </div> <button class="cdx-button cdx-search-input__end-button">Search</button> </form> </div> </div> </div> <nav class="vector-user-links vector-user-links-wide" aria-label="Personal tools"> <div class="vector-user-links-main"> <div id="p-vector-user-menu-preferences" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-userpage" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-dropdown" class="vector-dropdown " title="Change the appearance of the page&#039;s font size, width, and color" > <input type="checkbox" id="vector-appearance-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-appearance-dropdown" class="vector-dropdown-checkbox " aria-label="Appearance" > <label id="vector-appearance-dropdown-label" for="vector-appearance-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-appearance mw-ui-icon-wikimedia-appearance"></span> <span class="vector-dropdown-label-text">Appearance</span> </label> <div class="vector-dropdown-content"> <div id="vector-appearance-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <div id="p-vector-user-menu-notifications" class="vector-menu mw-portlet emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> <div id="p-vector-user-menu-overflow" class="vector-menu mw-portlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en" class=""><span>Donate</span></a> </li> <li id="pt-createaccount-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:CreateAccount&amp;returnto=Malware" title="You are encouraged to create an account and log in; however, it is not mandatory" class=""><span>Create account</span></a> </li> <li id="pt-login-2" class="user-links-collapsible-item mw-list-item user-links-collapsible-item"><a data-mw="interface" href="/w/index.php?title=Special:UserLogin&amp;returnto=Malware" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o" class=""><span>Log in</span></a> </li> </ul> </div> </div> </div> <div id="vector-user-links-dropdown" class="vector-dropdown vector-user-menu vector-button-flush-right vector-user-menu-logged-out" title="Log in and more options" > <input type="checkbox" id="vector-user-links-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-user-links-dropdown" class="vector-dropdown-checkbox " aria-label="Personal tools" > <label id="vector-user-links-dropdown-label" for="vector-user-links-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-ellipsis mw-ui-icon-wikimedia-ellipsis"></span> <span class="vector-dropdown-label-text">Personal tools</span> </label> <div class="vector-dropdown-content"> <div id="p-personal" class="vector-menu mw-portlet mw-portlet-personal user-links-collapsible-item" title="User menu" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-sitesupport" class="user-links-collapsible-item mw-list-item"><a href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&amp;utm_medium=sidebar&amp;utm_campaign=C13_en.wikipedia.org&amp;uselang=en"><span>Donate</span></a></li><li id="pt-createaccount" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:CreateAccount&amp;returnto=Malware" title="You are encouraged to create an account and log in; however, it is not mandatory"><span class="vector-icon mw-ui-icon-userAdd mw-ui-icon-wikimedia-userAdd"></span> <span>Create account</span></a></li><li id="pt-login" class="user-links-collapsible-item mw-list-item"><a href="/w/index.php?title=Special:UserLogin&amp;returnto=Malware" title="You&#039;re encouraged to log in; however, it&#039;s not mandatory. [o]" accesskey="o"><span class="vector-icon mw-ui-icon-logIn mw-ui-icon-wikimedia-logIn"></span> <span>Log in</span></a></li> </ul> </div> </div> <div id="p-user-menu-anon-editor" class="vector-menu mw-portlet mw-portlet-user-menu-anon-editor" > <div class="vector-menu-heading"> Pages for logged out editors <a href="/wiki/Help:Introduction" aria-label="Learn more about editing"><span>learn more</span></a> </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="pt-anoncontribs" class="mw-list-item"><a href="/wiki/Special:MyContributions" title="A list of edits made from this IP address [y]" accesskey="y"><span>Contributions</span></a></li><li id="pt-anontalk" class="mw-list-item"><a href="/wiki/Special:MyTalk" title="Discussion about edits from this IP address [n]" accesskey="n"><span>Talk</span></a></li> </ul> </div> </div> </div> </div> </nav> </div> </header> </div> <div class="mw-page-container"> <div class="mw-page-container-inner"> <div class="vector-sitenotice-container"> <div id="siteNotice"><!-- CentralNotice --></div> </div> <div class="vector-column-start"> <div class="vector-main-menu-container"> <div id="mw-navigation"> <nav id="mw-panel" class="vector-main-menu-landmark" aria-label="Site"> <div id="vector-main-menu-pinned-container" class="vector-pinned-container"> </div> </nav> </div> </div> <div class="vector-sticky-pinned-container"> <nav id="mw-panel-toc" aria-label="Contents" data-event-name="ui.sidebar-toc" class="mw-table-of-contents-container vector-toc-landmark"> <div id="vector-toc-pinned-container" class="vector-pinned-container"> <div id="vector-toc" class="vector-toc vector-pinnable-element"> <div class="vector-pinnable-header vector-toc-pinnable-header vector-pinnable-header-pinned" data-feature-name="toc-pinned" data-pinnable-element-id="vector-toc" > <h2 class="vector-pinnable-header-label">Contents</h2> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-toc.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-toc.unpin">hide</button> </div> <ul class="vector-toc-contents" id="mw-panel-toc-list"> <li id="toc-mw-content-text" class="vector-toc-list-item vector-toc-level-1"> <a href="#" class="vector-toc-link"> <div class="vector-toc-text">(Top)</div> </a> </li> <li id="toc-History" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#History"> <div class="vector-toc-text"> <span class="vector-toc-numb">1</span> <span>History</span> </div> </a> <ul id="toc-History-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Purposes" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Purposes"> <div class="vector-toc-text"> <span class="vector-toc-numb">2</span> <span>Purposes</span> </div> </a> <ul id="toc-Purposes-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Types" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Types"> <div class="vector-toc-text"> <span class="vector-toc-numb">3</span> <span>Types</span> </div> </a> <button aria-controls="toc-Types-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Types subsection</span> </button> <ul id="toc-Types-sublist" class="vector-toc-list"> <li id="toc-Malware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Malware"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1</span> <span>Malware</span> </div> </a> <ul id="toc-Malware-sublist" class="vector-toc-list"> <li id="toc-Virus" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Virus"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.1</span> <span>Virus</span> </div> </a> <ul id="toc-Virus-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Worm" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Worm"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.2</span> <span>Worm</span> </div> </a> <ul id="toc-Worm-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Rootkits" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Rootkits"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.3</span> <span>Rootkits</span> </div> </a> <ul id="toc-Rootkits-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Backdoors" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Backdoors"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.4</span> <span>Backdoors</span> </div> </a> <ul id="toc-Backdoors-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Trojan_horse" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Trojan_horse"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.5</span> <span>Trojan horse</span> </div> </a> <ul id="toc-Trojan_horse-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Droppers" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Droppers"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.6</span> <span>Droppers</span> </div> </a> <ul id="toc-Droppers-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Ransomware" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Ransomware"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.7</span> <span>Ransomware</span> </div> </a> <ul id="toc-Ransomware-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Click_Fraud" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Click_Fraud"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.1.8</span> <span>Click Fraud</span> </div> </a> <ul id="toc-Click_Fraud-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Grayware" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Grayware"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2</span> <span>Grayware</span> </div> </a> <ul id="toc-Grayware-sublist" class="vector-toc-list"> <li id="toc-Potentially_unwanted_program" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Potentially_unwanted_program"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.1</span> <span>Potentially unwanted program</span> </div> </a> <ul id="toc-Potentially_unwanted_program-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Adware" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Adware"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.2</span> <span>Adware</span> </div> </a> <ul id="toc-Adware-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Spyware" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Spyware"> <div class="vector-toc-text"> <span class="vector-toc-numb">3.2.3</span> <span>Spyware</span> </div> </a> <ul id="toc-Spyware-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> </ul> </li> <li id="toc-Detection" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Detection"> <div class="vector-toc-text"> <span class="vector-toc-numb">4</span> <span>Detection</span> </div> </a> <ul id="toc-Detection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Risks" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Risks"> <div class="vector-toc-text"> <span class="vector-toc-numb">5</span> <span>Risks</span> </div> </a> <button aria-controls="toc-Risks-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Risks subsection</span> </button> <ul id="toc-Risks-sublist" class="vector-toc-list"> <li id="toc-Vulnerable_software" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Vulnerable_software"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.1</span> <span>Vulnerable software</span> </div> </a> <ul id="toc-Vulnerable_software-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Excessive_privileges" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Excessive_privileges"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.2</span> <span>Excessive privileges</span> </div> </a> <ul id="toc-Excessive_privileges-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Weak_passwords" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Weak_passwords"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.3</span> <span>Weak passwords</span> </div> </a> <ul id="toc-Weak_passwords-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Use_of_the_same_operating_system" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Use_of_the_same_operating_system"> <div class="vector-toc-text"> <span class="vector-toc-numb">5.4</span> <span>Use of the same operating system</span> </div> </a> <ul id="toc-Use_of_the_same_operating_system-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Mitigation" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Mitigation"> <div class="vector-toc-text"> <span class="vector-toc-numb">6</span> <span>Mitigation</span> </div> </a> <button aria-controls="toc-Mitigation-sublist" class="cdx-button cdx-button--weight-quiet cdx-button--icon-only vector-toc-toggle"> <span class="vector-icon mw-ui-icon-wikimedia-expand"></span> <span>Toggle Mitigation subsection</span> </button> <ul id="toc-Mitigation-sublist" class="vector-toc-list"> <li id="toc-Antivirus_/_Anti-malware_software" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Antivirus_/_Anti-malware_software"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1</span> <span>Antivirus / Anti-malware software</span> </div> </a> <ul id="toc-Antivirus_/_Anti-malware_software-sublist" class="vector-toc-list"> <li id="toc-Real-time_protection" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Real-time_protection"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1.1</span> <span>Real-time protection</span> </div> </a> <ul id="toc-Real-time_protection-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Sandboxing" class="vector-toc-list-item vector-toc-level-3"> <a class="vector-toc-link" href="#Sandboxing"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.1.2</span> <span>Sandboxing</span> </div> </a> <ul id="toc-Sandboxing-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Website_security_scans" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Website_security_scans"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.2</span> <span>Website security scans</span> </div> </a> <ul id="toc-Website_security_scans-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-Network_Segregation" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#Network_Segregation"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.3</span> <span>Network Segregation</span> </div> </a> <ul id="toc-Network_Segregation-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-&quot;Air_gap&quot;_isolation_or_&quot;parallel_network&quot;" class="vector-toc-list-item vector-toc-level-2"> <a class="vector-toc-link" href="#&quot;Air_gap&quot;_isolation_or_&quot;parallel_network&quot;"> <div class="vector-toc-text"> <span class="vector-toc-numb">6.4</span> <span>"Air gap" isolation or "parallel network"</span> </div> </a> <ul id="toc-&quot;Air_gap&quot;_isolation_or_&quot;parallel_network&quot;-sublist" class="vector-toc-list"> </ul> </li> </ul> </li> <li id="toc-Research" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#Research"> <div class="vector-toc-text"> <span class="vector-toc-numb">7</span> <span>Research</span> </div> </a> <ul id="toc-Research-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-See_also" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#See_also"> <div class="vector-toc-text"> <span class="vector-toc-numb">8</span> <span>See also</span> </div> </a> <ul id="toc-See_also-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-References" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#References"> <div class="vector-toc-text"> <span class="vector-toc-numb">9</span> <span>References</span> </div> </a> <ul id="toc-References-sublist" class="vector-toc-list"> </ul> </li> <li id="toc-External_links" class="vector-toc-list-item vector-toc-level-1"> <a class="vector-toc-link" href="#External_links"> <div class="vector-toc-text"> <span class="vector-toc-numb">10</span> <span>External links</span> </div> </a> <ul id="toc-External_links-sublist" class="vector-toc-list"> </ul> </li> </ul> </div> </div> </nav> </div> </div> <div class="mw-content-container"> <main id="content" class="mw-body"> <header class="mw-body-header vector-page-titlebar"> <nav aria-label="Contents" class="vector-toc-landmark"> <div id="vector-page-titlebar-toc" class="vector-dropdown vector-page-titlebar-toc vector-button-flush-left" > <input type="checkbox" id="vector-page-titlebar-toc-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-titlebar-toc" class="vector-dropdown-checkbox " aria-label="Toggle the table of contents" > <label id="vector-page-titlebar-toc-label" for="vector-page-titlebar-toc-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--icon-only " aria-hidden="true" ><span class="vector-icon mw-ui-icon-listBullet mw-ui-icon-wikimedia-listBullet"></span> <span class="vector-dropdown-label-text">Toggle the table of contents</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-titlebar-toc-unpinned-container" class="vector-unpinned-container"> </div> </div> </div> </nav> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Malware</span></h1> <div id="p-lang-btn" class="vector-dropdown mw-portlet mw-portlet-lang" > <input type="checkbox" id="p-lang-btn-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-p-lang-btn" class="vector-dropdown-checkbox mw-interlanguage-selector" aria-label="Go to an article in another language. Available in 76 languages" > <label id="p-lang-btn-label" for="p-lang-btn-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet cdx-button--action-progressive mw-portlet-lang-heading-76" aria-hidden="true" ><span class="vector-icon mw-ui-icon-language-progressive mw-ui-icon-wikimedia-language-progressive"></span> <span class="vector-dropdown-label-text">76 languages</span> </label> <div class="vector-dropdown-content"> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%A8%D8%B1%D9%85%D8%AC%D9%8A%D8%A9_%D8%AE%D8%A8%D9%8A%D8%AB%D8%A9" title="برمجية خبيثة – Arabic" lang="ar" hreflang="ar" data-title="برمجية خبيثة" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ast mw-list-item"><a href="https://ast.wikipedia.org/wiki/Malware" title="Malware – Asturian" lang="ast" hreflang="ast" data-title="Malware" data-language-autonym="Asturianu" data-language-local-name="Asturian" class="interlanguage-link-target"><span>Asturianu</span></a></li><li class="interlanguage-link interwiki-az mw-list-item"><a href="https://az.wikipedia.org/wiki/Ziyankar_proqram" title="Ziyankar proqram – Azerbaijani" lang="az" hreflang="az" data-title="Ziyankar proqram" data-language-autonym="Azərbaycanca" data-language-local-name="Azerbaijani" class="interlanguage-link-target"><span>Azərbaycanca</span></a></li><li class="interlanguage-link interwiki-bn mw-list-item"><a href="https://bn.wikipedia.org/wiki/%E0%A6%AE%E0%A7%8D%E0%A6%AF%E0%A6%BE%E0%A6%B2%E0%A6%93%E0%A6%AF%E0%A6%BC%E0%A7%8D%E0%A6%AF%E0%A6%BE%E0%A6%B0" title="ম্যালওয়্যার – Bangla" lang="bn" hreflang="bn" data-title="ম্যালওয়্যার" data-language-autonym="বাংলা" data-language-local-name="Bangla" class="interlanguage-link-target"><span>বাংলা</span></a></li><li class="interlanguage-link interwiki-zh-min-nan mw-list-item"><a href="https://zh-min-nan.wikipedia.org/wiki/Ph%C3%A1i%E2%81%BF-th%C3%A9" title="Pháiⁿ-thé – Minnan" lang="nan" hreflang="nan" data-title="Pháiⁿ-thé" data-language-autonym="閩南語 / Bân-lâm-gú" data-language-local-name="Minnan" class="interlanguage-link-target"><span>閩南語 / Bân-lâm-gú</span></a></li><li class="interlanguage-link interwiki-be mw-list-item"><a href="https://be.wikipedia.org/wiki/%D0%A8%D0%BA%D0%BE%D0%B4%D0%BD%D0%B0%D1%8F_%D0%BF%D1%80%D0%B0%D0%B3%D1%80%D0%B0%D0%BC%D0%B0" title="Шкодная праграма – Belarusian" lang="be" hreflang="be" data-title="Шкодная праграма" data-language-autonym="Беларуская" data-language-local-name="Belarusian" class="interlanguage-link-target"><span>Беларуская</span></a></li><li class="interlanguage-link interwiki-bh mw-list-item"><a href="https://bh.wikipedia.org/wiki/%E0%A4%AE%E0%A5%88%E0%A4%B2%E0%A4%B5%E0%A5%87%E0%A4%AF%E0%A4%B0" title="मैलवेयर – Bhojpuri" lang="bh" hreflang="bh" data-title="मैलवेयर" data-language-autonym="भोजपुरी" data-language-local-name="Bhojpuri" class="interlanguage-link-target"><span>भोजपुरी</span></a></li><li class="interlanguage-link interwiki-bg mw-list-item"><a href="https://bg.wikipedia.org/wiki/%D0%9C%D0%B0%D0%BB%D1%83%D0%B5%D1%80" title="Малуер – Bulgarian" lang="bg" hreflang="bg" data-title="Малуер" data-language-autonym="Български" data-language-local-name="Bulgarian" class="interlanguage-link-target"><span>Български</span></a></li><li class="interlanguage-link interwiki-bs mw-list-item"><a href="https://bs.wikipedia.org/wiki/Malware" title="Malware – Bosnian" lang="bs" hreflang="bs" data-title="Malware" data-language-autonym="Bosanski" data-language-local-name="Bosnian" class="interlanguage-link-target"><span>Bosanski</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Programari_malici%C3%B3s" title="Programari maliciós – Catalan" lang="ca" hreflang="ca" data-title="Programari maliciós" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Malware" title="Malware – Czech" lang="cs" hreflang="cs" data-title="Malware" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Malware" title="Malware – Danish" lang="da" hreflang="da" data-title="Malware" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Schadprogramm" title="Schadprogramm – German" lang="de" hreflang="de" data-title="Schadprogramm" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Kurivara" title="Kurivara – Estonian" lang="et" hreflang="et" data-title="Kurivara" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-el mw-list-item"><a href="https://el.wikipedia.org/wiki/%CE%9A%CE%B1%CE%BA%CF%8C%CE%B2%CE%BF%CF%85%CE%BB%CE%BF_%CE%BB%CE%BF%CE%B3%CE%B9%CF%83%CE%BC%CE%B9%CE%BA%CF%8C" title="Κακόβουλο λογισμικό – Greek" lang="el" hreflang="el" data-title="Κακόβουλο λογισμικό" data-language-autonym="Ελληνικά" data-language-local-name="Greek" class="interlanguage-link-target"><span>Ελληνικά</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Malware" title="Malware – Spanish" lang="es" hreflang="es" data-title="Malware" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eu mw-list-item"><a href="https://eu.wikipedia.org/wiki/Malware" title="Malware – Basque" lang="eu" hreflang="eu" data-title="Malware" data-language-autonym="Euskara" data-language-local-name="Basque" class="interlanguage-link-target"><span>Euskara</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%A8%D8%AF%D8%A7%D9%81%D8%B2%D8%A7%D8%B1" title="بدافزار – Persian" lang="fa" hreflang="fa" data-title="بدافزار" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Logiciel_malveillant" title="Logiciel malveillant – French" lang="fr" hreflang="fr" data-title="Logiciel malveillant" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-ga mw-list-item"><a href="https://ga.wikipedia.org/wiki/Bogearra%C3%AD_mail%C3%ADseacha" title="Bogearraí mailíseacha – Irish" lang="ga" hreflang="ga" data-title="Bogearraí mailíseacha" data-language-autonym="Gaeilge" data-language-local-name="Irish" class="interlanguage-link-target"><span>Gaeilge</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%95%85%EC%84%B1_%EC%86%8C%ED%94%84%ED%8A%B8%EC%9B%A8%EC%96%B4" title="악성 소프트웨어 – Korean" lang="ko" hreflang="ko" data-title="악성 소프트웨어" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hy mw-list-item"><a href="https://hy.wikipedia.org/wiki/%D5%8E%D5%B6%D5%A1%D5%BD%D5%A1%D5%AF%D5%A1%D6%80_%D5%AE%D6%80%D5%A1%D5%A3%D5%AB%D6%80" title="Վնասակար ծրագիր – Armenian" lang="hy" hreflang="hy" data-title="Վնասակար ծրագիր" data-language-autonym="Հայերեն" data-language-local-name="Armenian" class="interlanguage-link-target"><span>Հայերեն</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%AE%E0%A5%88%E0%A4%B2%E0%A4%B5%E0%A5%87%E0%A4%AF%E0%A4%B0" title="मैलवेयर – Hindi" lang="hi" hreflang="hi" data-title="मैलवेयर" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Zlo%C4%87udni_softver" title="Zloćudni softver – Croatian" lang="hr" hreflang="hr" data-title="Zloćudni softver" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Perangkat_pembahaya" title="Perangkat pembahaya – Indonesian" lang="id" hreflang="id" data-title="Perangkat pembahaya" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-ia mw-list-item"><a href="https://ia.wikipedia.org/wiki/Programmario_malitiose" title="Programmario malitiose – Interlingua" lang="ia" hreflang="ia" data-title="Programmario malitiose" data-language-autonym="Interlingua" data-language-local-name="Interlingua" class="interlanguage-link-target"><span>Interlingua</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Malware" title="Malware – Italian" lang="it" hreflang="it" data-title="Malware" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%A0%D7%95%D7%96%D7%A7%D7%94" title="נוזקה – Hebrew" lang="he" hreflang="he" data-title="נוזקה" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-jv mw-list-item"><a href="https://jv.wikipedia.org/wiki/Piranti_pangrusak" title="Piranti pangrusak – Javanese" lang="jv" hreflang="jv" data-title="Piranti pangrusak" data-language-autonym="Jawa" data-language-local-name="Javanese" class="interlanguage-link-target"><span>Jawa</span></a></li><li class="interlanguage-link interwiki-kn mw-list-item"><a href="https://kn.wikipedia.org/wiki/%E0%B2%AE%E0%B2%BE%E0%B2%B2%E0%B3%8D%E2%80%8C%E0%B2%B5%E0%B3%87%E0%B2%B0%E0%B3%8D" title="ಮಾಲ್‌ವೇರ್ – Kannada" lang="kn" hreflang="kn" data-title="ಮಾಲ್‌ವೇರ್" data-language-autonym="ಕನ್ನಡ" data-language-local-name="Kannada" class="interlanguage-link-target"><span>ಕನ್ನಡ</span></a></li><li class="interlanguage-link interwiki-ka mw-list-item"><a href="https://ka.wikipedia.org/wiki/%E1%83%9B%E1%83%90%E1%83%95%E1%83%9C%E1%83%94_%E1%83%9E%E1%83%A0%E1%83%9D%E1%83%92%E1%83%A0%E1%83%90%E1%83%9B%E1%83%90" title="მავნე პროგრამა – Georgian" lang="ka" hreflang="ka" data-title="მავნე პროგრამა" data-language-autonym="ქართული" data-language-local-name="Georgian" class="interlanguage-link-target"><span>ქართული</span></a></li><li class="interlanguage-link interwiki-ky mw-list-item"><a href="https://ky.wikipedia.org/wiki/%D0%97%D1%8B%D1%8F%D0%BD%D0%B4%D1%83%D1%83_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0" title="Зыяндуу программа – Kyrgyz" lang="ky" hreflang="ky" data-title="Зыяндуу программа" data-language-autonym="Кыргызча" data-language-local-name="Kyrgyz" class="interlanguage-link-target"><span>Кыргызча</span></a></li><li class="interlanguage-link interwiki-la mw-list-item"><a href="https://la.wikipedia.org/wiki/Malware" title="Malware – Latin" lang="la" hreflang="la" data-title="Malware" data-language-autonym="Latina" data-language-local-name="Latin" class="interlanguage-link-target"><span>Latina</span></a></li><li class="interlanguage-link interwiki-lv mw-list-item"><a href="https://lv.wikipedia.org/wiki/%C4%BBaunprogrammat%C5%ABra" title="Ļaunprogrammatūra – Latvian" lang="lv" hreflang="lv" data-title="Ļaunprogrammatūra" data-language-autonym="Latviešu" data-language-local-name="Latvian" class="interlanguage-link-target"><span>Latviešu</span></a></li><li class="interlanguage-link interwiki-lmo mw-list-item"><a href="https://lmo.wikipedia.org/wiki/Malware" title="Malware – Lombard" lang="lmo" hreflang="lmo" data-title="Malware" data-language-autonym="Lombard" data-language-local-name="Lombard" class="interlanguage-link-target"><span>Lombard</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Malware" title="Malware – Hungarian" lang="hu" hreflang="hu" data-title="Malware" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-mk mw-list-item"><a href="https://mk.wikipedia.org/wiki/%D0%97%D0%BB%D0%BE%D0%BD%D0%B0%D0%BC%D0%B5%D1%80%D0%B5%D0%BD_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC" title="Злонамерен програм – Macedonian" lang="mk" hreflang="mk" data-title="Злонамерен програм" data-language-autonym="Македонски" data-language-local-name="Macedonian" class="interlanguage-link-target"><span>Македонски</span></a></li><li class="interlanguage-link interwiki-ml mw-list-item"><a href="https://ml.wikipedia.org/wiki/%E0%B4%AE%E0%B4%BE%E0%B5%BD%E0%B4%B5%E0%B5%86%E0%B4%AF%E0%B5%BC" title="മാൽവെയർ – Malayalam" lang="ml" hreflang="ml" data-title="മാൽവെയർ" data-language-autonym="മലയാളം" data-language-local-name="Malayalam" class="interlanguage-link-target"><span>മലയാളം</span></a></li><li class="interlanguage-link interwiki-mr mw-list-item"><a href="https://mr.wikipedia.org/wiki/%E0%A4%AE%E0%A4%BE%E0%A4%B2%E0%A4%B5%E0%A5%87%E0%A4%85%E0%A4%B0" title="मालवेअर – Marathi" lang="mr" hreflang="mr" data-title="मालवेअर" data-language-autonym="मराठी" data-language-local-name="Marathi" class="interlanguage-link-target"><span>मराठी</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Perisian_perosak" title="Perisian perosak – Malay" lang="ms" hreflang="ms" data-title="Perisian perosak" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-mn mw-list-item"><a href="https://mn.wikipedia.org/wiki/Malware" title="Malware – Mongolian" lang="mn" hreflang="mn" data-title="Malware" data-language-autonym="Монгол" data-language-local-name="Mongolian" class="interlanguage-link-target"><span>Монгол</span></a></li><li class="interlanguage-link interwiki-my mw-list-item"><a href="https://my.wikipedia.org/wiki/%E1%80%99%E1%80%B1%E1%80%AC%E1%80%9C%E1%80%BA%E1%80%9D%E1%80%B2%E1%80%9C%E1%80%BA" title="မောလ်ဝဲလ် – Burmese" lang="my" hreflang="my" data-title="မောလ်ဝဲလ်" data-language-autonym="မြန်မာဘာသာ" data-language-local-name="Burmese" class="interlanguage-link-target"><span>မြန်မာဘာသာ</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Malware" title="Malware – Dutch" lang="nl" hreflang="nl" data-title="Malware" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%83%9E%E3%83%AB%E3%82%A6%E3%82%A7%E3%82%A2" title="マルウェア – Japanese" lang="ja" hreflang="ja" data-title="マルウェア" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Skadevare" title="Skadevare – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Skadevare" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-nn mw-list-item"><a href="https://nn.wikipedia.org/wiki/Malware" title="Malware – Norwegian Nynorsk" lang="nn" hreflang="nn" data-title="Malware" data-language-autonym="Norsk nynorsk" data-language-local-name="Norwegian Nynorsk" class="interlanguage-link-target"><span>Norsk nynorsk</span></a></li><li class="interlanguage-link interwiki-uz mw-list-item"><a href="https://uz.wikipedia.org/wiki/Zararli_dastur" title="Zararli dastur – Uzbek" lang="uz" hreflang="uz" data-title="Zararli dastur" data-language-autonym="Oʻzbekcha / ўзбекча" data-language-local-name="Uzbek" class="interlanguage-link-target"><span>Oʻzbekcha / ўзбекча</span></a></li><li class="interlanguage-link interwiki-pa mw-list-item"><a href="https://pa.wikipedia.org/wiki/%E0%A8%AE%E0%A8%BE%E0%A8%B2%E0%A8%B5%E0%A9%87%E0%A8%85%E0%A8%B0" title="ਮਾਲਵੇਅਰ – Punjabi" lang="pa" hreflang="pa" data-title="ਮਾਲਵੇਅਰ" data-language-autonym="ਪੰਜਾਬੀ" data-language-local-name="Punjabi" class="interlanguage-link-target"><span>ਪੰਜਾਬੀ</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Z%C5%82o%C5%9Bliwe_oprogramowanie" title="Złośliwe oprogramowanie – Polish" lang="pl" hreflang="pl" data-title="Złośliwe oprogramowanie" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-pt mw-list-item"><a href="https://pt.wikipedia.org/wiki/Malware" title="Malware – Portuguese" lang="pt" hreflang="pt" data-title="Malware" data-language-autonym="Português" data-language-local-name="Portuguese" class="interlanguage-link-target"><span>Português</span></a></li><li class="interlanguage-link interwiki-kaa mw-list-item"><a href="https://kaa.wikipedia.org/wiki/Z%C4%B1yanl%C4%B1_programma" title="Zıyanlı programma – Kara-Kalpak" lang="kaa" hreflang="kaa" data-title="Zıyanlı programma" data-language-autonym="Qaraqalpaqsha" data-language-local-name="Kara-Kalpak" class="interlanguage-link-target"><span>Qaraqalpaqsha</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Software_r%C4%83u_inten%C8%9Bionat" title="Software rău intenționat – Romanian" lang="ro" hreflang="ro" data-title="Software rău intenționat" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-qu mw-list-item"><a href="https://qu.wikipedia.org/wiki/Malware" title="Malware – Quechua" lang="qu" hreflang="qu" data-title="Malware" data-language-autonym="Runa Simi" data-language-local-name="Quechua" class="interlanguage-link-target"><span>Runa Simi</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%92%D1%80%D0%B5%D0%B4%D0%BE%D0%BD%D0%BE%D1%81%D0%BD%D0%B0%D1%8F_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BC%D0%B0" title="Вредоносная программа – Russian" lang="ru" hreflang="ru" data-title="Вредоносная программа" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-sq mw-list-item"><a href="https://sq.wikipedia.org/wiki/Programi_i_d%C3%ABmsh%C3%ABm" title="Programi i dëmshëm – Albanian" lang="sq" hreflang="sq" data-title="Programi i dëmshëm" data-language-autonym="Shqip" data-language-local-name="Albanian" class="interlanguage-link-target"><span>Shqip</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Malware" title="Malware – Simple English" lang="en-simple" hreflang="en-simple" data-title="Malware" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sk mw-list-item"><a href="https://sk.wikipedia.org/wiki/Malware" title="Malware – Slovak" lang="sk" hreflang="sk" data-title="Malware" data-language-autonym="Slovenčina" data-language-local-name="Slovak" class="interlanguage-link-target"><span>Slovenčina</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Zlonamerna_programska_oprema" title="Zlonamerna programska oprema – Slovenian" lang="sl" hreflang="sl" data-title="Zlonamerna programska oprema" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-ckb mw-list-item"><a href="https://ckb.wikipedia.org/wiki/%D8%B2%DB%8C%D8%A7%D9%86%D8%A7%D9%85%DB%8E%D8%B1" title="زیانامێر – Central Kurdish" lang="ckb" hreflang="ckb" data-title="زیانامێر" data-language-autonym="کوردی" data-language-local-name="Central Kurdish" class="interlanguage-link-target"><span>کوردی</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%9C%D0%B0%D0%BB%D0%B2%D0%B5%D1%80" title="Малвер – Serbian" lang="sr" hreflang="sr" data-title="Малвер" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-sh badge-Q17437796 badge-featuredarticle mw-list-item" title="featured article badge"><a href="https://sh.wikipedia.org/wiki/Malware" title="Malware – Serbo-Croatian" lang="sh" hreflang="sh" data-title="Malware" data-language-autonym="Srpskohrvatski / српскохрватски" data-language-local-name="Serbo-Croatian" class="interlanguage-link-target"><span>Srpskohrvatski / српскохрватски</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Haittaohjelma" title="Haittaohjelma – Finnish" lang="fi" hreflang="fi" data-title="Haittaohjelma" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Sabotageprogram" title="Sabotageprogram – Swedish" lang="sv" hreflang="sv" data-title="Sabotageprogram" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-tl mw-list-item"><a href="https://tl.wikipedia.org/wiki/Malware" title="Malware – Tagalog" lang="tl" hreflang="tl" data-title="Malware" data-language-autonym="Tagalog" data-language-local-name="Tagalog" class="interlanguage-link-target"><span>Tagalog</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%A4%E0%AF%80%E0%AE%AA%E0%AF%8D%E0%AE%AA%E0%AF%8A%E0%AE%B0%E0%AF%81%E0%AE%B3%E0%AF%8D" title="தீப்பொருள் – Tamil" lang="ta" hreflang="ta" data-title="தீப்பொருள்" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-th mw-list-item"><a href="https://th.wikipedia.org/wiki/%E0%B8%A1%E0%B8%B1%E0%B8%A5%E0%B9%81%E0%B8%A7%E0%B8%A3%E0%B9%8C" title="มัลแวร์ – Thai" lang="th" hreflang="th" data-title="มัลแวร์" data-language-autonym="ไทย" data-language-local-name="Thai" class="interlanguage-link-target"><span>ไทย</span></a></li><li class="interlanguage-link interwiki-tg mw-list-item"><a href="https://tg.wikipedia.org/wiki/%D0%91%D0%B0%D0%B4%D0%B0%D1%84%D0%B7%D0%BE%D1%80" title="Бадафзор – Tajik" lang="tg" hreflang="tg" data-title="Бадафзор" data-language-autonym="Тоҷикӣ" data-language-local-name="Tajik" class="interlanguage-link-target"><span>Тоҷикӣ</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Malware" title="Malware – Turkish" lang="tr" hreflang="tr" data-title="Malware" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-bug mw-list-item"><a href="https://bug.wikipedia.org/wiki/Malware" title="Malware – Buginese" lang="bug" hreflang="bug" data-title="Malware" data-language-autonym="Basa Ugi" data-language-local-name="Buginese" class="interlanguage-link-target"><span>Basa Ugi</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%A8%D0%BA%D1%96%D0%B4%D0%BB%D0%B8%D0%B2%D0%B8%D0%B9_%D0%BF%D1%80%D0%BE%D0%B3%D1%80%D0%B0%D0%BC%D0%BD%D0%B8%D0%B9_%D0%B7%D0%B0%D1%81%D1%96%D0%B1" title="Шкідливий програмний засіб – Ukrainian" lang="uk" hreflang="uk" data-title="Шкідливий програмний засіб" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D9%85%D8%A7%D9%84%D9%88%DB%8C%D8%A6%D8%B1" title="مالویئر – Urdu" lang="ur" hreflang="ur" data-title="مالویئر" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-vec mw-list-item"><a href="https://vec.wikipedia.org/wiki/Malware" title="Malware – Venetian" lang="vec" hreflang="vec" data-title="Malware" data-language-autonym="Vèneto" data-language-local-name="Venetian" class="interlanguage-link-target"><span>Vèneto</span></a></li><li class="interlanguage-link interwiki-vi mw-list-item"><a href="https://vi.wikipedia.org/wiki/Ph%E1%BA%A7n_m%E1%BB%81m_%C3%A1c_%C3%BD" title="Phần mềm ác ý – Vietnamese" lang="vi" hreflang="vi" data-title="Phần mềm ác ý" data-language-autonym="Tiếng Việt" data-language-local-name="Vietnamese" class="interlanguage-link-target"><span>Tiếng Việt</span></a></li><li class="interlanguage-link interwiki-wuu mw-list-item"><a href="https://wuu.wikipedia.org/wiki/%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6" title="恶意软件 – Wu" lang="wuu" hreflang="wuu" data-title="恶意软件" data-language-autonym="吴语" data-language-local-name="Wu" class="interlanguage-link-target"><span>吴语</span></a></li><li class="interlanguage-link interwiki-zh-yue mw-list-item"><a href="https://zh-yue.wikipedia.org/wiki/%E6%83%A1%E6%84%8F%E7%A8%8B%E5%BC%8F" title="惡意程式 – Cantonese" lang="yue" hreflang="yue" data-title="惡意程式" data-language-autonym="粵語" data-language-local-name="Cantonese" class="interlanguage-link-target"><span>粵語</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E6%81%B6%E6%84%8F%E8%BD%AF%E4%BB%B6" title="恶意软件 – Chinese" lang="zh" hreflang="zh" data-title="恶意软件" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li> </ul> <div class="after-portlet after-portlet-lang"><span class="wb-langlinks-edit wb-langlinks-link"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q14001#sitelinks-wikipedia" title="Edit interlanguage links" class="wbc-editpage">Edit links</a></span></div> </div> </div> </div> </header> <div class="vector-page-toolbar"> <div class="vector-page-toolbar-container"> <div id="left-navigation"> <nav aria-label="Namespaces"> <div id="p-associated-pages" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-associated-pages" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-nstab-main" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Malware" title="View the content page [c]" accesskey="c"><span>Article</span></a></li><li id="ca-talk" class="vector-tab-noicon mw-list-item"><a href="/wiki/Talk:Malware" rel="discussion" title="Discuss improvements to the content page [t]" accesskey="t"><span>Talk</span></a></li> </ul> </div> </div> <div id="vector-variants-dropdown" class="vector-dropdown emptyPortlet" > <input type="checkbox" id="vector-variants-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-variants-dropdown" class="vector-dropdown-checkbox " aria-label="Change language variant" > <label id="vector-variants-dropdown-label" for="vector-variants-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">English</span> </label> <div class="vector-dropdown-content"> <div id="p-variants" class="vector-menu mw-portlet mw-portlet-variants emptyPortlet" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> </ul> </div> </div> </div> </div> </nav> </div> <div id="right-navigation" class="vector-collapsible"> <nav aria-label="Views"> <div id="p-views" class="vector-menu vector-menu-tabs mw-portlet mw-portlet-views" > <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-view" class="selected vector-tab-noicon mw-list-item"><a href="/wiki/Malware"><span>Read</span></a></li><li id="ca-edit" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Malware&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-history" class="vector-tab-noicon mw-list-item"><a href="/w/index.php?title=Malware&amp;action=history" title="Past revisions of this page [h]" accesskey="h"><span>View history</span></a></li> </ul> </div> </div> </nav> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-dropdown" class="vector-dropdown vector-page-tools-dropdown" > <input type="checkbox" id="vector-page-tools-dropdown-checkbox" role="button" aria-haspopup="true" data-event-name="ui.dropdown-vector-page-tools-dropdown" class="vector-dropdown-checkbox " aria-label="Tools" > <label id="vector-page-tools-dropdown-label" for="vector-page-tools-dropdown-checkbox" class="vector-dropdown-label cdx-button cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--weight-quiet" aria-hidden="true" ><span class="vector-dropdown-label-text">Tools</span> </label> <div class="vector-dropdown-content"> <div id="vector-page-tools-unpinned-container" class="vector-unpinned-container"> <div id="vector-page-tools" class="vector-page-tools vector-pinnable-element"> <div class="vector-pinnable-header vector-page-tools-pinnable-header vector-pinnable-header-unpinned" data-feature-name="page-tools-pinned" data-pinnable-element-id="vector-page-tools" data-pinned-container-id="vector-page-tools-pinned-container" data-unpinned-container-id="vector-page-tools-unpinned-container" > <div class="vector-pinnable-header-label">Tools</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-page-tools.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-page-tools.unpin">hide</button> </div> <div id="p-cactions" class="vector-menu mw-portlet mw-portlet-cactions emptyPortlet vector-has-collapsible-items" title="More options" > <div class="vector-menu-heading"> Actions </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="ca-more-view" class="selected vector-more-collapsible-item mw-list-item"><a href="/wiki/Malware"><span>Read</span></a></li><li id="ca-more-edit" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Malware&amp;action=edit" title="Edit this page [e]" accesskey="e"><span>Edit</span></a></li><li id="ca-more-history" class="vector-more-collapsible-item mw-list-item"><a href="/w/index.php?title=Malware&amp;action=history"><span>View history</span></a></li> </ul> </div> </div> <div id="p-tb" class="vector-menu mw-portlet mw-portlet-tb" > <div class="vector-menu-heading"> General </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="t-whatlinkshere" class="mw-list-item"><a href="/wiki/Special:WhatLinksHere/Malware" title="List of all English Wikipedia pages containing links to this page [j]" accesskey="j"><span>What links here</span></a></li><li id="t-recentchangeslinked" class="mw-list-item"><a href="/wiki/Special:RecentChangesLinked/Malware" rel="nofollow" title="Recent changes in pages linked from this page [k]" accesskey="k"><span>Related changes</span></a></li><li id="t-upload" class="mw-list-item"><a href="/wiki/Wikipedia:File_Upload_Wizard" title="Upload files [u]" accesskey="u"><span>Upload file</span></a></li><li id="t-specialpages" class="mw-list-item"><a href="/wiki/Special:SpecialPages" title="A list of all special pages [q]" accesskey="q"><span>Special pages</span></a></li><li id="t-permalink" class="mw-list-item"><a href="/w/index.php?title=Malware&amp;oldid=1257292404" title="Permanent link to this revision of this page"><span>Permanent link</span></a></li><li id="t-info" class="mw-list-item"><a href="/w/index.php?title=Malware&amp;action=info" title="More information about this page"><span>Page information</span></a></li><li id="t-cite" class="mw-list-item"><a href="/w/index.php?title=Special:CiteThisPage&amp;page=Malware&amp;id=1257292404&amp;wpFormIdentifier=titleform" title="Information on how to cite this page"><span>Cite this page</span></a></li><li id="t-urlshortener" class="mw-list-item"><a href="/w/index.php?title=Special:UrlShortener&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMalware"><span>Get shortened URL</span></a></li><li id="t-urlshortener-qrcode" class="mw-list-item"><a href="/w/index.php?title=Special:QrCode&amp;url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FMalware"><span>Download QR code</span></a></li> </ul> </div> </div> <div id="p-coll-print_export" class="vector-menu mw-portlet mw-portlet-coll-print_export" > <div class="vector-menu-heading"> Print/export </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li id="coll-download-as-rl" class="mw-list-item"><a href="/w/index.php?title=Special:DownloadAsPdf&amp;page=Malware&amp;action=show-download-screen" title="Download this page as a PDF file"><span>Download as PDF</span></a></li><li id="t-print" class="mw-list-item"><a href="/w/index.php?title=Malware&amp;printable=yes" title="Printable version of this page [p]" accesskey="p"><span>Printable version</span></a></li> </ul> </div> </div> <div id="p-wikibase-otherprojects" class="vector-menu mw-portlet mw-portlet-wikibase-otherprojects" > <div class="vector-menu-heading"> In other projects </div> <div class="vector-menu-content"> <ul class="vector-menu-content-list"> <li class="wb-otherproject-link wb-otherproject-commons mw-list-item"><a href="https://commons.wikimedia.org/wiki/Category:Malware" hreflang="en"><span>Wikimedia Commons</span></a></li><li id="t-wikibase" class="wb-otherproject-link wb-otherproject-wikibase-dataitem mw-list-item"><a href="https://www.wikidata.org/wiki/Special:EntityPage/Q14001" title="Structured data on this page hosted by Wikidata [g]" accesskey="g"><span>Wikidata item</span></a></li> </ul> </div> </div> </div> </div> </div> </div> </nav> </div> </div> </div> <div class="vector-column-end"> <div class="vector-sticky-pinned-container"> <nav class="vector-page-tools-landmark" aria-label="Page tools"> <div id="vector-page-tools-pinned-container" class="vector-pinned-container"> </div> </nav> <nav class="vector-appearance-landmark" aria-label="Appearance"> <div id="vector-appearance-pinned-container" class="vector-pinned-container"> <div id="vector-appearance" class="vector-appearance vector-pinnable-element"> <div class="vector-pinnable-header vector-appearance-pinnable-header vector-pinnable-header-pinned" data-feature-name="appearance-pinned" data-pinnable-element-id="vector-appearance" data-pinned-container-id="vector-appearance-pinned-container" data-unpinned-container-id="vector-appearance-unpinned-container" > <div class="vector-pinnable-header-label">Appearance</div> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-pin-button" data-event-name="pinnable-header.vector-appearance.pin">move to sidebar</button> <button class="vector-pinnable-header-toggle-button vector-pinnable-header-unpin-button" data-event-name="pinnable-header.vector-appearance.unpin">hide</button> </div> </div> </div> </nav> </div> </div> <div id="bodyContent" class="vector-body" aria-labelledby="firstHeading" data-mw-ve-target-container> <div class="vector-body-before-content"> <div class="mw-indicators"> </div> <div id="siteSub" class="noprint">From Wikipedia, the free encyclopedia</div> </div> <div id="contentSub"><div id="mw-content-subtitle"></div></div> <div id="mw-content-text" class="mw-body-content"><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><div class="shortdescription nomobile noexcerpt noprint searchaux" style="display:none">Malicious software</div> <p class="mw-empty-elt"> </p> <style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1246091330">.mw-parser-output .sidebar{width:22em;float:right;clear:right;margin:0.5em 0 1em 1em;background:var(--background-color-neutral-subtle,#f8f9fa);border:1px solid var(--border-color-base,#a2a9b1);padding:0.2em;text-align:center;line-height:1.4em;font-size:88%;border-collapse:collapse;display:table}body.skin-minerva .mw-parser-output .sidebar{display:table!important;float:right!important;margin:0.5em 0 1em 1em!important}.mw-parser-output .sidebar-subgroup{width:100%;margin:0;border-spacing:0}.mw-parser-output .sidebar-left{float:left;clear:left;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-none{float:none;clear:both;margin:0.5em 1em 1em 0}.mw-parser-output .sidebar-outer-title{padding:0 0.4em 0.2em;font-size:125%;line-height:1.2em;font-weight:bold}.mw-parser-output .sidebar-top-image{padding:0.4em}.mw-parser-output .sidebar-top-caption,.mw-parser-output .sidebar-pretitle-with-top-image,.mw-parser-output .sidebar-caption{padding:0.2em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-pretitle{padding:0.4em 0.4em 0;line-height:1.2em}.mw-parser-output .sidebar-title,.mw-parser-output .sidebar-title-with-pretitle{padding:0.2em 0.8em;font-size:145%;line-height:1.2em}.mw-parser-output .sidebar-title-with-pretitle{padding:0.1em 0.4em}.mw-parser-output .sidebar-image{padding:0.2em 0.4em 0.4em}.mw-parser-output .sidebar-heading{padding:0.1em 0.4em}.mw-parser-output .sidebar-content{padding:0 0.5em 0.4em}.mw-parser-output .sidebar-content-with-subgroup{padding:0.1em 0.4em 0.2em}.mw-parser-output .sidebar-above,.mw-parser-output .sidebar-below{padding:0.3em 0.8em;font-weight:bold}.mw-parser-output .sidebar-collapse .sidebar-above,.mw-parser-output .sidebar-collapse .sidebar-below{border-top:1px solid #aaa;border-bottom:1px solid #aaa}.mw-parser-output .sidebar-navbar{text-align:right;font-size:115%;padding:0 0.4em 0.4em}.mw-parser-output .sidebar-list-title{padding:0 0.4em;text-align:left;font-weight:bold;line-height:1.6em;font-size:105%}.mw-parser-output .sidebar-list-title-c{padding:0 0.4em;text-align:center;margin:0 3.3em}@media(max-width:640px){body.mediawiki .mw-parser-output .sidebar{width:100%!important;clear:both;float:none!important;margin-left:0!important;margin-right:0!important}}body.skin--responsive .mw-parser-output .sidebar a>img{max-width:none!important}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-night .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-list-title,html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle{background:transparent!important}html.skin-theme-clientpref-os .mw-parser-output .sidebar:not(.notheme) .sidebar-title-with-pretitle a{color:var(--color-progressive)!important}}@media print{body.ns-0 .mw-parser-output .sidebar{display:none!important}}</style><table class="sidebar sidebar-collapse nomobile"><tbody><tr><td class="sidebar-pretitle">Part of a series on</td></tr><tr><th class="sidebar-title-with-pretitle"><a href="/wiki/Security_hacker" title="Security hacker">Computer hacking</a></th></tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/List_of_security_hacking_incidents" title="List of security hacking incidents">History</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Phreaking" title="Phreaking">Phreaking</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Hacking_of_consumer_electronics" title="Hacking of consumer electronics">Hacking of consumer electronics</a></li> <li><a href="/wiki/List_of_hackers" title="List of hackers">List of hackers</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_culture" title="Hacker culture">Hacker culture</a> and <a href="/wiki/Hacker_ethic" title="Hacker ethic">ethic</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Hackathon" title="Hackathon">Hackathon</a></li> <li><i><a href="/wiki/Hacker_Manifesto" title="Hacker Manifesto">Hacker Manifesto</a></i></li> <li><a href="/wiki/Hackerspace" title="Hackerspace">Hackerspace</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Maker_culture" title="Maker culture">Maker culture</a></li> <li>Types of <a href="/wiki/Hacker" title="Hacker">hackers</a> <ul><li><a href="/wiki/Black_hat_(computer_security)" title="Black hat (computer security)">Black hat</a></li> <li><a href="/wiki/Grey_hat" title="Grey hat">Grey hat</a></li> <li><a href="/wiki/White_hat_(computer_security)" title="White hat (computer security)">White hat</a></li></ul></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_security_conference" title="Computer security conference">Conferences</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Black_Hat_Briefings" title="Black Hat Briefings">Black Hat Briefings</a></li> <li><a href="/wiki/Chaos_Communication_Congress" title="Chaos Communication Congress">Chaos Communication Congress</a></li> <li><a href="/wiki/DEF_CON" title="DEF CON">DEF CON</a></li> <li><a href="/wiki/Hackers_on_Planet_Earth" title="Hackers on Planet Earth">Hackers on Planet Earth</a></li> <li><a href="/wiki/Security_BSides" title="Security BSides">Security BSides</a></li> <li><a href="/wiki/ShmooCon" title="ShmooCon">ShmooCon</a></li> <li><a href="/wiki/Summercon" title="Summercon">Summercon</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_crime" class="mw-redirect" title="Computer crime">Computer crime</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/List_of_computer_criminals" class="mw-redirect" title="List of computer criminals">List of computer criminals</a></li> <li><a href="/wiki/Script_kiddie" title="Script kiddie">Script kiddie</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacking_tool" class="mw-redirect" title="Hacking tool">Hacking tools</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploit</a></li> <li><a href="/wiki/List_of_digital_forensics_tools#Forensics-focused_operating_systems" title="List of digital forensics tools">forensics-focused operating systems</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_culture" title="Hacker culture">Practice sites</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/HackThisSite" title="HackThisSite">HackThisSite</a></li> <li><a href="/wiki/Zone-H" title="Zone-H">Zone-H</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a class="mw-selflink selflink">Malware</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worm</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic bomb</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">HIDS</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shell</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">RCE</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Computer_security" title="Computer security">Computer security</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a></li> <li><a href="/wiki/Cloud_computing_security" title="Cloud computing security">Cloud computing security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)"><a href="/wiki/Hacker_group" title="Hacker group">Groups</a></div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><a href="/wiki/Anonymous_(group)" class="mw-redirect" title="Anonymous (group)">Anonymous</a></li> <li><a href="/wiki/Chaos_Computer_Club" title="Chaos Computer Club">Chaos Computer Club</a></li> <li><a href="/wiki/Homebrew_Computer_Club" title="Homebrew Computer Club">Homebrew Computer Club</a> (defunct)</li> <li><a href="/wiki/Legion_of_Doom_(hacking)" class="mw-redirect" title="Legion of Doom (hacking)">Legion of Doom</a> (defunct)</li> <li><a href="/wiki/LulzSec" title="LulzSec">LulzSec</a> (defunct)</li> <li><a href="/wiki/Masters_of_Deception" title="Masters of Deception">Masters of Deception</a> (defunct)</li> <li><a href="/wiki/Red_team" title="Red team">Red team</a> / <a href="/wiki/Blue_team_(computer_security)" title="Blue team (computer security)">Blue team</a></li></ul></div></div></td> </tr><tr><td class="sidebar-content"> <div class="sidebar-list mw-collapsible mw-collapsed"><div class="sidebar-list-title" style="border-top:1px solid #aaa;text-align:center;;color: var(--color-base)">Publications</div><div class="sidebar-list-content mw-collapsible-content hlist"> <ul><li><i><a href="/wiki/2600:_The_Hacker_Quarterly" title="2600: The Hacker Quarterly">2600: The Hacker Quarterly</a></i></li> <li><a href="/wiki/Hacker_News" title="Hacker News">Hacker News</a></li> <li><i><a href="/wiki/Nuts_and_Volts" title="Nuts and Volts">Nuts and Volts</a></i></li> <li><i><a href="/wiki/Phrack" title="Phrack">Phrack</a></i></li></ul></div></div></td> </tr><tr><td class="sidebar-navbar"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1239400231">.mw-parser-output .navbar{display:inline;font-size:88%;font-weight:normal}.mw-parser-output .navbar-collapse{float:left;text-align:left}.mw-parser-output .navbar-boxtext{word-spacing:0}.mw-parser-output .navbar ul{display:inline-block;white-space:nowrap;line-height:inherit}.mw-parser-output .navbar-brackets::before{margin-right:-0.125em;content:"[ "}.mw-parser-output .navbar-brackets::after{margin-left:-0.125em;content:" ]"}.mw-parser-output .navbar li{word-spacing:-0.125em}.mw-parser-output .navbar a>span,.mw-parser-output .navbar a>abbr{text-decoration:inherit}.mw-parser-output .navbar-mini abbr{font-variant:small-caps;border-bottom:none;text-decoration:none;cursor:inherit}.mw-parser-output .navbar-ct-full{font-size:114%;margin:0 7em}.mw-parser-output .navbar-ct-mini{font-size:114%;margin:0 4em}html.skin-theme-clientpref-night .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}@media(prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .navbar li a abbr{color:var(--color-base)!important}}@media print{.mw-parser-output .navbar{display:none!important}}</style><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Computer_hacking" title="Template:Computer hacking"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Computer_hacking" title="Template talk:Computer hacking"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Computer_hacking" title="Special:EditPage/Template:Computer hacking"><abbr title="Edit this template">e</abbr></a></li></ul></div></td></tr></tbody></table> <p><b>Malware</b> (a <a href="/wiki/Portmanteau" class="mw-redirect" title="Portmanteau">portmanteau</a> of <i><b>malicious software</b></i>)<sup id="cite_ref-:4_1-0" class="reference"><a href="#cite_note-:4-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> is any <a href="/wiki/Software" title="Software">software</a> intentionally designed to cause disruption to a <a href="/wiki/Computer" title="Computer">computer</a>, <a href="/wiki/Server_(computing)" title="Server (computing)">server</a>, <a href="/wiki/Client_(computing)" title="Client (computing)">client</a>, or <a href="/wiki/Computer_network" title="Computer network">computer network</a>, leak private information, gain unauthorized access to information or systems, deprive access to information, or which unknowingly interferes with the user's <a href="/wiki/Computer_security" title="Computer security">computer security</a> and <a href="/wiki/Privacy" title="Privacy">privacy</a>.<sup id="cite_ref-:4_1-1" class="reference"><a href="#cite_note-:4-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">&#91;</span>2<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-:1_3-0" class="reference"><a href="#cite_note-:1-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-4" class="reference"><a href="#cite_note-4"><span class="cite-bracket">&#91;</span>4<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">&#91;</span>5<span class="cite-bracket">&#93;</span></a></sup> Researchers tend to classify malware into one or more sub-types (i.e. <a href="/wiki/Computer_virus" title="Computer virus">computer viruses</a>, <a href="/wiki/Computer_worm" title="Computer worm">worms</a>, <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a>, <a href="/wiki/Ransomware" title="Ransomware">ransomware</a>, <a href="/wiki/Spyware" title="Spyware">spyware</a>, <a href="/wiki/Adware" title="Adware">adware</a>, <a href="/wiki/Rogue_software" class="mw-redirect" title="Rogue software">rogue software</a>, <a href="/wiki/Wiper_(malware)" title="Wiper (malware)">wipers</a> and <a href="/wiki/Keyloggers" class="mw-redirect" title="Keyloggers">keyloggers</a>).<sup id="cite_ref-:4_1-2" class="reference"><a href="#cite_note-:4-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> </p><p>Malware poses serious problems to individuals and businesses on the Internet.<sup id="cite_ref-:2_6-0" class="reference"><a href="#cite_note-:2-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">&#91;</span>7<span class="cite-bracket">&#93;</span></a></sup> According to <a href="/wiki/NortonLifeLock" class="mw-redirect" title="NortonLifeLock">Symantec</a>'s 2018 Internet Security Threat Report (ISTR), malware variants number has increased to 669,947,865 in 2017, which is twice as many malware variants as in 2016.<sup id="cite_ref-:0_8-0" class="reference"><a href="#cite_note-:0-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a>, which includes malware attacks as well as other crimes committed by computer, was predicted to cost the world economy US$6 trillion in 2021, and is increasing at a rate of 15% per year.<sup id="cite_ref-Morgan_9-0" class="reference"><a href="#cite_note-Morgan-9"><span class="cite-bracket">&#91;</span>9<span class="cite-bracket">&#93;</span></a></sup> Since 2021, malware has been designed to target computer systems that run critical infrastructure such as the <a href="/wiki/Electricity_infrastructure" class="mw-redirect" title="Electricity infrastructure">electricity distribution network</a>.<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">&#91;</span>10<span class="cite-bracket">&#93;</span></a></sup> </p><p>The defense strategies against malware differ according to the type of malware but most can be thwarted by installing <a href="/wiki/Antivirus_software" title="Antivirus software">antivirus software</a>, <a href="/wiki/Firewall_(computing)" title="Firewall (computing)">firewalls</a>, applying regular <a href="/wiki/Patch_(computing)" title="Patch (computing)">patches</a>, <a href="/wiki/Network_security" title="Network security">securing networks</a> from intrusion, having regular <a href="/wiki/Backup" title="Backup">backups</a> and <a href="/wiki/Quarantine_(antivirus_program)" title="Quarantine (antivirus program)">isolating infected systems</a>. Malware can be designed to evade antivirus software detection algorithms.<sup id="cite_ref-:0_8-1" class="reference"><a href="#cite_note-:0-8"><span class="cite-bracket">&#91;</span>8<span class="cite-bracket">&#93;</span></a></sup> </p> <meta property="mw:PageProp/toc" /> <div class="mw-heading mw-heading2"><h2 id="History">History</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=1" title="Edit section: History"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/History_of_computer_viruses" class="mw-redirect" title="History of computer viruses">History of computer viruses</a></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">For a chronological guide, see <a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a>.</div> <p>The notion of a self-reproducing computer program can be traced back to initial theories about the operation of complex automata.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">&#91;</span>11<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/John_von_Neumann" title="John von Neumann">John von Neumann</a> showed that in theory a program could reproduce itself. This constituted a plausibility result in <a href="/wiki/Computability_theory" title="Computability theory">computability theory</a>. <a href="/wiki/Fred_Cohen" title="Fred Cohen">Fred Cohen</a> experimented with computer viruses and confirmed Neumann's postulate and investigated other properties of malware such as detectability and self-obfuscation using rudimentary encryption. His 1987 doctoral dissertation was on the subject of computer viruses.<sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">&#91;</span>12<span class="cite-bracket">&#93;</span></a></sup> The combination of cryptographic technology as part of the payload of the virus, exploiting it for attack purposes was initialized and investigated from the mid-1990s, and includes initial ransomware and evasion ideas.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">&#91;</span>13<span class="cite-bracket">&#93;</span></a></sup> </p><p>Before <a href="/wiki/Internet" title="Internet">Internet</a> access became widespread, viruses spread on personal computers by infecting executable programs or <a href="/wiki/Boot_sector" title="Boot sector">boot sectors</a> of floppy disks. By inserting a copy of itself into the <a href="/wiki/Machine_code" title="Machine code">machine code</a> instructions in these programs or <a href="/wiki/Boot_sector" title="Boot sector">boot sectors</a>, a virus causes itself to be run whenever the program is run or the disk is booted. Early computer viruses were written for the <a href="/wiki/Apple_II" title="Apple II">Apple II</a> and <a href="/wiki/Mac_(computer)" title="Mac (computer)">Mac</a>, but they became more widespread with the dominance of the <a href="/wiki/IBM_PC" class="mw-redirect" title="IBM PC">IBM PC</a> and <a href="/wiki/MS-DOS" title="MS-DOS">MS-DOS</a>. The first IBM PC virus in the wild was a <a href="/wiki/Boot_sector" title="Boot sector">boot sector</a> virus dubbed <a href="/wiki/Brain_(computer_virus)" title="Brain (computer virus)">(c)Brain</a>, created in 1986 by the Farooq Alvi brothers in Pakistan.<sup id="cite_ref-Avoine_14-0" class="reference"><a href="#cite_note-Avoine-14"><span class="cite-bracket">&#91;</span>14<span class="cite-bracket">&#93;</span></a></sup> Malware distributors would trick the user into booting or running from an infected device or medium. For example, a virus could make an infected computer add autorunnable code to any USB stick plugged into it. Anyone who then attached the stick to another computer set to autorun from USB would in turn become infected, and also pass on the infection in the same way.<sup id="cite_ref-dodusb_15-0" class="reference"><a href="#cite_note-dodusb-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p><p>Older email software would automatically open <a href="/wiki/HTML_email" title="HTML email">HTML email</a> containing potentially malicious <a href="/wiki/JavaScript" title="JavaScript">JavaScript</a> code. Users may also execute disguised malicious email attachments. The <i>2018 Data Breach Investigations Report</i> by <a href="/wiki/Verizon" title="Verizon">Verizon</a>, cited by <a href="/wiki/CSO_Online" class="mw-redirect" title="CSO Online">CSO Online</a>, states that emails are the primary method of malware delivery, accounting for 96% of malware delivery around the world.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">&#91;</span>16<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-Fruhlinger_2018_17-0" class="reference"><a href="#cite_note-Fruhlinger_2018-17"><span class="cite-bracket">&#91;</span>17<span class="cite-bracket">&#93;</span></a></sup> </p><p>The first worms, <a href="/wiki/Computer_network" title="Computer network">network</a>-borne infectious programs, originated not on personal computers, but on multitasking <a href="/wiki/Unix" title="Unix">Unix</a> systems. The first well-known worm was the <a href="/wiki/Morris_worm" title="Morris worm">Morris worm</a> of 1988, which infected <a href="/wiki/SunOS" title="SunOS">SunOS</a> and <a href="/wiki/VAX" title="VAX">VAX</a> <a href="/wiki/Berkeley_Software_Distribution" title="Berkeley Software Distribution">BSD</a> systems. Unlike a virus, this worm did not insert itself into other programs. Instead, it exploited security holes (<a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerabilities</a>) in network <a href="/wiki/Server_(computing)" title="Server (computing)">server</a> programs and started itself running as a separate <a href="/wiki/Process_(computing)" title="Process (computing)">process</a>.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">&#91;</span>18<span class="cite-bracket">&#93;</span></a></sup> This same behavior is used by today's worms as well.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">&#91;</span>19<span class="cite-bracket">&#93;</span></a></sup> </p><p>With the rise of the <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Microsoft Windows</a> platform in the 1990s, and the flexible <a href="/wiki/Macro_(computer_science)" title="Macro (computer science)">macros</a> of its applications, it became possible to write infectious code in the macro language of <a href="/wiki/Microsoft_Office_Word" class="mw-redirect" title="Microsoft Office Word">Microsoft Word</a> and similar programs. These <i><a href="/wiki/Macro_virus" title="Macro virus">macro viruses</a></i> infect documents and templates rather than applications (<a href="/wiki/Executable" title="Executable">executables</a>), but rely on the fact that macros in a Word document are a form of <a href="/wiki/Executable" title="Executable">executable</a> code.<sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">&#91;</span>20<span class="cite-bracket">&#93;</span></a></sup> </p><p>Many early infectious programs, including the <a href="/wiki/Morris_worm" title="Morris worm">Morris Worm</a>, the first internet worm, were written as experiments or pranks.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">&#91;</span>21<span class="cite-bracket">&#93;</span></a></sup> Today, malware is used by both <a href="/wiki/Black-hat_hacking" class="mw-redirect" title="Black-hat hacking">black hat hackers</a> and governments to steal personal, financial, or business information.<sup id="cite_ref-22" class="reference"><a href="#cite_note-22"><span class="cite-bracket">&#91;</span>22<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">&#91;</span>23<span class="cite-bracket">&#93;</span></a></sup> Today, any device that plugs into a USB port – even lights, fans, speakers, toys, or peripherals such as a digital microscope – can be used to spread malware. Devices can be infected during manufacturing or supply if quality control is inadequate.<sup id="cite_ref-dodusb_15-1" class="reference"><a href="#cite_note-dodusb-15"><span class="cite-bracket">&#91;</span>15<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Purposes">Purposes</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=2" title="Edit section: Purposes"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Since the rise of widespread <a href="/wiki/Broadband" title="Broadband">broadband</a> <a href="/wiki/Internet" title="Internet">Internet</a> access, malicious software has more frequently been designed for profit. Since 2003, the majority of widespread <a href="/wiki/Computer_virus" title="Computer virus">viruses</a> and worms have been designed to take control of users' computers for illicit purposes.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">&#91;</span>24<span class="cite-bracket">&#93;</span></a></sup> Infected "<a href="/wiki/Zombie_computer" class="mw-redirect" title="Zombie computer">zombie computers</a>" can be used to send <a href="/wiki/Email_spam" title="Email spam">email spam</a>, to host contraband data such as <a href="/wiki/Child_pornography" title="Child pornography">child pornography</a>,<sup id="cite_ref-25" class="reference"><a href="#cite_note-25"><span class="cite-bracket">&#91;</span>25<span class="cite-bracket">&#93;</span></a></sup> or to engage in <a href="/wiki/Distributed_denial-of-service" class="mw-redirect" title="Distributed denial-of-service">distributed denial-of-service</a> <a href="/wiki/Attack_(computing)" class="mw-redirect" title="Attack (computing)">attacks</a> as a form of <a href="/wiki/Extortion" title="Extortion">extortion</a>.<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">&#91;</span>26<span class="cite-bracket">&#93;</span></a></sup> Malware is used broadly against government or corporate websites to gather sensitive information,<sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">&#91;</span>27<span class="cite-bracket">&#93;</span></a></sup> or to disrupt their operation in general. Further, malware can be used against individuals to gain information such as personal identification numbers or details, bank or credit card numbers, and passwords.<sup id="cite_ref-theregister/2022-raccoon_28-0" class="reference"><a href="#cite_note-theregister/2022-raccoon-28"><span class="cite-bracket">&#91;</span>28<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-raccoon.ic3.gov_29-0" class="reference"><a href="#cite_note-raccoon.ic3.gov-29"><span class="cite-bracket">&#91;</span>29<span class="cite-bracket">&#93;</span></a></sup> </p><p>In addition to criminal money-making, malware can be used for sabotage, often for political motives. <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a>, for example, was designed to disrupt very specific industrial equipment. There have been politically motivated attacks which spread over and shut down large computer networks, including massive deletion of files and corruption of <a href="/wiki/Master_boot_record" title="Master boot record">master boot records</a>, described as "computer killing." Such attacks were made on Sony Pictures Entertainment (25 November 2014, using malware known as <a href="/wiki/Shamoon" title="Shamoon">Shamoon</a> or W32.Disttrack) and Saudi Aramco (August 2012).<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">&#91;</span>30<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">&#91;</span>31<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Types">Types</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=3" title="Edit section: Types"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Malware can be classified in numerous ways, and certain malicious programs may fall into two or more categories simultaneously.<sup id="cite_ref-:4_1-3" class="reference"><a href="#cite_note-:4-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> Broadly, software can categorised into three types:<sup id="cite_ref-:5_32-0" class="reference"><a href="#cite_note-:5-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> (i) goodware; (ii) greyware and (iii) malware. </p> <table class="wikitable"> <caption>Classification of potentially malicious software<br />Data sourced from: Molina-Coronado et al. (2023)<sup id="cite_ref-:5_32-1" class="reference"><a href="#cite_note-:5-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> </caption> <tbody><tr> <th>Type </th> <th>Characteristics </th> <th>Examples </th> <th>Notes </th></tr> <tr> <td>Goodware </td> <td>Obtained from trustworthy source </td> <td><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style><div class="plainlist"> <ul><li><a href="/wiki/Google_Play" title="Google Play">Google Play</a> apps</li> <li><a href="/wiki/Software_bug" title="Software bug">Buggy software</a></li></ul> </div> </td> <td> </td></tr> <tr> <td>Greyware </td> <td>Insufficient consensus and/or metrics </td> <td><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"><div class="plainlist"> <ul><li><a href="/wiki/Potentially_unwanted_program" title="Potentially unwanted program">Potentially unwanted programs</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Adware" title="Adware">Adware</a></li></ul> </div> </td> <td> </td></tr> <tr> <td>Malware </td> <td>Broad consensus among antivirus software that program is malicious or obtained from flagged sources. </td> <td><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"><div class="plainlist"> <ul><li><a href="/wiki/Virus_(computing)" class="mw-redirect" title="Virus (computing)">Viruses</a></li> <li><a href="/wiki/Worm_(computing)" class="mw-redirect" title="Worm (computing)">Worms</a></li> <li><a href="/wiki/Root_kit" class="mw-redirect" title="Root kit">Root kits</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li></ul> </div> </td> <td> </td></tr></tbody></table> <div class="mw-heading mw-heading3"><h3 id="Malware">Malware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=4" title="Edit section: Malware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <figure typeof="mw:File/Thumb"><a href="/wiki/File:Blaster_hex_dump.png" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/e/e7/Blaster_hex_dump.png/274px-Blaster_hex_dump.png" decoding="async" width="274" height="122" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/e/e7/Blaster_hex_dump.png 1.5x" data-file-width="338" data-file-height="151" /></a><figcaption><a href="/wiki/Hex_dump" title="Hex dump">Hex dump</a> of the <a href="/wiki/Blaster_(computer_worm)" title="Blaster (computer worm)">Blaster worm</a>, showing a message left for <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a> co-founder <a href="/wiki/Bill_Gates" title="Bill Gates">Bill Gates</a> by the worm's programmer</figcaption></figure> <div class="mw-heading mw-heading4"><h4 id="Virus">Virus</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=5" title="Edit section: Virus"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></div> <p>A computer virus is software usually hidden within another seemingly innocuous program that can produce copies of itself and insert them into other programs or files, and that usually performs a harmful action (such as destroying data).<sup id="cite_ref-33" class="reference"><a href="#cite_note-33"><span class="cite-bracket">&#91;</span>33<span class="cite-bracket">&#93;</span></a></sup> They have been likened to <a href="/wiki/Virus" title="Virus">biological viruses</a>.<sup id="cite_ref-:1_3-1" class="reference"><a href="#cite_note-:1-3"><span class="cite-bracket">&#91;</span>3<span class="cite-bracket">&#93;</span></a></sup> An example of this is a portable execution infection, a technique, usually used to spread malware, that inserts extra data or <a href="/wiki/Executable_code" class="mw-redirect" title="Executable code">executable code</a> into <a href="/wiki/Portable_Executable" title="Portable Executable">PE files</a>.<sup id="cite_ref-Szor2005_34-0" class="reference"><a href="#cite_note-Szor2005-34"><span class="cite-bracket">&#91;</span>34<span class="cite-bracket">&#93;</span></a></sup> A computer virus is software that embeds itself in some other <a href="/wiki/Executable" title="Executable">executable</a> software (including the operating system itself) on the target system without the user's knowledge and consent and when it is run, the virus is spread to other executable files. </p> <div class="mw-heading mw-heading4"><h4 id="Worm">Worm</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=6" title="Edit section: Worm"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A <a href="/wiki/Computer_worm" title="Computer worm">worm</a> is a stand-alone malware software that <em>actively</em> transmits itself over a <a href="/wiki/Computer_network" title="Computer network">network</a> to infect other computers and can copy itself without infecting files. These definitions lead to the observation that a virus requires the user to run an infected software or operating system for the virus to spread, whereas a worm spreads itself.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">&#91;</span>35<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Rootkits">Rootkits</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=7" title="Edit section: Rootkits"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></div> <p>Once malicious software is installed on a system, it is essential that it stays concealed, to avoid detection. Software packages known as <i>rootkits</i> allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a harmful <a href="/wiki/Process_(computing)" title="Process (computing)">process</a> from being visible in the system's list of <a href="/wiki/Process_(computing)" title="Process (computing)">processes</a>, or keep its files from being read.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">&#91;</span>36<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some types of harmful software contain routines to evade identification and/or removal attempts, not merely to hide themselves. An early example of this behavior is recorded in the <a href="/wiki/Jargon_File" title="Jargon File">Jargon File</a> tale of a pair of programs infesting a Xerox <a href="/wiki/CP-V_operating_system" class="mw-redirect" title="CP-V operating system">CP-V</a> time sharing system: </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p>Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">&#91;</span>37<span class="cite-bracket">&#93;</span></a></sup></p></blockquote> <div class="mw-heading mw-heading4"><h4 id="Backdoors">Backdoors</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=8" title="Edit section: Backdoors"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor (computing)</a></div> <p>A <a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">backdoor</a> is a broad term for a computer program that allows an attacker persistent unauthorised remote access to a victim's machine often without their knowledge.<sup id="cite_ref-:6_38-0" class="reference"><a href="#cite_note-:6-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> The attacker typically uses another attack (such as a <a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">trojan</a>, <a href="/wiki/Computer_worm" title="Computer worm">worm</a> or <a href="/wiki/Computer_virus" title="Computer virus">virus</a>) to bypass authentication mechanisms usually over an unsecured network such as the Internet to install the backdoor application. A backdoor can also be a side effect of a <a href="/wiki/Software_bug" title="Software bug">software bug</a> in legitimate software that is exploited by an attacker to gain access to a victim's computer or network. </p><p>The idea has often been suggested that computer manufacturers preinstall backdoors on their systems to provide technical support for customers, but this has never been reliably verified. It was reported in 2014 that US government agencies had been diverting computers purchased by those considered "targets" to secret workshops where software or hardware permitting remote access by the agency was installed, considered to be among the most productive operations to obtain access to networks around the world.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">&#91;</span>39<span class="cite-bracket">&#93;</span></a></sup> Backdoors may be installed by Trojan horses, <a href="/wiki/Computer_worm" title="Computer worm">worms</a>, <a href="/wiki/NSA_ANT_catalog" class="mw-redirect" title="NSA ANT catalog">implants</a>, or other methods.<sup id="cite_ref-40" class="reference"><a href="#cite_note-40"><span class="cite-bracket">&#91;</span>40<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-41" class="reference"><a href="#cite_note-41"><span class="cite-bracket">&#91;</span>41<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Trojan_horse">Trojan horse</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=9" title="Edit section: Trojan horse"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A Trojan horse misrepresents itself to masquerade as a regular, benign program or utility in order to persuade a victim to install it. A Trojan horse usually carries a hidden destructive function that is activated when the application is started. The term is derived from the <a href="/wiki/Ancient_Greek" title="Ancient Greek">Ancient Greek</a> story of the <a href="/wiki/Trojan_horse" class="mw-redirect" title="Trojan horse">Trojan horse</a> used to invade the city of <a href="/wiki/Troy" title="Troy">Troy</a> by stealth.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">&#91;</span>42<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">&#91;</span>43<span class="cite-bracket">&#93;</span></a></sup> </p><p>Trojan horses are generally spread by some form of <a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">social engineering</a>, for example, where a user is duped into executing an email attachment disguised to be unsuspicious, (e.g., a routine form to be filled in), or by <a href="/wiki/Drive-by_download" title="Drive-by download">drive-by download</a>. Although their payload can be anything, many modern forms act as a backdoor, contacting a controller (phoning home) which can then have unauthorized access to the affected computer, potentially installing additional software such as a keylogger to steal confidential information, cryptomining software or adware to generate revenue to the operator of the trojan.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">&#91;</span>44<span class="cite-bracket">&#93;</span></a></sup> While Trojan horses and backdoors are not easily detectable by themselves, computers may appear to run slower, emit more heat or fan noise due to heavy processor or network usage, as may occur when cryptomining software is installed. Cryptominers may limit resource usage and/or only run during idle times in an attempt to evade detection. </p><p>Unlike computer viruses and worms, Trojan horses generally do not attempt to inject themselves into other files or otherwise propagate themselves.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">&#91;</span>45<span class="cite-bracket">&#93;</span></a></sup> </p><p>In spring 2017, Mac users were hit by the new version of Proton Remote Access Trojan (RAT)<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">&#91;</span>46<span class="cite-bracket">&#93;</span></a></sup> trained to extract password data from various sources, such as browser auto-fill data, the Mac-OS keychain, and password vaults.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">&#91;</span>47<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Droppers">Droppers</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=10" title="Edit section: Droppers"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Dropper_(malware)" title="Dropper (malware)">Dropper (malware)</a></div> <p><a href="/wiki/Dropper_(malware)" title="Dropper (malware)">Droppers</a> are a sub-type of Trojans that solely aim to deliver malware upon the system that they infect with the desire to subvert detection through stealth and a light payload.<sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">&#91;</span>48<span class="cite-bracket">&#93;</span></a></sup> It is important not to confuse a dropper with a loader or stager. A loader or stager will merely load an extension of the malware (for example a collection of malicious functions through reflective dynamic link library injection) into memory. The purpose is to keep the initial stage light and undetectable. A dropper merely downloads further malware to the system. </p> <div class="mw-heading mw-heading4"><h4 id="Ransomware">Ransomware</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=11" title="Edit section: Ransomware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Main article: <a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></div><p>Ransomware prevents a user from accessing their files until a ransom is paid. There are two variations of ransomware, being crypto ransomware and locker ransomware.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">&#91;</span>49<span class="cite-bracket">&#93;</span></a></sup> Locker ransomware just locks down a computer system without encrypting its contents, whereas crypto ransomware locks down a system and encrypts its contents. For example, programs such as <a href="/wiki/CryptoLocker" title="CryptoLocker">CryptoLocker</a> <a href="/wiki/Encryption" title="Encryption">encrypt</a> files securely, and only decrypt them on payment of a substantial sum of money.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">&#91;</span>50<span class="cite-bracket">&#93;</span></a></sup> </p><p>Lock-screens, or screen lockers is a type of "cyber police" ransomware that blocks screens on Windows or Android devices with a false accusation in harvesting illegal content, trying to scare the victims into paying up a fee.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">&#91;</span>51<span class="cite-bracket">&#93;</span></a></sup> Jisut and SLocker impact Android devices more than other lock-screens, with Jisut making up nearly 60 percent of all Android ransomware detections.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">&#91;</span>52<span class="cite-bracket">&#93;</span></a></sup> </p><p>Encryption-based ransomware, like the name suggests, is a type of ransomware that encrypts all files on an infected machine. These types of malware then display a pop-up informing the user that their files have been encrypted and that they must pay (usually in Bitcoin) to recover them. Some examples of encryption-based ransomware are <a href="/wiki/CryptoLocker" title="CryptoLocker">CryptoLocker</a> and <a href="/wiki/WannaCry_ransomware_attack" title="WannaCry ransomware attack">WannaCry</a>.<sup id="cite_ref-w174_53-0" class="reference"><a href="#cite_note-w174-53"><span class="cite-bracket">&#91;</span>53<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Click_Fraud">Click Fraud</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=12" title="Edit section: Click Fraud"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some malware is used to generate money by <a href="/wiki/Click_fraud" title="Click fraud">click fraud</a>, making it appear that the computer user has clicked an advertising link on a site, generating a payment from the advertiser. It was estimated in 2012 that about 60 to 70% of all active malware used some kind of click fraud, and 22% of all ad-clicks were fraudulent.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">&#91;</span>54<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Grayware">Grayware</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=13" title="Edit section: Grayware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a> and <a href="/wiki/Potentially_unwanted_program" title="Potentially unwanted program">Potentially unwanted program</a></div> <p>Grayware is any unwanted application or file that can worsen the performance of computers and may cause security risks but which there is insufficient consensus or data to classify them as malware.<sup id="cite_ref-:5_32-2" class="reference"><a href="#cite_note-:5-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> Types of greyware typically includes <a href="/wiki/Spyware" title="Spyware">spyware</a>, <a href="/wiki/Adware" title="Adware">adware</a>, <a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">fraudulent dialers</a>, joke programs ("jokeware") and <a href="/wiki/Remote_desktop_software" title="Remote desktop software">remote access tools</a>.<sup id="cite_ref-:6_38-1" class="reference"><a href="#cite_note-:6-38"><span class="cite-bracket">&#91;</span>38<span class="cite-bracket">&#93;</span></a></sup> For example, at one point, <a href="/wiki/Sony_BMG" title="Sony BMG">Sony BMG</a> compact discs <a href="/wiki/Sony_BMG_copy_protection_rootkit_scandal" title="Sony BMG copy protection rootkit scandal">silently installed a rootkit</a> on purchasers' computers with the intention of preventing illicit copying.<sup id="cite_ref-russinovich_55-0" class="reference"><a href="#cite_note-russinovich-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Potentially_unwanted_program">Potentially unwanted program</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=14" title="Edit section: Potentially unwanted program"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Potentially_unwanted_program" title="Potentially unwanted program">Potentially unwanted programs</a> (PUPs) are applications that would be considered unwanted despite often being intentionally downloaded by the user.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">&#91;</span>56<span class="cite-bracket">&#93;</span></a></sup> PUPs include spyware, adware, and fraudulent dialers. </p><p>Many security products classify unauthorised <a href="/wiki/Keygen" title="Keygen">key generators</a> as PUPs, although they frequently carry true malware in addition to their ostensible purpose.<sup id="cite_ref-:7_57-0" class="reference"><a href="#cite_note-:7-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> In fact, Kammerstetter et al. (2012)<sup id="cite_ref-:7_57-1" class="reference"><a href="#cite_note-:7-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> estimated that as much as 55% of key generators could contain malware and that about 36% malicious key generators were not detected by antivirus software. </p> <div class="mw-heading mw-heading4"><h4 id="Adware">Adware</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=15" title="Edit section: Adware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Some types of adware turn off anti-malware and virus protection; technical remedies are available.<sup id="cite_ref-Casey_58-0" class="reference"><a href="#cite_note-Casey-58"><span class="cite-bracket">&#91;</span>58<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Spyware">Spyware</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=16" title="Edit section: Spyware"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Programs designed to monitor users' web browsing, display <a href="/wiki/Unsolicited_advertisement" title="Unsolicited advertisement">unsolicited advertisements</a>, or redirect <a href="/wiki/Affiliate_marketing" title="Affiliate marketing">affiliate marketing</a> revenues are called <a href="/wiki/Spyware" title="Spyware">spyware</a>. Spyware programs do not spread like viruses; instead they are generally installed by exploiting security holes. They can also be hidden and packaged together with unrelated user-installed software.<sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">&#91;</span>59<span class="cite-bracket">&#93;</span></a></sup> The <a href="/wiki/Sony_BMG_copy_protection_rootkit_scandal" title="Sony BMG copy protection rootkit scandal">Sony BMG rootkit</a> was intended to prevent illicit copying; but also reported on users' listening habits, and unintentionally created extra security vulnerabilities.<sup id="cite_ref-russinovich_55-1" class="reference"><a href="#cite_note-russinovich-55"><span class="cite-bracket">&#91;</span>55<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Detection">Detection</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=17" title="Edit section: Detection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Antivirus software typically uses two techniques to detect malware: (i) static analysis and (ii) dynamic/heuristic analysis.<sup id="cite_ref-:8_60-0" class="reference"><a href="#cite_note-:8-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> Static analysis involves studying the software code of a potentially malicious program and producing a signature of that program. This information is then used to compare scanned files by an antivirus program. Because this approach is not useful for malware that has not yet been studied, antivirus software can use dynamic analysis to monitor how the program runs on a computer and block it if it performs unexpected activity. </p><p>The aim of any malware is to conceal itself from detection by users or antivirus software.<sup id="cite_ref-:4_1-4" class="reference"><a href="#cite_note-:4-1"><span class="cite-bracket">&#91;</span>1<span class="cite-bracket">&#93;</span></a></sup> Detecting potential malware is difficult for two reasons. The first is that it is difficult to determine if software is malicious.<sup id="cite_ref-:5_32-3" class="reference"><a href="#cite_note-:5-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> The second is that malware uses technical measures to make it more difficult to detect it.<sup id="cite_ref-:8_60-1" class="reference"><a href="#cite_note-:8-60"><span class="cite-bracket">&#91;</span>60<span class="cite-bracket">&#93;</span></a></sup> An estimated 33% of malware is not detected by antivirus software.<sup id="cite_ref-:7_57-2" class="reference"><a href="#cite_note-:7-57"><span class="cite-bracket">&#91;</span>57<span class="cite-bracket">&#93;</span></a></sup> </p><p>The most commonly employed anti-detection technique involves encrypting the malware payload in order to prevent antivirus software from recognizing the signature.<sup id="cite_ref-:5_32-4" class="reference"><a href="#cite_note-:5-32"><span class="cite-bracket">&#91;</span>32<span class="cite-bracket">&#93;</span></a></sup> Tools such as crypters come with an encrypted blob of malicious code and a decryption stub. The stub decrypts the blob and loads it into memory. Because antivirus does not typically scan memory and only scans files on the drive, this allows the malware to evade detection. Advanced malware has the ability to transform itself into different variations, making it less likely to be detected due to the differences in its signatures. This is known as polymorphic malware. Other common techniques used to evade detection include, from common to uncommon:<sup id="cite_ref-:9_61-0" class="reference"><a href="#cite_note-:9-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> (1) evasion of analysis and detection by <a href="/wiki/Fingerprint_(computing)" title="Fingerprint (computing)">fingerprinting</a> the environment when executed;<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">&#91;</span>62<span class="cite-bracket">&#93;</span></a></sup> (2) confusing automated tools' detection methods. This allows malware to avoid detection by technologies such as signature-based antivirus software by changing the server used by the malware;<sup id="cite_ref-:9_61-1" class="reference"><a href="#cite_note-:9-61"><span class="cite-bracket">&#91;</span>61<span class="cite-bracket">&#93;</span></a></sup> (3) timing-based evasion. This is when malware runs at certain times or following certain actions taken by the user, so it executes during certain vulnerable periods, such as during the boot process, while remaining dormant the rest of the time; (4) <a href="/wiki/Obfuscation_(software)" title="Obfuscation (software)">obfuscating</a> internal data so that automated tools do not detect the malware;<sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">&#91;</span>63<span class="cite-bracket">&#93;</span></a></sup> (v) information hiding techniques, namely <a href="/wiki/Stegomalware" title="Stegomalware">stegomalware</a>;<sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">&#91;</span>64<span class="cite-bracket">&#93;</span></a></sup> and (5) fileless malware which runs within memory instead of using files and utilizes existing system tools to carry out malicious acts. The use of existing binaries to carry out malicious activities is a technique known as LotL, or Living off the Land.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">&#91;</span>65<span class="cite-bracket">&#93;</span></a></sup> This reduces the amount of forensic artifacts available to analyze. Recently these types of attacks have become more frequent with a 432% increase in 2017 and makeup 35% of the attacks in 2018. Such attacks are not easy to perform but are becoming more prevalent with the help of exploit-kits.<sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">&#91;</span>66<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">&#91;</span>67<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Risks">Risks</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=18" title="Edit section: Risks"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Vulnerable_software">Vulnerable software</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=19" title="Edit section: Vulnerable software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A <a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">vulnerability</a> is a weakness, <a href="/wiki/Design_flaw" class="mw-redirect" title="Design flaw">flaw</a> or software bug in an <a href="/wiki/Application_software" title="Application software">application</a>, a complete computer, an <a href="/wiki/Operating_system" title="Operating system">operating system</a>, or a <a href="/wiki/Computer_network" title="Computer network">computer network</a> that is exploited by malware to bypass defences or <a href="/wiki/Privilege_escalation" title="Privilege escalation">gain privileges</a> it requires to run. For example, <a href="/wiki/TestDisk" title="TestDisk">TestDisk 6.4</a> or earlier contained a vulnerability that allowed attackers to inject code into Windows.<sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">&#91;</span>68<span class="cite-bracket">&#93;</span></a></sup> Malware can exploit security defects (<a href="/wiki/Security_bug" title="Security bug">security bugs</a> or <a href="/wiki/Software_vulnerability" class="mw-redirect" title="Software vulnerability">vulnerabilities</a>) in the operating system, applications (such as browsers, e.g. older versions of Microsoft Internet Explorer supported by Windows XP<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">&#91;</span>69<span class="cite-bracket">&#93;</span></a></sup>), or in vulnerable versions of browser plugins such as <a href="/wiki/Adobe_Flash_Player#Security" title="Adobe Flash Player">Adobe Flash Player</a>, <a href="/wiki/Adobe_Acrobat#Security" title="Adobe Acrobat">Adobe Acrobat or Reader</a>, or <a href="/wiki/Java_SE#Critical_security_issues_with_the_Java_SE_plugin" class="mw-redirect" title="Java SE">Java SE</a>.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">&#91;</span>70<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-71" class="reference"><a href="#cite_note-71"><span class="cite-bracket">&#91;</span>71<span class="cite-bracket">&#93;</span></a></sup> For example, a common method is exploitation of a <a href="/wiki/Buffer_overrun" class="mw-redirect" title="Buffer overrun">buffer overrun</a> vulnerability, where software designed to store data in a specified region of memory does not prevent more data than the buffer can accommodate from being supplied. Malware may provide data that overflows the buffer, with malicious <a href="/wiki/Executable" title="Executable">executable</a> code or data after the end; when this payload is accessed it does what the attacker, not the legitimate software, determines. </p><p>Malware can exploit recently discovered vulnerabilities before developers have had time to release a suitable <a href="/wiki/Patch_(computing)" title="Patch (computing)">patch</a>.<sup id="cite_ref-:2_6-1" class="reference"><a href="#cite_note-:2-6"><span class="cite-bracket">&#91;</span>6<span class="cite-bracket">&#93;</span></a></sup> Even when new patches addressing the vulnerability have been released, they may not necessarily be installed immediately, allowing malware to take advantage of systems lacking patches. Sometimes even applying patches or installing new versions does not automatically uninstall the old versions. </p><p>There are several ways the users can stay informed and protected from security vulnerabilities in software. Software providers often announce updates that address security issues.<sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">&#91;</span>72<span class="cite-bracket">&#93;</span></a></sup> <a href="/wiki/Common_Vulnerabilities_and_Exposures" title="Common Vulnerabilities and Exposures">Common vulnerabilities</a> are assigned unique identifiers (CVE IDs) and listed in public databases like the <a href="/wiki/National_Vulnerability_Database" title="National Vulnerability Database">National Vulnerability Database</a>. Tools like Secunia PSI,<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">&#91;</span>73<span class="cite-bracket">&#93;</span></a></sup> free for personal use, can scan a computer for outdated software with known vulnerabilities and attempt to update them. <a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewalls</a> and <a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">intrusion prevention systems</a> can monitor the network traffic for suspicious activity that might indicate an attack.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">&#91;</span>74<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Excessive_privileges">Excessive privileges</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=20" title="Edit section: Excessive privileges"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Users and programs can be assigned more <a href="/wiki/Privilege_(computing)" title="Privilege (computing)">privileges</a> than they require, and malware can take advantage of this. For example, of 940 Android apps sampled, one third of them asked for more privileges than they required.<sup id="cite_ref-75" class="reference"><a href="#cite_note-75"><span class="cite-bracket">&#91;</span>75<span class="cite-bracket">&#93;</span></a></sup> Apps targeting the <a href="/wiki/Android_(operating_system)" title="Android (operating system)">Android</a> platform can be a major source of malware infection but one solution is to use third-party software to detect apps that have been assigned excessive privileges.<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">&#91;</span>76<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some systems allow all users to make changes to the core components or settings of the system, which is considered <a href="/wiki/Administrative_privileges" class="mw-redirect" title="Administrative privileges">over-privileged</a> access today. This was the standard operating procedure for early microcomputer and home computer systems, where there was no distinction between an <i>administrator</i> or <i>root</i>, and a regular user of the system. In some systems, <a href="/wiki/System_administrator" title="System administrator">non-administrator</a> users are over-privileged by design, in the sense that they are allowed to modify internal structures of the system. In some environments, users are over-privileged because they have been inappropriately granted administrator or equivalent status.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">&#91;</span>77<span class="cite-bracket">&#93;</span></a></sup> This can be because users tend to demand more privileges than they need, so often end up being assigned unnecessary privileges.<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">&#91;</span>78<span class="cite-bracket">&#93;</span></a></sup> </p><p>Some systems allow code executed by a user to access all rights of that user, which is known as over-privileged code. This was also standard operating procedure for early microcomputer and home computer systems. Malware, running as over-privileged code, can use this privilege to subvert the system. Almost all currently popular operating systems, and also many <a href="/wiki/Script_(computing)" class="mw-redirect" title="Script (computing)">scripting applications</a> allow code too many privileges, usually in the sense that when a user <a href="/wiki/Executable" title="Executable">executes</a> code, the system allows that code all rights of that user.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This last sweeping statement needs a citation. (July 2024)">citation needed</span></a></i>&#93;</sup> </p> <div class="mw-heading mw-heading3"><h3 id="Weak_passwords">Weak passwords</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=21" title="Edit section: Weak passwords"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A credential attack occurs when a user account with administrative privileges is cracked and that account is used to provide malware with appropriate privileges.<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">&#91;</span>79<span class="cite-bracket">&#93;</span></a></sup> Typically, the attack succeeds because the weakest form of account security is used, which is typically a short password that can be cracked using a <a href="/wiki/Dictionary_attack" title="Dictionary attack">dictionary</a> or <a href="/wiki/Brute-force_attack" title="Brute-force attack">brute force</a> attack. Using <a href="/wiki/Strong_password" class="mw-redirect" title="Strong password">strong passwords</a> and enabling <a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">two-factor authentication</a> can reduce this risk. With the latter enabled, even if an attacker can crack the password, they cannot use the account without also having the token possessed by the legitimate user of that account. </p> <div class="mw-heading mw-heading3"><h3 id="Use_of_the_same_operating_system">Use of the same operating system</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=22" title="Edit section: Use of the same operating system"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Homogeneity can be a vulnerability. For example, when all computers in a <a href="/wiki/Computer_network" title="Computer network">network</a> run the same operating system, upon exploiting one, one <a href="/wiki/Computer_worm" title="Computer worm">worm</a> can exploit them all:<sup id="cite_ref-UKan_80-0" class="reference"><a href="#cite_note-UKan-80"><span class="cite-bracket">&#91;</span>80<span class="cite-bracket">&#93;</span></a></sup> In particular, <a href="/wiki/Microsoft_Windows" title="Microsoft Windows">Microsoft Windows</a> or <a href="/wiki/Mac_OS_X" class="mw-redirect" title="Mac OS X">Mac OS X</a> have such a large share of the market that an exploited vulnerability concentrating on either operating system could subvert a large number of systems. It is estimated that approximately 83% of malware infections between January and March 2020 were spread via systems running <a href="/wiki/Windows_10" title="Windows 10">Windows 10</a>.<sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">&#91;</span>81<span class="cite-bracket">&#93;</span></a></sup> This risk is mitigated by segmenting the networks into different <a href="/wiki/Subnetwork" class="mw-redirect" title="Subnetwork">subnetworks</a> and setting up <a href="/wiki/Firewall_(computing)" title="Firewall (computing)">firewalls</a> to block traffic between them.<sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">&#91;</span>82<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">&#91;</span>83<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="Mitigation">Mitigation</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=23" title="Edit section: Mitigation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <div class="mw-heading mw-heading3"><h3 id="Antivirus_/_Anti-malware_software"><span id="Antivirus_.2F_Anti-malware_software"></span>Antivirus / Anti-malware software</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=24" title="Edit section: Antivirus / Anti-malware software"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Anti-malware (sometimes also called <a href="/wiki/Antivirus_software" title="Antivirus software">antivirus</a>) programs block and remove some or all types of malware. For example, <a href="/wiki/Microsoft_Security_Essentials" title="Microsoft Security Essentials">Microsoft Security Essentials</a> (for Windows XP, Vista, and Windows 7) and <a href="/wiki/Windows_Defender" class="mw-redirect" title="Windows Defender">Windows Defender</a> (for <a href="/wiki/Windows_8" title="Windows 8">Windows 8</a>, <a href="/wiki/Windows_10" title="Windows 10">10</a> and <a href="/wiki/Windows_11" title="Windows 11">11</a>) provide real-time protection. The <a href="/wiki/Windows_Malicious_Software_Removal_Tool" class="mw-redirect" title="Windows Malicious Software Removal Tool">Windows Malicious Software Removal Tool</a> removes malicious software from the system.<sup id="cite_ref-84" class="reference"><a href="#cite_note-84"><span class="cite-bracket">&#91;</span>84<span class="cite-bracket">&#93;</span></a></sup> Additionally, several capable antivirus software programs are available for free download from the Internet (usually restricted to non-commercial use).<sup id="cite_ref-PCmag_85-0" class="reference"><a href="#cite_note-PCmag-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup> Tests found some free programs to be competitive with commercial ones.<sup id="cite_ref-PCmag_85-1" class="reference"><a href="#cite_note-PCmag-85"><span class="cite-bracket">&#91;</span>85<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-86" class="reference"><a href="#cite_note-86"><span class="cite-bracket">&#91;</span>86<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-87" class="reference"><a href="#cite_note-87"><span class="cite-bracket">&#91;</span>87<span class="cite-bracket">&#93;</span></a></sup> </p><p>Typically, antivirus software can combat malware in the following ways: </p> <ol><li><b>Real-time protection:</b> They can provide real time protection against the installation of malware software on a computer. This type of malware protection works the same way as that of antivirus protection in that the anti-malware software scans all incoming <a href="/wiki/Computer_network" title="Computer network">network</a> data for malware and blocks any <a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">threats</a> it comes across.</li> <li><b>Removal:</b> Anti-malware software programs can be used solely for detection and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.<sup id="cite_ref-88" class="reference"><a href="#cite_note-88"><span class="cite-bracket">&#91;</span>88<span class="cite-bracket">&#93;</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">&#91;<i><a href="/wiki/Wikipedia:Verifiability" title="Wikipedia:Verifiability"><span title="These statements are not matching the info provided by the reference, although they might still be accurate. (July 2024)">failed verification</span></a></i>&#93;</sup></li> <li><b>Sandboxing:</b> <a href="/wiki/Sandbox_(computer_security)" title="Sandbox (computer security)">Sandboxing</a> confines applications within a controlled environment, restricting their operations and isolating them from other applications on the host while limiting access to <a href="/wiki/System_resource" title="System resource">system resources</a>.<sup id="cite_ref-:3_89-0" class="reference"><a href="#cite_note-:3-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup> Browser sandboxing isolates web processes to prevent malware and exploits, enhancing security.<sup id="cite_ref-g370_90-0" class="reference"><a href="#cite_note-g370-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup></li></ol> <div class="mw-heading mw-heading4"><h4 id="Real-time_protection">Real-time protection</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=25" title="Edit section: Real-time protection"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>A specific component of anti-malware software, commonly referred to as an on-access or real-time scanner, hooks deep into the operating system's core or <a href="/wiki/Operating_system_kernel" class="mw-redirect" title="Operating system kernel">kernel</a> and functions in a manner similar to how certain malware itself would attempt to operate, though with the user's informed permission for protecting the system. Any time the operating system accesses a file, the on-access scanner checks if the file is infected or not. Typically, when an infected file is found, execution is stopped and the file is <a href="/wiki/Quarantine" title="Quarantine">quarantined</a> to prevent further damage with the intention to prevent irreversible system damage. Most AVs allow users to override this behaviour. This can have a considerable performance impact on the operating system, though the degree of impact is dependent on how many pages it creates in <a href="/wiki/Virtual_memory" title="Virtual memory">virtual memory</a>.<sup id="cite_ref-91" class="reference"><a href="#cite_note-91"><span class="cite-bracket">&#91;</span>91<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Sandboxing">Sandboxing</h4><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=26" title="Edit section: Sandboxing"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p><a href="/wiki/Sandbox_(computer_security)" title="Sandbox (computer security)">Sandboxing</a> is a <a href="/wiki/Computer_security_model" title="Computer security model">security model</a> that confines applications within a controlled environment, restricting their operations to authorized "safe" actions and isolating them from other applications on the host. It also limits access to system resources like memory and the file system to maintain isolation.<sup id="cite_ref-:3_89-1" class="reference"><a href="#cite_note-:3-89"><span class="cite-bracket">&#91;</span>89<span class="cite-bracket">&#93;</span></a></sup> </p><p>Browser sandboxing is a security measure that isolates web browser processes and tabs from the operating system to prevent malicious code from exploiting vulnerabilities. It helps protect against malware, <a href="/wiki/Zero-day_exploit" class="mw-redirect" title="Zero-day exploit">zero-day exploits</a>, and unintentional data leaks by trapping potentially harmful code within the sandbox. It involves creating separate processes, limiting access to system resources, running <a href="/wiki/Web_content" title="Web content">web content</a> in isolated processes, monitoring system calls, and memory constraints. <a href="/wiki/Inter-process_communication" title="Inter-process communication">Inter-process communication</a> (IPC) is used for <a href="/wiki/Secure_communication" title="Secure communication">secure communication</a> between processes. Escaping the sandbox involves targeting vulnerabilities in the sandbox mechanism or the operating system's sandboxing features.<sup id="cite_ref-g370_90-1" class="reference"><a href="#cite_note-g370-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-a944_92-0" class="reference"><a href="#cite_note-a944-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup> </p><p>While sandboxing is not foolproof, it significantly reduces the <a href="/wiki/Attack_surface" title="Attack surface">attack surface</a> of common threats. Keeping browsers and operating systems updated is crucial to mitigate vulnerabilities.<sup id="cite_ref-g370_90-2" class="reference"><a href="#cite_note-g370-90"><span class="cite-bracket">&#91;</span>90<span class="cite-bracket">&#93;</span></a></sup><sup id="cite_ref-a944_92-1" class="reference"><a href="#cite_note-a944-92"><span class="cite-bracket">&#91;</span>92<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Website_security_scans">Website security scans</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=27" title="Edit section: Website security scans"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Website vulnerability scans check the website, detect malware, may note outdated software, and may report known security issues, in order to reduce the risk of the site being compromised. </p> <div class="mw-heading mw-heading3"><h3 id="Network_Segregation">Network Segregation</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=28" title="Edit section: Network Segregation"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Structuring a network as a set of smaller networks, and limiting the flow of traffic between them to that known to be legitimate, can hinder the ability of infectious malware to replicate itself across the wider network. <a href="/wiki/Software-defined_networking" title="Software-defined networking">Software-defined networking</a> provides techniques to implement such controls. </p> <div class="mw-heading mw-heading3"><h3 id="&quot;Air_gap&quot;_isolation_or_&quot;parallel_network&quot;"><span id=".22Air_gap.22_isolation_or_.22parallel_network.22"></span>"Air gap" isolation or "parallel network"</h3><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=29" title="Edit section: &quot;Air gap&quot; isolation or &quot;parallel network&quot;"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>As a last resort, computers can be protected from malware, and the risk of infected computers disseminating trusted information can be greatly reduced by imposing an <a href="/wiki/Air_gap_(networking)" title="Air gap (networking)">"air gap"</a> (i.e. completely disconnecting them from all other networks) and applying enhanced controls over the entry and exit of software and data from the outside world. However, malware can still cross the air gap in some situations, not least due to the need to introduce software into the air-gapped network and can damage the availability or integrity of assets thereon. <a href="/wiki/Stuxnet" title="Stuxnet">Stuxnet</a> is an example of malware that is introduced to the target environment via a USB drive, causing damage to processes supported on the environment without the need to exfiltrate data. </p><p>AirHopper,<sup id="cite_ref-z758_93-0" class="reference"><a href="#cite_note-z758-93"><span class="cite-bracket">&#91;</span>93<span class="cite-bracket">&#93;</span></a></sup> BitWhisper,<sup id="cite_ref-s209_94-0" class="reference"><a href="#cite_note-s209-94"><span class="cite-bracket">&#91;</span>94<span class="cite-bracket">&#93;</span></a></sup> GSMem<sup id="cite_ref-95" class="reference"><a href="#cite_note-95"><span class="cite-bracket">&#91;</span>95<span class="cite-bracket">&#93;</span></a></sup> and Fansmitter<sup id="cite_ref-96" class="reference"><a href="#cite_note-96"><span class="cite-bracket">&#91;</span>96<span class="cite-bracket">&#93;</span></a></sup> are four techniques introduced by researchers that can leak data from air-gapped computers using electromagnetic, thermal and acoustic emissions. </p> <div class="mw-heading mw-heading2"><h2 id="Research">Research</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=30" title="Edit section: Research"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <p>Utilizing bibliometric analysis, the study of malware research trends from 2005 to 2015, considering criteria such as impact journals, highly cited articles, research areas, number of publications, keyword frequency, institutions, and authors, revealed an annual growth rate of 34.1%. <a href="/wiki/North_America" title="North America">North America</a> led in research output, followed by <a href="/wiki/Asia" title="Asia">Asia</a> and <a href="/wiki/Europe" title="Europe">Europe</a>. <a href="/wiki/China" title="China">China</a> and <a href="/wiki/India" title="India">India</a> were identified as emerging contributors.<sup id="cite_ref-97" class="reference"><a href="#cite_note-97"><span class="cite-bracket">&#91;</span>97<span class="cite-bracket">&#93;</span></a></sup> </p> <div class="mw-heading mw-heading2"><h2 id="See_also">See also</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=31" title="Edit section: See also"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col" style="column-width: 20em;"> <ul><li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Browser_hijacking" title="Browser hijacking">Browser hijacking</a></li> <li><a href="/wiki/Comparison_of_antivirus_software" title="Comparison of antivirus software">Comparison of antivirus software</a></li> <li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Cryptovirology" title="Cryptovirology">Cryptovirology</a></li> <li><a href="/wiki/Cuckoo%27s_egg_(metaphor)" title="Cuckoo&#39;s egg (metaphor)"><i>Cuckoo's egg</i> (metaphor)</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a></li> <li><a href="/wiki/Cyber_spying" title="Cyber spying">Cyber spying</a></li> <li><a href="/wiki/Domain_generation_algorithm" title="Domain generation algorithm">Domain generation algorithm</a></li> <li><a href="/wiki/Facebook_malware" title="Facebook malware">Facebook malware</a></li> <li><a href="/wiki/File_binder" title="File binder">File binder</a></li> <li><a href="/wiki/Identity_theft" title="Identity theft">Identity theft</a></li> <li><a href="/wiki/Industrial_espionage" title="Industrial espionage">Industrial espionage</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Malvertising" title="Malvertising">Malvertising</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a></li> <li><a href="/wiki/Point-of-sale_malware" title="Point-of-sale malware">Point-of-sale malware</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Riskware" title="Riskware">Riskware</a></li> <li><a href="/wiki/Web_application#Development" title="Web application">Security in Web apps</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering (security)</a></li> <li><a href="/wiki/Targeted_threat" title="Targeted threat">Targeted threat</a></li> <li><a href="/wiki/Technical_support_scam" title="Technical support scam">Technical support scam</a></li> <li><a href="/wiki/Telemetry#Software" title="Telemetry">Telemetry software</a></li> <li><a href="/wiki/Typosquatting" title="Typosquatting">Typosquatting</a></li> <li><a href="/wiki/Web_server#Overload_causes" title="Web server">Web server overload causes</a></li> <li><a href="/wiki/Webattacker" title="Webattacker">Webattacker</a></li> <li><a href="/wiki/Zombie_(computer_science)" class="mw-redirect" title="Zombie (computer science)">Zombie (computer science)</a></li></ul> </div> <div class="mw-heading mw-heading2"><h2 id="References">References</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=32" title="Edit section: References"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-:4-1"><span class="mw-cite-backlink">^ <a href="#cite_ref-:4_1-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:4_1-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:4_1-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:4_1-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-:4_1-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text">Tahir, R. (2018). <a rel="nofollow" class="external text" href="https://www.mecs-press.net/ijeme/ijeme-v8-n2/IJEME-V8-N2-3.pdf">A study on malware and malware detection techniques</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230110063748/https://www.mecs-press.net/ijeme/ijeme-v8-n2/IJEME-V8-N2-3.pdf">Archived</a> 10 January 2023 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. <i>International Journal of Education and Management Engineering</i>, <i>8</i>(2), 20.</span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/CaseStudy-002.pdf">"An Undirected Attack Against Critical Infrastructure"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/United_States_Computer_Emergency_Readiness_Team" title="United States Computer Emergency Readiness Team">United States Computer Emergency Readiness Team</a>(Us-cert.gov). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161224070034/https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/CaseStudy-002.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 24 December 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">28 September</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=An+Undirected+Attack+Against+Critical+Infrastructure&amp;rft.pub=United+States+Computer+Emergency+Readiness+Team%28Us-cert.gov%29&amp;rft_id=https%3A%2F%2Fics-cert.us-cert.gov%2Fsites%2Fdefault%2Ffiles%2Frecommended_practices%2FCaseStudy-002.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:1-3"><span class="mw-cite-backlink">^ <a href="#cite_ref-:1_3-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:1_3-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCaniGaudesiSanchezSquillero2014" class="citation book cs1">Cani, Andrea; Gaudesi, Marco; Sanchez, Ernesto; Squillero, Giovanni; Tonda, Alberto (24 March 2014). <a rel="nofollow" class="external text" href="https://doi.org/10.1145/2554850.2555157">"Towards automated malware creation"</a>. <i>Proceedings of the 29th Annual ACM Symposium on Applied Computing</i>. SAC '14. New York, NY, USA: Association for Computing Machinery. pp.&#160;157–160. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2554850.2555157">10.1145/2554850.2555157</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-2469-4" title="Special:BookSources/978-1-4503-2469-4"><bdi>978-1-4503-2469-4</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:14324560">14324560</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Towards+automated+malware+creation&amp;rft.btitle=Proceedings+of+the+29th+Annual+ACM+Symposium+on+Applied+Computing&amp;rft.place=New+York%2C+NY%2C+USA&amp;rft.series=SAC+%2714&amp;rft.pages=157-160&amp;rft.pub=Association+for+Computing+Machinery&amp;rft.date=2014-03-24&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A14324560%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2554850.2555157&amp;rft.isbn=978-1-4503-2469-4&amp;rft.aulast=Cani&amp;rft.aufirst=Andrea&amp;rft.au=Gaudesi%2C+Marco&amp;rft.au=Sanchez%2C+Ernesto&amp;rft.au=Squillero%2C+Giovanni&amp;rft.au=Tonda%2C+Alberto&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1145%2F2554850.2555157&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-4">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBrewer2016" class="citation journal cs1">Brewer, Ross (1 September 2016). <a rel="nofollow" class="external text" href="https://www.sciencedirect.com/science/article/pii/S1353485816300861">"Ransomware attacks: detection, prevention and cure"</a>. <i>Network Security</i>. <b>2016</b> (9): 5–9. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2FS1353-4858%2816%2930086-1">10.1016/S1353-4858(16)30086-1</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1353-4858">1353-4858</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190410072104/https://www.sciencedirect.com/science/article/pii/S1353485816300861">Archived</a> from the original on 10 April 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Network+Security&amp;rft.atitle=Ransomware+attacks%3A+detection%2C+prevention+and+cure&amp;rft.volume=2016&amp;rft.issue=9&amp;rft.pages=5-9&amp;rft.date=2016-09-01&amp;rft_id=info%3Adoi%2F10.1016%2FS1353-4858%2816%2930086-1&amp;rft.issn=1353-4858&amp;rft.aulast=Brewer&amp;rft.aufirst=Ross&amp;rft_id=https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS1353485816300861&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFZhongChenXuZhang2022" class="citation journal cs1">Zhong, Fangtian; Chen, Zekai; Xu, Minghui; Zhang, Guoming; Yu, Dongxiao; <a href="/wiki/Xiuzhen_Cheng" title="Xiuzhen Cheng">Cheng, Xiuzhen</a> (2022). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/9737370">"Malware-on-the-Brain: Illuminating Malware Byte Codes with Images for Malware Classification"</a>. <i>IEEE Transactions on Computers</i>. <b>72</b> (2): 438–451. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/2108.04314">2108.04314</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FTC.2022.3160357">10.1109/TC.2022.3160357</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0018-9340">0018-9340</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:236965755">236965755</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220902175001/https://ieeexplore.ieee.org/document/9737370/">Archived</a> from the original on 2 September 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">2 September</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IEEE+Transactions+on+Computers&amp;rft.atitle=Malware-on-the-Brain%3A+Illuminating+Malware+Byte+Codes+with+Images+for+Malware+Classification&amp;rft.volume=72&amp;rft.issue=2&amp;rft.pages=438-451&amp;rft.date=2022&amp;rft_id=info%3Aarxiv%2F2108.04314&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A236965755%23id-name%3DS2CID&amp;rft.issn=0018-9340&amp;rft_id=info%3Adoi%2F10.1109%2FTC.2022.3160357&amp;rft.aulast=Zhong&amp;rft.aufirst=Fangtian&amp;rft.au=Chen%2C+Zekai&amp;rft.au=Xu%2C+Minghui&amp;rft.au=Zhang%2C+Guoming&amp;rft.au=Yu%2C+Dongxiao&amp;rft.au=Cheng%2C+Xiuzhen&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F9737370&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:2-6"><span class="mw-cite-backlink">^ <a href="#cite_ref-:2_6-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:2_6-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKimBuCho2018" class="citation journal cs1 cs1-prop-long-vol">Kim, Jin-Young; Bu, Seok-Jun; Cho, Sung-Bae (1 September 2018). <a rel="nofollow" class="external text" href="https://www.sciencedirect.com/science/article/pii/S0020025518303475">"Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders"</a>. <i>Information Sciences</i>. 460–461: 83–102. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.ins.2018.04.092">10.1016/j.ins.2018.04.092</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0020-0255">0020-0255</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:51882216">51882216</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20200623174252/https://www.sciencedirect.com/science/article/pii/S0020025518303475">Archived</a> from the original on 23 June 2020<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Information+Sciences&amp;rft.atitle=Zero-day+malware+detection+using+transferred+generative+adversarial+networks+based+on+deep+autoencoders&amp;rft.volume=460%E2%80%93461&amp;rft.pages=83-102&amp;rft.date=2018-09-01&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A51882216%23id-name%3DS2CID&amp;rft.issn=0020-0255&amp;rft_id=info%3Adoi%2F10.1016%2Fj.ins.2018.04.092&amp;rft.aulast=Kim&amp;rft.aufirst=Jin-Young&amp;rft.au=Bu%2C+Seok-Jun&amp;rft.au=Cho%2C+Sung-Bae&amp;rft_id=https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS0020025518303475&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRazakAnuarSallehFirdaus2016" class="citation journal cs1">Razak, Mohd Faizal Ab; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad (1 November 2016). <a rel="nofollow" class="external text" href="https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904">"The rise of "malware": Bibliometric analysis of malware study"</a>. <i>Journal of Network and Computer Applications</i>. <b>75</b>: 58–76. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jnca.2016.08.022">10.1016/j.jnca.2016.08.022</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220626040626/https://linkinghub.elsevier.com/retrieve/pii/S1084804516301904">Archived</a> from the original on 26 June 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">30 April</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Network+and+Computer+Applications&amp;rft.atitle=The+rise+of+%22malware%22%3A+Bibliometric+analysis+of+malware+study&amp;rft.volume=75&amp;rft.pages=58-76&amp;rft.date=2016-11-01&amp;rft_id=info%3Adoi%2F10.1016%2Fj.jnca.2016.08.022&amp;rft.aulast=Razak&amp;rft.aufirst=Mohd+Faizal+Ab&amp;rft.au=Anuar%2C+Nor+Badrul&amp;rft.au=Salleh%2C+Rosli&amp;rft.au=Firdaus%2C+Ahmad&amp;rft_id=https%3A%2F%2Flinkinghub.elsevier.com%2Fretrieve%2Fpii%2FS1084804516301904&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:0-8"><span class="mw-cite-backlink">^ <a href="#cite_ref-:0_8-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:0_8-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFXiaoSunDuLi2020" class="citation journal cs1">Xiao, Fei; Sun, Yi; Du, Donggao; Li, Xuelei; Luo, Min (21 March 2020). <a rel="nofollow" class="external text" href="https://doi.org/10.1155%2F2020%2F6804290">"A Novel Malware Classification Method Based on Crucial Behavior"</a>. <i>Mathematical Problems in Engineering</i>. <b>2020</b>: 1–12. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1155%2F2020%2F6804290">10.1155/2020/6804290</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1024-123X">1024-123X</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Mathematical+Problems+in+Engineering&amp;rft.atitle=A+Novel+Malware+Classification+Method+Based+on+Crucial+Behavior&amp;rft.volume=2020&amp;rft.pages=1-12&amp;rft.date=2020-03-21&amp;rft_id=info%3Adoi%2F10.1155%2F2020%2F6804290&amp;rft.issn=1024-123X&amp;rft.aulast=Xiao&amp;rft.aufirst=Fei&amp;rft.au=Sun%2C+Yi&amp;rft.au=Du%2C+Donggao&amp;rft.au=Li%2C+Xuelei&amp;rft.au=Luo%2C+Min&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1155%252F2020%252F6804290&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-Morgan-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-Morgan_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMorgan2020" class="citation web cs1">Morgan, Steve (13 November 2020). <a rel="nofollow" class="external text" href="https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">"Cybercrime To Cost The World $10.5 Trillion Annually By 2025"</a>. <i>Cybercrime magazine website</i>. Cybersecurity ventures. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220305072352/https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/">Archived</a> from the original on 5 March 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">5 March</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Cybercrime+magazine+website&amp;rft.atitle=Cybercrime+To+Cost+The+World+%2410.5+Trillion+Annually+By+2025&amp;rft.date=2020-11-13&amp;rft.aulast=Morgan&amp;rft.aufirst=Steve&amp;rft_id=https%3A%2F%2Fcybersecurityventures.com%2Fhackerpocalypse-cybercrime-report-2016%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEder-NeuhauserZsebyFabini2019" class="citation journal cs1">Eder-Neuhauser, Peter; Zseby, Tanja; Fabini, Joachim (1 June 2019). <a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs11416-018-0325-y">"Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types"</a>. <i>Journal of Computer Virology and Hacking Techniques</i>. <b>15</b> (2): 109–125. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1007%2Fs11416-018-0325-y">10.1007/s11416-018-0325-y</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2263-8733">2263-8733</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:255164530">255164530</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Computer+Virology+and+Hacking+Techniques&amp;rft.atitle=Malware+propagation+in+smart+grid+networks%3A+metrics%2C+simulation+and+comparison+of+three+malware+types&amp;rft.volume=15&amp;rft.issue=2&amp;rft.pages=109-125&amp;rft.date=2019-06-01&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A255164530%23id-name%3DS2CID&amp;rft.issn=2263-8733&amp;rft_id=info%3Adoi%2F10.1007%2Fs11416-018-0325-y&amp;rft.aulast=Eder-Neuhauser&amp;rft.aufirst=Peter&amp;rft.au=Zseby%2C+Tanja&amp;rft.au=Fabini%2C+Joachim&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1007%252Fs11416-018-0325-y&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text">John von Neumann, "Theory of Self-Reproducing Automata", Part 1: Transcripts of lectures given at the University of Illinois, December 1949, Editor: A. W. Burks, University of Illinois, USA, 1966.</span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text">Fred Cohen, "Computer Viruses", PhD Thesis, University of Southern California, ASP Press, 1988.</span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYoungYung2004" class="citation book cs1">Young, Adam; Yung, Moti (2004). <span class="id-lock-limited" title="Free access subject to limited trial, subscription normally required"><a rel="nofollow" class="external text" href="https://archive.org/details/maliciouscryptog00youn_705"><i>Malicious cryptography - exposing cryptovirology</i></a></span>. Wiley. pp.&#160;<a rel="nofollow" class="external text" href="https://archive.org/details/maliciouscryptog00youn_705/page/n27">1</a>–392. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-7645-4975-5" title="Special:BookSources/978-0-7645-4975-5"><bdi>978-0-7645-4975-5</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Malicious+cryptography+-+exposing+cryptovirology&amp;rft.pages=1-392&amp;rft.pub=Wiley&amp;rft.date=2004&amp;rft.isbn=978-0-7645-4975-5&amp;rft.aulast=Young&amp;rft.aufirst=Adam&amp;rft.au=Yung%2C+Moti&amp;rft_id=https%3A%2F%2Farchive.org%2Fdetails%2Fmaliciouscryptog00youn_705&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-Avoine-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-Avoine_14-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAvoinePascal_JunodPhilippe_Oechslin2007" class="citation book cs1">Avoine, Gildas; Pascal Junod; Philippe Oechslin (2007). <i>Computer system security: basic concepts and solved exercises</i>. EFPL Press. p.&#160;20. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4200-4620-5" title="Special:BookSources/978-1-4200-4620-5"><bdi>978-1-4200-4620-5</bdi></a>. <q>The first PC virus is credited to two brothers, Basit Farooq Alvi and Amjad Farooq Alvi, from Pakistan</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Computer+system+security%3A+basic+concepts+and+solved+exercises&amp;rft.pages=20&amp;rft.pub=EFPL+Press&amp;rft.date=2007&amp;rft.isbn=978-1-4200-4620-5&amp;rft.aulast=Avoine&amp;rft.aufirst=Gildas&amp;rft.au=Pascal+Junod&amp;rft.au=Philippe+Oechslin&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-dodusb-15"><span class="mw-cite-backlink">^ <a href="#cite_ref-dodusb_15-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-dodusb_15-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.cnet.com/uk/news/usb-devices-spreading-viruses/">"USB devices spreading viruses"</a>. <i>CNET</i>. CBS Interactive. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150924055323/http://www.cnet.com/uk/news/usb-devices-spreading-viruses/">Archived</a> from the original on 24 September 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CNET&amp;rft.atitle=USB+devices+spreading+viruses&amp;rft_id=http%3A%2F%2Fwww.cnet.com%2Fuk%2Fnews%2Fusb-devices-spreading-viruses%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation report cs1"><a rel="nofollow" class="external text" href="https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf">2018 Data Breach Investigations Report</a> <span class="cs1-format">(PDF)</span> (Report) (11th&#160;ed.). Verizon. 2018. p.&#160;18. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20211016232230/https://enterprise.verizon.com/resources/reports/DBIR_2018_Report.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 16 October 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">26 September</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=2018+Data+Breach+Investigations+Report&amp;rft.pages=18&amp;rft.edition=11th&amp;rft.pub=Verizon&amp;rft.date=2018&amp;rft_id=https%3A%2F%2Fenterprise.verizon.com%2Fresources%2Freports%2FDBIR_2018_Report.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-Fruhlinger_2018-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-Fruhlinger_2018_17-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFruhlinger2018" class="citation web cs1">Fruhlinger, Josh (10 October 2018). <a rel="nofollow" class="external text" href="https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html">"Top cybersecurity facts, figures and statistics for 2018"</a>. <i>CSO Online</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190602063948/https://www.csoonline.com/article/3153707/top-cybersecurity-facts-figures-and-statistics.html">Archived</a> from the original on 2 June 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">20 January</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=CSO+Online&amp;rft.atitle=Top+cybersecurity+facts%2C+figures+and+statistics+for+2018&amp;rft.date=2018-10-10&amp;rft.aulast=Fruhlinger&amp;rft.aufirst=Josh&amp;rft_id=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3153707%2Ftop-cybersecurity-facts-figures-and-statistics.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWilliam_A_Hendric2014" class="citation web cs1">William A Hendric (4 September 2014). <a rel="nofollow" class="external text" href="https://antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/">"Computer Virus history"</a>. <i>The Register</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180510050522/https://antivirus.comodo.com/blog/computer-safety/short-history-computer-viruses/">Archived</a> from the original on 10 May 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">29 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=The+Register&amp;rft.atitle=Computer+Virus+history&amp;rft.date=2014-09-04&amp;rft.au=William+A+Hendric&amp;rft_id=https%3A%2F%2Fantivirus.comodo.com%2Fblog%2Fcomputer-safety%2Fshort-history-computer-viruses%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://securityboulevard.com/2018/05/cryptomining-worm-massminer-exploits-multiple-vulnerabilities/">"Cryptomining Worm MassMiner Exploits Multiple Vulnerabilities - Security Boulevard"</a>. <i>Security Boulevard</i>. 2 May 2018. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180509221215/https://securityboulevard.com/2018/05/cryptomining-worm-massminer-exploits-multiple-vulnerabilities/">Archived</a> from the original on 9 May 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">9 May</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Security+Boulevard&amp;rft.atitle=Cryptomining+Worm+MassMiner+Exploits+Multiple+Vulnerabilities+-+Security+Boulevard&amp;rft.date=2018-05-02&amp;rft_id=https%3A%2F%2Fsecurityboulevard.com%2F2018%2F05%2Fcryptomining-worm-massminer-exploits-multiple-vulnerabilities%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://us.norton.com/yoursecurityresource/detail.jsp?aid=feature_word">"Beware of Word Document Viruses"</a>. <i>us.norton.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170926001833/https://us.norton.com/yoursecurityresource/detail.jsp?aid=feature_word">Archived</a> from the original on 26 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=us.norton.com&amp;rft.atitle=Beware+of+Word+Document+Viruses&amp;rft_id=https%3A%2F%2Fus.norton.com%2Fyoursecurityresource%2Fdetail.jsp%3Faid%3Dfeature_word&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFTipton2002" class="citation book cs1">Tipton, Harold F. (26 December 2002). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=oR_UHxm7QBwC&amp;q=history+of+malware+pranks&amp;pg=PA982"><i>Information Security Management Handbook</i></a>. CRC Press. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4200-7241-9" title="Special:BookSources/978-1-4200-7241-9"><bdi>978-1-4200-7241-9</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230227060934/https://books.google.com/books?id=oR_UHxm7QBwC&amp;q=history+of+malware+pranks&amp;pg=PA982">Archived</a> from the original on 27 February 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">16 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Information+Security+Management+Handbook&amp;rft.pub=CRC+Press&amp;rft.date=2002-12-26&amp;rft.isbn=978-1-4200-7241-9&amp;rft.aulast=Tipton&amp;rft.aufirst=Harold+F.&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DoR_UHxm7QBwC%26q%3Dhistory%2Bof%2Bmalware%2Bpranks%26pg%3DPA982&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-22"><span class="mw-cite-backlink"><b><a href="#cite_ref-22">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.consumer.ftc.gov/articles/0011-malware">"Malware"</a>. FEDERAL TRADE COMMISSION- CONSUMER INFORMATION. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170320191553/https://www.consumer.ftc.gov/articles/0011-malware">Archived</a> from the original on 20 March 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">27 March</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Malware&amp;rft.pub=FEDERAL+TRADE+COMMISSION-+CONSUMER+INFORMATION&amp;rft_id=http%3A%2F%2Fwww.consumer.ftc.gov%2Farticles%2F0011-malware&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHernandez" class="citation magazine cs1">Hernandez, Pedro. <a rel="nofollow" class="external text" href="https://archive.today/20140123094411/http://www.eweek.com/security/microsoft-vows-to-combat-government-cyber-spying.html">"Microsoft Vows to Combat Government Cyber-Spying"</a>. <i>eWeek</i>. Archived from <a rel="nofollow" class="external text" href="http://www.eweek.com/security/microsoft-vows-to-combat-government-cyber-spying.html">the original</a> on 23 January 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">15 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=eWeek&amp;rft.atitle=Microsoft+Vows+to+Combat+Government+Cyber-Spying&amp;rft.aulast=Hernandez&amp;rft.aufirst=Pedro&amp;rft_id=http%3A%2F%2Fwww.eweek.com%2Fsecurity%2Fmicrosoft-vows-to-combat-government-cyber-spying.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/library/cc512596.aspx">"Malware Revolution: A Change in Target"</a>. March 2007. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20081016211216/https://technet.microsoft.com/en-us/library/cc512596.aspx">Archived</a> from the original on 16 October 2008<span class="reference-accessdate">. Retrieved <span class="nowrap">26 August</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Malware+Revolution%3A+A+Change+in+Target&amp;rft.date=2007-03&amp;rft_id=https%3A%2F%2Ftechnet.microsoft.com%2Fen-us%2Flibrary%2Fcc512596.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-25"><span class="mw-cite-backlink"><b><a href="#cite_ref-25">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.itworld.com/security/84077/child-porn-malwares-ultimate-evil">"Child Porn: Malware's Ultimate Evil"</a>. November 2009. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131022155627/http://www.itworld.com/security/84077/child-porn-malwares-ultimate-evil">Archived</a> from the original on 22 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">22 November</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Child+Porn%3A+Malware%27s+Ultimate+Evil&amp;rft.date=2009-11&amp;rft_id=http%3A%2F%2Fwww.itworld.com%2Fsecurity%2F84077%2Fchild-porn-malwares-ultimate-evil&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.pcworld.com/article/id,116841-page,1/article.html">PC World – Zombie PCs: Silent, Growing Threat</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20080727001520/http://www.pcworld.com/article/id,116841-page,1/article.html">Archived</a> 27 July 2008 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>.</span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKovacs2013" class="citation web cs1">Kovacs, Eduard (27 February 2013). <a rel="nofollow" class="external text" href="http://news.softpedia.com/news/MiniDuke-Malware-Used-Against-European-Government-Organizations-333006.shtml">"MiniDuke Malware Used Against European Government Organizations"</a>. Softpedia. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161011191453/http://news.softpedia.com/news/MiniDuke-Malware-Used-Against-European-Government-Organizations-333006.shtml">Archived</a> from the original on 11 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">27 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=MiniDuke+Malware+Used+Against+European+Government+Organizations&amp;rft.pub=Softpedia&amp;rft.date=2013-02-27&amp;rft.aulast=Kovacs&amp;rft.aufirst=Eduard&amp;rft_id=http%3A%2F%2Fnews.softpedia.com%2Fnews%2FMiniDuke-Malware-Used-Against-European-Government-Organizations-333006.shtml&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-theregister/2022-raccoon-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-theregister/2022-raccoon_28-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFClaburn2022" class="citation news cs1">Claburn, Thomas (26 October 2022). <a rel="nofollow" class="external text" href="https://www.theregister.com/2022/10/26/feds_indict_ukrainian_raccoon/">"Ukrainian indicted by US govt on cybercrime charges"</a>. <i><a href="/wiki/Theregister.com" class="mw-redirect" title="Theregister.com">theregister.com</a></i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221026235426/https://www.theregister.com/2022/10/26/feds_indict_ukrainian_raccoon/">Archived</a> from the original on 26 October 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2022</span>. <q>Those deploying Raccoon used phishing messages and other tricks to get the malware onto potentially millions of victims' computers worldwide. Once installed, the code provided access to login credentials and other data stored on the compromised system.</q></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=theregister.com&amp;rft.atitle=Ukrainian+indicted+by+US+govt+on+cybercrime+charges&amp;rft.date=2022-10-26&amp;rft.aulast=Claburn&amp;rft.aufirst=Thomas&amp;rft_id=https%3A%2F%2Fwww.theregister.com%2F2022%2F10%2F26%2Ffeds_indict_ukrainian_raccoon%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-raccoon.ic3.gov-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-raccoon.ic3.gov_29-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://raccoon.ic3.gov/">"Raccoon Infostealer Disclosure"</a>. <i>raccoon.ic3.gov</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230227063646/https://raccoon.ic3.gov/home">Archived</a> from the original on 27 February 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">27 October</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=raccoon.ic3.gov&amp;rft.atitle=Raccoon+Infostealer+Disclosure&amp;rft_id=https%3A%2F%2Fraccoon.ic3.gov%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.computerweekly.com/news/2240161674/Shamoon-is-latest-malware-to-target-energy-sector">"Shamoon is latest malware to target energy sector"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150923222648/http://www.computerweekly.com/news/2240161674/Shamoon-is-latest-malware-to-target-energy-sector">Archived</a> from the original on 23 September 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Shamoon+is+latest+malware+to+target+energy+sector&amp;rft_id=http%3A%2F%2Fwww.computerweekly.com%2Fnews%2F2240161674%2FShamoon-is-latest-malware-to-target-energy-sector&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.computerweekly.com/news/2240235919/Computer-killing-malware-used-in-Sony-attack-a-wake-up-call-to-business?asrc=EM_MDN_37122786">"Computer-killing malware used in Sony attack a wake-up call"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171207140213/http://www.computerweekly.com/news/2240235919/Computer-killing-malware-used-in-Sony-attack-a-wake-up-call-to-business?asrc=EM_MDN_37122786">Archived</a> from the original on 7 December 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Computer-killing+malware+used+in+Sony+attack+a+wake-up+call&amp;rft_id=http%3A%2F%2Fwww.computerweekly.com%2Fnews%2F2240235919%2FComputer-killing-malware-used-in-Sony-attack-a-wake-up-call-to-business%3Fasrc%3DEM_MDN_37122786&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:5-32"><span class="mw-cite-backlink">^ <a href="#cite_ref-:5_32-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:5_32-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:5_32-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:5_32-3"><sup><i><b>d</b></i></sup></a> <a href="#cite_ref-:5_32-4"><sup><i><b>e</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMolina-CoronadoMoriMendiburuMiguel-Alonso2023" class="citation journal cs1">Molina-Coronado, Borja; Mori, Usue; Mendiburu, Alexander; Miguel-Alonso, Jose (1 January 2023). <a rel="nofollow" class="external text" href="https://www.sciencedirect.com/science/article/pii/S0167404822003881">"Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning"</a>. <i>Computers &amp; Security</i>. <b>124</b>: 102996. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/2205.12569">2205.12569</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.cose.2022.102996">10.1016/j.cose.2022.102996</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0167-4048">0167-4048</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:252734950">252734950</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230110063747/https://www.sciencedirect.com/science/article/pii/S0167404822003881">Archived</a> from the original on 10 January 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">10 January</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Computers+%26+Security&amp;rft.atitle=Towards+a+fair+comparison+and+realistic+evaluation+framework+of+android+malware+detectors+based+on+static+analysis+and+machine+learning&amp;rft.volume=124&amp;rft.pages=102996&amp;rft.date=2023-01-01&amp;rft_id=info%3Aarxiv%2F2205.12569&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A252734950%23id-name%3DS2CID&amp;rft.issn=0167-4048&amp;rft_id=info%3Adoi%2F10.1016%2Fj.cose.2022.102996&amp;rft.aulast=Molina-Coronado&amp;rft.aufirst=Borja&amp;rft.au=Mori%2C+Usue&amp;rft.au=Mendiburu%2C+Alexander&amp;rft.au=Miguel-Alonso%2C+Jose&amp;rft_id=https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS0167404822003881&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-33"><span class="mw-cite-backlink"><b><a href="#cite_ref-33">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://kb.iu.edu/d/aehm">"What are viruses, worms, and Trojan horses?"</a>. <i>Indiana University</i>. The Trustees of Indiana University. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160904162213/https://kb.iu.edu/d/aehm">Archived</a> from the original on 4 September 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">23 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Indiana+University&amp;rft.atitle=What+are+viruses%2C+worms%2C+and+Trojan+horses%3F&amp;rft_id=https%3A%2F%2Fkb.iu.edu%2Fd%2Faehm&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-Szor2005-34"><span class="mw-cite-backlink"><b><a href="#cite_ref-Szor2005_34-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFPeter_Szor2005" class="citation book cs1">Peter Szor (3 February 2005). <a rel="nofollow" class="external text" href="https://books.google.com/books?id=XE-ddYF6uhYC&amp;pg=PT204"><i>The Art of Computer Virus Research and Defense</i></a>. Pearson Education. p.&#160;204. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-0-672-33390-3" title="Special:BookSources/978-0-672-33390-3"><bdi>978-0-672-33390-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=The+Art+of+Computer+Virus+Research+and+Defense&amp;rft.pages=204&amp;rft.pub=Pearson+Education&amp;rft.date=2005-02-03&amp;rft.isbn=978-0-672-33390-3&amp;rft.au=Peter+Szor&amp;rft_id=https%3A%2F%2Fbooks.google.com%2Fbooks%3Fid%3DXE-ddYF6uhYC%26pg%3DPT204&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation encyclopaedia cs1"><a rel="nofollow" class="external text" href="https://www.britannica.com/EBchecked/topic/130688/computer-virus">"computer virus – Encyclopædia Britannica"</a>. <i>Britannica.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130513221333/http://www.britannica.com/EBchecked/topic/130688/computer-virus">Archived</a> from the original on 13 May 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">28 April</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=computer+virus+%E2%80%93+Encyclop%C3%A6dia+Britannica&amp;rft.btitle=Britannica.com&amp;rft_id=https%3A%2F%2Fwww.britannica.com%2FEBchecked%2Ftopic%2F130688%2Fcomputer-virus&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcDowell" class="citation web cs1">McDowell, Mindi. <a rel="nofollow" class="external text" href="http://www.us-cert.gov/ncas/tips/ST06-001">"Understanding Hidden Threats: Rootkits and Botnets"</a>. US-CERT. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170329025139/https://www.us-cert.gov/ncas/tips/ST06-001">Archived</a> from the original on 29 March 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">6 February</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Understanding+Hidden+Threats%3A+Rootkits+and+Botnets&amp;rft.pub=US-CERT&amp;rft.aulast=McDowell&amp;rft.aufirst=Mindi&amp;rft_id=http%3A%2F%2Fwww.us-cert.gov%2Fncas%2Ftips%2FST06-001&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://catb.org/jargon/html/meaning-of-hack.html">"The Meaning of 'Hack'<span class="cs1-kern-right"></span>"</a>. Catb.org. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161013133924/http://www.catb.org/jargon/html/meaning-of-hack.html">Archived</a> from the original on 13 October 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">15 April</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Meaning+of+%27Hack%27&amp;rft.pub=Catb.org&amp;rft_id=http%3A%2F%2Fcatb.org%2Fjargon%2Fhtml%2Fmeaning-of-hack.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:6-38"><span class="mw-cite-backlink">^ <a href="#cite_ref-:6_38-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:6_38-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGill2022" class="citation cs2">Gill, Harjeevan (21 June 2022), <a rel="nofollow" class="external text" href="https://engrxiv.org/preprint/view/2423"><i>Malware: Types, Analysis and Classifications</i></a>, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.31224%2F2423">10.31224/2423</a><span class="reference-accessdate">, retrieved <span class="nowrap">22 June</span> 2024</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=book&amp;rft.btitle=Malware%3A+Types%2C+Analysis+and+Classifications&amp;rft.date=2022-06-21&amp;rft_id=info%3Adoi%2F10.31224%2F2423&amp;rft.aulast=Gill&amp;rft.aufirst=Harjeevan&amp;rft_id=https%3A%2F%2Fengrxiv.org%2Fpreprint%2Fview%2F2423&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFStaff2013" class="citation news cs1">Staff, SPIEGEL (29 December 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html">"Inside TAO: Documents Reveal Top NSA Hacking Unit"</a>. <i>Spiegel Online</i>. SPIEGEL. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170420112316/http://www.spiegel.de/international/world/the-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html">Archived</a> from the original on 20 April 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">23 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Spiegel+Online&amp;rft.atitle=Inside+TAO%3A+Documents+Reveal+Top+NSA+Hacking+Unit&amp;rft.date=2013-12-29&amp;rft.aulast=Staff&amp;rft.aufirst=SPIEGEL&amp;rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fthe-nsa-uses-powerful-toolbox-in-effort-to-spy-on-global-networks-a-940969-3.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-40">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFEdwards" class="citation web cs1">Edwards, John. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170209142725/http://www.itsecurity.com/features/top-zombie-trojan-bots-092507/">"Top Zombie, Trojan Horse and Bot Threats"</a>. IT Security. Archived from <a rel="nofollow" class="external text" href="http://www.itsecurity.com/features/top-zombie-trojan-bots-092507">the original</a> on 9 February 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">25 September</span> 2007</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Top+Zombie%2C+Trojan+Horse+and+Bot+Threats&amp;rft.pub=IT+Security&amp;rft.aulast=Edwards&amp;rft.aufirst=John&amp;rft_id=http%3A%2F%2Fwww.itsecurity.com%2Ffeatures%2Ftop-zombie-trojan-bots-092507&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-41"><span class="mw-cite-backlink"><b><a href="#cite_ref-41">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAppelbaum2013" class="citation news cs1">Appelbaum, Jacob (29 December 2013). <a rel="nofollow" class="external text" href="http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html">"Shopping for Spy Gear:Catalog Advertises NSA Toolbox"</a>. <i>Spiegel Online</i>. SPIEGEL. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170420112319/http://www.spiegel.de/international/world/catalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html">Archived</a> from the original on 20 April 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">29 December</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Spiegel+Online&amp;rft.atitle=Shopping+for+Spy+Gear%3ACatalog+Advertises+NSA+Toolbox&amp;rft.date=2013-12-29&amp;rft.aulast=Appelbaum&amp;rft.aufirst=Jacob&amp;rft_id=http%3A%2F%2Fwww.spiegel.de%2Finternational%2Fworld%2Fcatalog-reveals-nsa-has-back-doors-for-numerous-devices-a-940994.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLandwehrA._R_BullJ._P_McDermottW._S_Choi1993" class="citation conference cs1">Landwehr, C. E; A. R Bull; J. P McDermott; W. S Choi (1993). <a rel="nofollow" class="external text" href="https://apps.dtic.mil/sti/pdfs/ADA465587.pdf"><i>A taxonomy of computer program security flaws, with examples</i></a> <span class="cs1-format">(PDF)</span>. DTIC Document. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130408133230/http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465587">Archived</a> from the original on 8 April 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=A+taxonomy+of+computer+program+security+flaws%2C+with+examples&amp;rft.pub=DTIC+Document&amp;rft.date=1993&amp;rft.aulast=Landwehr&amp;rft.aufirst=C.+E&amp;rft.au=A.+R+Bull&amp;rft.au=J.+P+McDermott&amp;rft.au=W.+S+Choi&amp;rft_id=https%3A%2F%2Fapps.dtic.mil%2Fsti%2Fpdfs%2FADA465587.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20170705103553/http://www.anvari.org/fortune/Miscellaneous_Collections/291162_trojan-horse-coined-by-mit-hacker-turned-nsa-spook-dan-edwards-n.html">"Trojan Horse: &#91;coined By MIT-hacker-turned-NSA-spook Dan Edwards&#93; N."</a> Archived from <a rel="nofollow" class="external text" href="http://www.anvari.org/fortune/Miscellaneous_Collections/291162_trojan-horse-coined-by-mit-hacker-turned-nsa-spook-dan-edwards-n.html">the original</a> on 5 July 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">5 April</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trojan+Horse%3A+%5Bcoined+By+MIT-hacker-turned-NSA-spook+Dan+Edwards%5D+N.&amp;rft_id=http%3A%2F%2Fwww.anvari.org%2Ffortune%2FMiscellaneous_Collections%2F291162_trojan-horse-coined-by-mit-hacker-turned-nsa-spook-dan-edwards-n.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150213213523/http://www.symantec.com/business/support/index?page=content&amp;id=TECH98539">"What is the difference between viruses, worms, and Trojan horses?"</a>. Symantec Corporation. Archived from <a rel="nofollow" class="external text" href="http://www.symantec.com/business/support/index?page=content&amp;id=TECH98539">the original</a> on 13 February 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">10 January</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=What+is+the+difference+between+viruses%2C+worms%2C+and+Trojan+horses%3F&amp;rft.pub=Symantec+Corporation&amp;rft_id=http%3A%2F%2Fwww.symantec.com%2Fbusiness%2Fsupport%2Findex%3Fpage%3Dcontent%26id%3DTECH98539&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.faqs.org/faqs/computer-virus/faq/">"VIRUS-L/comp.virus Frequently Asked Questions (FAQ) v2.00 (Question B3: What is a Trojan Horse?)"</a>. 9 October 1995. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150924041119/http://www.faqs.org/faqs/computer-virus/faq/">Archived</a> from the original on 24 September 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">13 September</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=VIRUS-L%2Fcomp.virus+Frequently+Asked+Questions+%28FAQ%29+v2.00+%28Question+B3%3A+What+is+a+Trojan+Horse%3F%29&amp;rft.date=1995-10-09&amp;rft_id=http%3A%2F%2Fwww.faqs.org%2Ffaqs%2Fcomputer-virus%2Ffaq%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://appleinsider.com/articles/17/03/14/proton-mac-trojan-has-apple-code-signing-signatures-sold-to-customers-for-50k">"Proton Mac Trojan Has Apple Code Signing Signatures Sold to Customers for $50k"</a>. AppleInsider. 14 March 2017. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171019163245/http://appleinsider.com/articles/17/03/14/proton-mac-trojan-has-apple-code-signing-signatures-sold-to-customers-for-50k">Archived</a> from the original on 19 October 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Proton+Mac+Trojan+Has+Apple+Code+Signing+Signatures+Sold+to+Customers+for+%2450k&amp;rft.pub=AppleInsider&amp;rft.date=2017-03-14&amp;rft_id=http%3A%2F%2Fappleinsider.com%2Farticles%2F17%2F03%2F14%2Fproton-mac-trojan-has-apple-code-signing-signatures-sold-to-customers-for-50k&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://betanews.com/2017/08/24/non-windows-malware">"Non-Windows Malware"</a>. Betanews. 24 August 2017. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171020033721/https://betanews.com/2017/08/24/non-windows-malware/">Archived</a> from the original on 20 October 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Non-Windows+Malware&amp;rft.pub=Betanews&amp;rft.date=2017-08-24&amp;rft_id=https%3A%2F%2Fbetanews.com%2F2017%2F08%2F24%2Fnon-windows-malware&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.malwarebytes.com/blog/threats/trojan-dropper">"Trojan Dropper"</a>. MalwareBytes. 30 January 2020. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221031235424/https://www.malwarebytes.com/blog/threats/trojan-dropper">Archived</a> from the original on 31 October 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">31 October</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Trojan+Dropper&amp;rft.pub=MalwareBytes&amp;rft.date=2020-01-30&amp;rft_id=https%3A%2F%2Fwww.malwarebytes.com%2Fblog%2Fthreats%2Ftrojan-dropper&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRichardsonNorth2017" class="citation journal cs1">Richardson, Ronny; North, Max (1 January 2017). <a rel="nofollow" class="external text" href="https://digitalcommons.kennesaw.edu/facpubs/4276">"Ransomware: Evolution, Mitigation and Prevention"</a>. <i>International Management Review</i>. <b>13</b> (1): 10–21. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20221005110429/https://digitalcommons.kennesaw.edu/facpubs/4276/">Archived</a> from the original on 5 October 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">23 November</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Management+Review&amp;rft.atitle=Ransomware%3A+Evolution%2C+Mitigation+and+Prevention&amp;rft.volume=13&amp;rft.issue=1&amp;rft.pages=10-21&amp;rft.date=2017-01-01&amp;rft.aulast=Richardson&amp;rft.aufirst=Ronny&amp;rft.au=North%2C+Max&amp;rft_id=https%3A%2F%2Fdigitalcommons.kennesaw.edu%2Ffacpubs%2F4276&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFruhlinger2017" class="citation news cs1">Fruhlinger, Josh (1 August 2017). <a rel="nofollow" class="external text" href="https://www.csoonline.com/article/3212260/ransomware/the-5-biggest-ransomware-attacks-of-the-last-5-years.html">"The 5 biggest ransomware attacks of the last 5 years"</a>. CSO. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180324041022/https://www.csoonline.com/article/3212260/ransomware/the-5-biggest-ransomware-attacks-of-the-last-5-years.html">Archived</a> from the original on 24 March 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">23 March</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.atitle=The+5+biggest+ransomware+attacks+of+the+last+5+years&amp;rft.date=2017-08-01&amp;rft.aulast=Fruhlinger&amp;rft.aufirst=Josh&amp;rft_id=https%3A%2F%2Fwww.csoonline.com%2Farticle%2F3212260%2Fransomware%2Fthe-5-biggest-ransomware-attacks-of-the-last-5-years.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.welivesecurity.com/wp-content/uploads/2016/02/Rise_of_Android_Ransomware.pdf">"Rise of Android Ransomware, research"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/ESET" title="ESET">ESET</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20171019221531/https://www.welivesecurity.com/wp-content/uploads/2016/02/Rise_of_Android_Ransomware.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 19 October 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Rise+of+Android+Ransomware%2C+research&amp;rft.pub=ESET&amp;rft_id=https%3A%2F%2Fwww.welivesecurity.com%2Fwp-content%2Fuploads%2F2016%2F02%2FRise_of_Android_Ransomware.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.malwarebytes.com/pdf/white-papers/stateofmalware.pdf">"State of Malware, research"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Malwarebytes" title="Malwarebytes">Malwarebytes</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170521075657/https://www.malwarebytes.com/pdf/white-papers/stateofmalware.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 21 May 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">19 October</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=State+of+Malware%2C+research&amp;rft.pub=Malwarebytes&amp;rft_id=https%3A%2F%2Fwww.malwarebytes.com%2Fpdf%2Fwhite-papers%2Fstateofmalware.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-w174-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-w174_53-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFO&#39;KaneSezerCarlin2018" class="citation journal cs1">O'Kane, Philip; Sezer, Sakir; Carlin, Domhnall (2018). "Evolution of ransomware". <i>IET Networks</i>. <b>7</b> (5): 321–327. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1049%2Fiet-net.2017.0207">10.1049/iet-net.2017.0207</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2047-4954">2047-4954</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IET+Networks&amp;rft.atitle=Evolution+of+ransomware&amp;rft.volume=7&amp;rft.issue=5&amp;rft.pages=321-327&amp;rft.date=2018&amp;rft_id=info%3Adoi%2F10.1049%2Fiet-net.2017.0207&amp;rft.issn=2047-4954&amp;rft.aulast=O%27Kane&amp;rft.aufirst=Philip&amp;rft.au=Sezer%2C+Sakir&amp;rft.au=Carlin%2C+Domhnall&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150920143940/http://blogs.technet.com/b/mmpc/archive/2012/11/29/another-way-microsoft-is-disrupting-the-malware-ecosystem.aspx">"Another way Microsoft is disrupting the malware ecosystem"</a>. Archived from <a rel="nofollow" class="external text" href="http://blogs.technet.com/b/mmpc/archive/2012/11/29/another-way-microsoft-is-disrupting-the-malware-ecosystem.aspx">the original</a> on 20 September 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">18 February</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Another+way+Microsoft+is+disrupting+the+malware+ecosystem&amp;rft_id=http%3A%2F%2Fblogs.technet.com%2Fb%2Fmmpc%2Farchive%2F2012%2F11%2F29%2Fanother-way-microsoft-is-disrupting-the-malware-ecosystem.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-russinovich-55"><span class="mw-cite-backlink">^ <a href="#cite_ref-russinovich_55-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-russinovich_55-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRussinovich2005" class="citation web cs1">Russinovich, Mark (31 October 2005). <a rel="nofollow" class="external text" href="http://blogs.technet.com/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx">"Sony, Rootkits and Digital Rights Management Gone Too Far"</a>. <i>Mark's Blog</i>. Microsoft MSDN. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120602231838/http://blogs.technet.com/b/markrussinovich/archive/2005/10/31/sony-rootkits-and-digital-rights-management-gone-too-far.aspx">Archived</a> from the original on 2 June 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">29 July</span> 2009</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Mark%27s+Blog&amp;rft.atitle=Sony%2C+Rootkits+and+Digital+Rights+Management+Gone+Too+Far&amp;rft.date=2005-10-31&amp;rft.aulast=Russinovich&amp;rft.aufirst=Mark&amp;rft_id=http%3A%2F%2Fblogs.technet.com%2Fmarkrussinovich%2Farchive%2F2005%2F10%2F31%2Fsony-rootkits-and-digital-rights-management-gone-too-far.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://arstechnica.com/security/2009/12/av-comparatives-picks-eight-antipua-winners/">"Rating the best anti-malware solutions"</a>. Arstechnica. 15 December 2009. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140202092753/http://arstechnica.com/security/2009/12/av-comparatives-picks-eight-antipua-winners/">Archived</a> from the original on 2 February 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">28 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Rating+the+best+anti-malware+solutions&amp;rft.pub=Arstechnica&amp;rft.date=2009-12-15&amp;rft_id=https%3A%2F%2Farstechnica.com%2Fsecurity%2F2009%2F12%2Fav-comparatives-picks-eight-antipua-winners%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:7-57"><span class="mw-cite-backlink">^ <a href="#cite_ref-:7_57-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:7_57-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:7_57-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKammerstetterPlatzerWondracek2012" class="citation book cs1">Kammerstetter, Markus; Platzer, Christian; Wondracek, Gilbert (16 October 2012). <a rel="nofollow" class="external text" href="https://doi.org/10.1145/2382196.2382282">"Vanity, cracks and malware"</a>. <i>Proceedings of the 2012 ACM conference on Computer and communications security</i>. CCS '12. New York, NY, USA: Association for Computing Machinery. pp.&#160;809–820. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2382196.2382282">10.1145/2382196.2382282</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-1651-4" title="Special:BookSources/978-1-4503-1651-4"><bdi>978-1-4503-1651-4</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:3423843">3423843</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Vanity%2C+cracks+and+malware&amp;rft.btitle=Proceedings+of+the+2012+ACM+conference+on+Computer+and+communications+security&amp;rft.place=New+York%2C+NY%2C+USA&amp;rft.series=CCS+%2712&amp;rft.pages=809-820&amp;rft.pub=Association+for+Computing+Machinery&amp;rft.date=2012-10-16&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A3423843%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2382196.2382282&amp;rft.isbn=978-1-4503-1651-4&amp;rft.aulast=Kammerstetter&amp;rft.aufirst=Markus&amp;rft.au=Platzer%2C+Christian&amp;rft.au=Wondracek%2C+Gilbert&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1145%2F2382196.2382282&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-Casey-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-Casey_58-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCasey2015" class="citation web cs1"><a href="/w/index.php?title=Henry_T._Casey&amp;action=edit&amp;redlink=1" class="new" title="Henry T. Casey (page does not exist)">Casey, Henry T.</a> (25 November 2015). <a rel="nofollow" class="external text" href="https://www.yahoo.com/tech/s/latest-adware-disables-antivirus-software-152920421.html">"Latest adware disables antivirus software"</a>. <i>Tom's Guide</i>. <a href="/wiki/Yahoo.com" class="mw-redirect" title="Yahoo.com">Yahoo.com</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151127070904/https://www.yahoo.com/tech/s/latest-adware-disables-antivirus-software-152920421.html">Archived</a> from the original on 27 November 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">25 November</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=Tom%27s+Guide&amp;rft.atitle=Latest+adware+disables+antivirus+software&amp;rft.date=2015-11-25&amp;rft.aulast=Casey&amp;rft.aufirst=Henry+T.&amp;rft_id=https%3A%2F%2Fwww.yahoo.com%2Ftech%2Fs%2Flatest-adware-disables-antivirus-software-152920421.html&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://oit.ncsu.edu/resnet/p2p">"Peer To Peer Information"</a>. NORTH CAROLINA STATE UNIVERSITY. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20150702143115/http://oit.ncsu.edu/resnet/p2p">Archived</a> from the original on 2 July 2015<span class="reference-accessdate">. Retrieved <span class="nowrap">25 March</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Peer+To+Peer+Information&amp;rft.pub=NORTH+CAROLINA+STATE+UNIVERSITY&amp;rft_id=http%3A%2F%2Foit.ncsu.edu%2Fresnet%2Fp2p&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:8-60"><span class="mw-cite-backlink">^ <a href="#cite_ref-:8_60-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:8_60-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSi̇nghSi̇ngh2018" class="citation journal cs1">Si̇ngh, Jagsir; Si̇ngh, Jaswinder (1 September 2018). <a rel="nofollow" class="external text" href="https://dergipark.org.tr/en/pub/ijiss/issue/67171/1048753">"Challenge of Malware Analysis: Malware obfuscation Techniques"</a>. <i>International Journal of Information Security Science</i>. <b>7</b> (3): 100–110. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230110063749/https://dergipark.org.tr/en/pub/ijiss/issue/67171/1048753">Archived</a> from the original on 10 January 2023<span class="reference-accessdate">. Retrieved <span class="nowrap">10 January</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=International+Journal+of+Information+Security+Science&amp;rft.atitle=Challenge+of+Malware+Analysis%3A+Malware+obfuscation+Techniques&amp;rft.volume=7&amp;rft.issue=3&amp;rft.pages=100-110&amp;rft.date=2018-09-01&amp;rft.aulast=Si%CC%87ngh&amp;rft.aufirst=Jagsir&amp;rft.au=Si%CC%87ngh%2C+Jaswinder&amp;rft_id=https%3A%2F%2Fdergipark.org.tr%2Fen%2Fpub%2Fijiss%2Fissue%2F67171%2F1048753&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:9-61"><span class="mw-cite-backlink">^ <a href="#cite_ref-:9_61-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:9_61-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.tripwire.com/state-of-security/security-data-protection/the-four-most-common-evasive-techniques-used-by-malware/">The Four Most Common Evasive Techniques Used by Malware</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210529160838/https://www.tripwire.com/state-of-security/security-data-protection/the-four-most-common-evasive-techniques-used-by-malware/">Archived</a> 29 May 2021 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>. 27 April 2015.</span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFKiratVignaKruegel2014" class="citation conference cs1">Kirat, Dhilung; Vigna, Giovanni; Kruegel, Christopher (2014). <span class="id-lock-subscription" title="Paid subscription required"><a rel="nofollow" class="external text" href="https://dl.acm.org/citation.cfm?id=2671244"><i>Barecloud: bare-metal analysis-based evasive malware detection</i></a></span>. ACM. pp.&#160;287–301. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-931971-15-7" title="Special:BookSources/978-1-931971-15-7"><bdi>978-1-931971-15-7</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20190801213541/https://dl.acm.org/citation.cfm?id=2671244">Archived</a> from the original on 1 August 2019<span class="reference-accessdate">. Retrieved <span class="nowrap">28 November</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=Barecloud%3A+bare-metal+analysis-based+evasive+malware+detection&amp;rft.pages=287-301&amp;rft.pub=ACM&amp;rft.date=2014&amp;rft.isbn=978-1-931971-15-7&amp;rft.aulast=Kirat&amp;rft.aufirst=Dhilung&amp;rft.au=Vigna%2C+Giovanni&amp;rft.au=Kruegel%2C+Christopher&amp;rft_id=https%3A%2F%2Fdl.acm.org%2Fcitation.cfm%3Fid%3D2671244&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span> <br /> Freely accessible at: <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160304013726/https://seclab.cs.ucsb.edu/media/uploads/papers/kirat_barecloud_usenix_2014.pdf">"Barecloud: bare-metal analysis-based evasive malware detection"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="https://seclab.cs.ucsb.edu/media/uploads/papers/kirat_barecloud_usenix_2014.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 4 March 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">28 November</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Barecloud%3A+bare-metal+analysis-based+evasive+malware+detection&amp;rft_id=https%3A%2F%2Fseclab.cs.ucsb.edu%2Fmedia%2Fuploads%2Fpapers%2Fkirat_barecloud_usenix_2014.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFYoungYung1997" class="citation conference cs1">Young, Adam; Yung, Moti (1997). "Deniable Password Snatching: On the Possibility of Evasive Electronic Espionage". <i>Symp. on Security and Privacy</i>. IEEE. pp.&#160;224–235. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/0-8186-7828-3" title="Special:BookSources/0-8186-7828-3"><bdi>0-8186-7828-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=Deniable+Password+Snatching%3A+On+the+Possibility+of+Evasive+Electronic+Espionage&amp;rft.btitle=Symp.+on+Security+and+Privacy&amp;rft.pages=224-235&amp;rft.pub=IEEE&amp;rft.date=1997&amp;rft.isbn=0-8186-7828-3&amp;rft.aulast=Young&amp;rft.aufirst=Adam&amp;rft.au=Yung%2C+Moti&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCabajCaviglioneMazurczykWendzel2018" class="citation journal cs1">Cabaj, Krzysztof; Caviglione, Luca; Mazurczyk, Wojciech; Wendzel, Steffen; Woodward, Alan; Zander, Sebastian (May 2018). "The New Threats of Information Hiding: The Road Ahead". <i>IT Professional</i>. <b>20</b> (3): 31–39. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1801.00694">1801.00694</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FMITP.2018.032501746">10.1109/MITP.2018.032501746</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:22328658">22328658</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IT+Professional&amp;rft.atitle=The+New+Threats+of+Information+Hiding%3A+The+Road+Ahead&amp;rft.volume=20&amp;rft.issue=3&amp;rft.pages=31-39&amp;rft.date=2018-05&amp;rft_id=info%3Aarxiv%2F1801.00694&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A22328658%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FMITP.2018.032501746&amp;rft.aulast=Cabaj&amp;rft.aufirst=Krzysztof&amp;rft.au=Caviglione%2C+Luca&amp;rft.au=Mazurczyk%2C+Wojciech&amp;rft.au=Wendzel%2C+Steffen&amp;rft.au=Woodward%2C+Alan&amp;rft.au=Zander%2C+Sebastian&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSudhakarKumar2020" class="citation journal cs1">Sudhakar; Kumar, Sushil (14 January 2020). <a rel="nofollow" class="external text" href="https://doi.org/10.1186%2Fs42400-019-0043-x">"An emerging threat Fileless malware: a survey and research challenges"</a>. <i>Cybersecurity</i>. <b>3</b> (1): 1. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1186%2Fs42400-019-0043-x">10.1186/s42400-019-0043-x</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/2523-3246">2523-3246</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:257111442">257111442</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Cybersecurity&amp;rft.atitle=An+emerging+threat+Fileless+malware%3A+a+survey+and+research+challenges&amp;rft.volume=3&amp;rft.issue=1&amp;rft.pages=1&amp;rft.date=2020-01-14&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A257111442%23id-name%3DS2CID&amp;rft.issn=2523-3246&amp;rft_id=info%3Adoi%2F10.1186%2Fs42400-019-0043-x&amp;rft.au=Sudhakar&amp;rft.au=Kumar%2C+Sushil&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1186%252Fs42400-019-0043-x&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation journal cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20210308133613/https://webaccess.psu.edu/?cosign-scripts.libraries.psu.edu&amp;https%3A%2F%2Fscripts.libraries.psu.edu%2Fscripts%2Fezproxyauth.php%3Furl=ezp.2aHR0cHM6Ly9kbC5hY20ub3JnL2RvaS8xMC4xMTQ1LzMzNjUwMDE-">"Penn State WebAccess Secure Login"</a>. <i>webaccess.psu.edu</i>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3365001">10.1145/3365001</a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:219884145">219884145</a>. Archived from <a rel="nofollow" class="external text" href="https://webaccess.psu.edu/?cosign-scripts.libraries.psu.edu&amp;https%3A%2F%2Fscripts.libraries.psu.edu%2Fscripts%2Fezproxyauth.php%3Furl=ezp.2aHR0cHM6Ly9kbC5hY20ub3JnL2RvaS8xMC4xMTQ1LzMzNjUwMDE-">the original</a> on 8 March 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">29 February</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=webaccess.psu.edu&amp;rft.atitle=Penn+State+WebAccess+Secure+Login&amp;rft_id=info%3Adoi%2F10.1145%2F3365001&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A219884145%23id-name%3DS2CID&amp;rft_id=https%3A%2F%2Fwebaccess.psu.edu%2F%3Fcosign-scripts.libraries.psu.edu%26https%253A%252F%252Fscripts.libraries.psu.edu%252Fscripts%252Fezproxyauth.php%253Furl%3Dezp.2aHR0cHM6Ly9kbC5hY20ub3JnL2RvaS8xMC4xMTQ1LzMzNjUwMDE-&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.researchgate.net/publication/328758559">"Malware Dynamic Analysis Evasion Techniques: A Survey"</a>. <i>ResearchGate</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210414031228/https://www.researchgate.net/publication/328758559">Archived</a> from the original on 14 April 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">29 February</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=ResearchGate&amp;rft.atitle=Malware+Dynamic+Analysis+Evasion+Techniques%3A+A+Survey&amp;rft_id=https%3A%2F%2Fwww.researchgate.net%2Fpublication%2F328758559&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFNemeth2015" class="citation book cs1">Nemeth, Zoltan L. (2015). <a rel="nofollow" class="external text" href="https://doi.org/10.1109/SISY.2015.7325394">"Modern binary attacks and defences in the windows environment — Fighting against microsoft EMET in seven rounds"</a>. <i>2015 IEEE 13th International Symposium on Intelligent Systems and Informatics (SISY)</i>. pp.&#160;275–280. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FSISY.2015.7325394">10.1109/SISY.2015.7325394</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4673-9388-1" title="Special:BookSources/978-1-4673-9388-1"><bdi>978-1-4673-9388-1</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:18914754">18914754</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Modern+binary+attacks+and+defences+in+the+windows+environment+%E2%80%94+Fighting+against+microsoft+EMET+in+seven+rounds&amp;rft.btitle=2015+IEEE+13th+International+Symposium+on+Intelligent+Systems+and+Informatics+%28SISY%29&amp;rft.pages=275-280&amp;rft.date=2015&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A18914754%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FSISY.2015.7325394&amp;rft.isbn=978-1-4673-9388-1&amp;rft.aulast=Nemeth&amp;rft.aufirst=Zoltan+L.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1109%2FSISY.2015.7325394&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.kaspersky.com/images/Kaspersky_Report_Browser_Usage_ENG_Final.pdf">"Global Web Browser... Security Trends"</a> <span class="cs1-format">(PDF)</span>. Kaspersky lab. November 2012. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130202153249/http://www.kaspersky.com/images/Kaspersky_Report_Browser_Usage_ENG_Final.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 2 February 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">17 January</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Global+Web+Browser...+Security+Trends&amp;rft.pub=Kaspersky+lab&amp;rft.date=2012-11&amp;rft_id=http%3A%2F%2Fwww.kaspersky.com%2Fimages%2FKaspersky_Report_Browser_Usage_ENG_Final.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRashid2012" class="citation web cs1">Rashid, Fahmida Y. (27 November 2012). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160409063012/http://securitywatch.pcmag.com/none/305385-updated-browsers-still-vulnerable-to-attack-if-plugins-are-outdated">"Updated Browsers Still Vulnerable to Attack if Plugins Are Outdated"</a>. pcmag.com. Archived from <a rel="nofollow" class="external text" href="http://securitywatch.pcmag.com/none/305385-updated-browsers-still-vulnerable-to-attack-if-plugins-are-outdated">the original</a> on 9 April 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">17 January</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Updated+Browsers+Still+Vulnerable+to+Attack+if+Plugins+Are+Outdated&amp;rft.pub=pcmag.com&amp;rft.date=2012-11-27&amp;rft.aulast=Rashid&amp;rft.aufirst=Fahmida+Y.&amp;rft_id=http%3A%2F%2Fsecuritywatch.pcmag.com%2Fnone%2F305385-updated-browsers-still-vulnerable-to-attack-if-plugins-are-outdated&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-71">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDanchev2011" class="citation web cs1">Danchev, Dancho (18 August 2011). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20140705182539/http://www.zdnet.com/blog/security/kaspersky-12-different-vulnerabilities-detected-on-every-pc/9283">"Kaspersky: 12 different vulnerabilities detected on every PC"</a>. pcmag.com. Archived from <a rel="nofollow" class="external text" href="https://www.zdnet.com/blog/security/kaspersky-12-different-vulnerabilities-detected-on-every-pc/9283">the original</a> on 5 July 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">17 January</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Kaspersky%3A+12+different+vulnerabilities+detected+on+every+PC&amp;rft.pub=pcmag.com&amp;rft.date=2011-08-18&amp;rft.aulast=Danchev&amp;rft.aufirst=Dancho&amp;rft_id=http%3A%2F%2Fwww.zdnet.com%2Fblog%2Fsecurity%2Fkaspersky-12-different-vulnerabilities-detected-on-every-pc%2F9283&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.adobe.com/support/security/">"Adobe Security bulletins and advisories"</a>. Adobe.com. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131115002036/http://www.adobe.com/support/security/">Archived</a> from the original on 15 November 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 January</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Adobe+Security+bulletins+and+advisories&amp;rft.pub=Adobe.com&amp;rft_id=https%3A%2F%2Fwww.adobe.com%2Fsupport%2Fsecurity%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRubenking" class="citation magazine cs1">Rubenking, Neil J. <a rel="nofollow" class="external text" href="https://www.pcmag.com/article2/0,2817,2406767,00.asp">"Secunia Personal Software Inspector 3.0 Review &amp; Rating"</a>. <i>PCMag.com</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130116064450/http://www.pcmag.com/article2/0,2817,2406767,00.asp">Archived</a> from the original on 16 January 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">19 January</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=PCMag.com&amp;rft.atitle=Secunia+Personal+Software+Inspector+3.0+Review+%26+Rating&amp;rft.aulast=Rubenking&amp;rft.aufirst=Neil+J.&amp;rft_id=https%3A%2F%2Fwww.pcmag.com%2Farticle2%2F0%2C2817%2C2406767%2C00.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMoralesAl-BatainehXuSandhu2010" class="citation book cs1">Morales, Jose Andre; Al-Bataineh, Areej; Xu, Shouhuai; Sandhu, Ravi (2010). <a rel="nofollow" class="external text" href="https://link.springer.com/chapter/10.1007/978-3-642-16161-2_2">"Analyzing and Exploiting Network Behaviors of Malware"</a>. In Jajodia, Sushil; Zhou, Jianying (eds.). <i>Security and Privacy in Communication Networks</i>. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Vol.&#160;50. Berlin, Heidelberg: Springer. pp.&#160;20–34. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-3-642-16161-2_2">10.1007/978-3-642-16161-2_2</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-3-642-16161-2" title="Special:BookSources/978-3-642-16161-2"><bdi>978-3-642-16161-2</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20211202085918/https://link.springer.com/chapter/10.1007/978-3-642-16161-2_2">Archived</a> from the original on 2 December 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Analyzing+and+Exploiting+Network+Behaviors+of+Malware&amp;rft.btitle=Security+and+Privacy+in+Communication+Networks&amp;rft.place=Berlin%2C+Heidelberg&amp;rft.series=Lecture+Notes+of+the+Institute+for+Computer+Sciences%2C+Social+Informatics+and+Telecommunications+Engineering&amp;rft.pages=20-34&amp;rft.pub=Springer&amp;rft.date=2010&amp;rft_id=info%3Adoi%2F10.1007%2F978-3-642-16161-2_2&amp;rft.isbn=978-3-642-16161-2&amp;rft.aulast=Morales&amp;rft.aufirst=Jose+Andre&amp;rft.au=Al-Bataineh%2C+Areej&amp;rft.au=Xu%2C+Shouhuai&amp;rft.au=Sandhu%2C+Ravi&amp;rft_id=https%3A%2F%2Flink.springer.com%2Fchapter%2F10.1007%2F978-3-642-16161-2_2&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-75">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFeltChinHannaSong2011" class="citation book cs1"><a href="/wiki/Adrienne_Porter_Felt" title="Adrienne Porter Felt">Felt, Adrienne Porter</a>; Chin, Erika; Hanna, Steve; Song, Dawn; Wagner, David (17 October 2011). <a rel="nofollow" class="external text" href="https://doi.org/10.1145/2046707.2046779">"Android permissions demystified"</a>. <i>Proceedings of the 18th ACM conference on Computer and communications security</i>. CCS '11. New York, NY, USA: Association for Computing Machinery. pp.&#160;627–638. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F2046707.2046779">10.1145/2046707.2046779</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-0948-6" title="Special:BookSources/978-1-4503-0948-6"><bdi>978-1-4503-0948-6</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:895039">895039</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Android+permissions+demystified&amp;rft.btitle=Proceedings+of+the+18th+ACM+conference+on+Computer+and+communications+security&amp;rft.place=New+York%2C+NY%2C+USA&amp;rft.series=CCS+%2711&amp;rft.pages=627-638&amp;rft.pub=Association+for+Computing+Machinery&amp;rft.date=2011-10-17&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A895039%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F2046707.2046779&amp;rft.isbn=978-1-4503-0948-6&amp;rft.aulast=Felt&amp;rft.aufirst=Adrienne+Porter&amp;rft.au=Chin%2C+Erika&amp;rft.au=Hanna%2C+Steve&amp;rft.au=Song%2C+Dawn&amp;rft.au=Wagner%2C+David&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1145%2F2046707.2046779&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWuLiu2019" class="citation book cs1">Wu, Sha; Liu, Jiajia (May 2019). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/8761572">"Overprivileged Permission Detection for Android Applications"</a>. <i>ICC 2019 - 2019 IEEE International Conference on Communications (ICC)</i>. pp.&#160;1–6. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FICC.2019.8761572">10.1109/ICC.2019.8761572</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-5386-8088-9" title="Special:BookSources/978-1-5386-8088-9"><bdi>978-1-5386-8088-9</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:198168673">198168673</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220121021339/https://ieeexplore.ieee.org/document/8761572/">Archived</a> from the original on 21 January 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">1 January</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Overprivileged+Permission+Detection+for+Android+Applications&amp;rft.btitle=ICC+2019+-+2019+IEEE+International+Conference+on+Communications+%28ICC%29&amp;rft.pages=1-6&amp;rft.date=2019-05&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A198168673%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FICC.2019.8761572&amp;rft.isbn=978-1-5386-8088-9&amp;rft.aulast=Wu&amp;rft.aufirst=Sha&amp;rft.au=Liu%2C+Jiajia&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F8761572&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://list.ercacinnican.tk/">"Malware, viruses, worms, Trojan horses and spyware"</a>. <i>list.ercacinnican.tk</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20210205072901/https://list.ercacinnican.tk/">Archived</a> from the original on 5 February 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">14 November</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=list.ercacinnican.tk&amp;rft.atitle=Malware%2C+viruses%2C+worms%2C+Trojan+horses+and+spyware&amp;rft_id=https%3A%2F%2Flist.ercacinnican.tk%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMutchAnderson2011" class="citation cs2">Mutch, John; Anderson, Brian (2011), Mutch, John; Anderson, Brian (eds.), <a rel="nofollow" class="external text" href="https://doi.org/10.1007/978-1-4302-3922-2_10">"The Hard and Soft Cost of Apathy"</a>, <i>Preventing Good People from doing Bad Things: Implementing Least Privilege</i>, Berkeley, CA: Apress, pp.&#160;163–175, <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-1-4302-3922-2_10">10.1007/978-1-4302-3922-2_10</a>, <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4302-3922-2" title="Special:BookSources/978-1-4302-3922-2"><bdi>978-1-4302-3922-2</bdi></a>, <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230227061951/https://link.springer.com/chapter/10.1007/978-1-4302-3922-2_10">archived</a> from the original on 27 February 2023<span class="reference-accessdate">, retrieved <span class="nowrap">2 December</span> 2021</span></cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Preventing+Good+People+from+doing+Bad+Things%3A+Implementing+Least+Privilege&amp;rft.atitle=The+Hard+and+Soft+Cost+of+Apathy&amp;rft.pages=163-175&amp;rft.date=2011&amp;rft_id=info%3Adoi%2F10.1007%2F978-1-4302-3922-2_10&amp;rft.isbn=978-1-4302-3922-2&amp;rft.aulast=Mutch&amp;rft.aufirst=John&amp;rft.au=Anderson%2C+Brian&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1007%2F978-1-4302-3922-2_10&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSinghPandey2021" class="citation book cs1">Singh, Vaishali; Pandey, S. K. (2021). <a rel="nofollow" class="external text" href="https://link.springer.com/chapter/10.1007/978-981-15-6014-9_39">"Revisiting Cloud Security Attacks: Credential Attack"</a>. In Rathore, Vijay Singh; Dey, Nilanjan; Piuri, Vincenzo; Babo, Rosalina; Polkowski, Zdzislaw; Tavares, João Manuel R. S. (eds.). <i>Rising Threats in Expert Applications and Solutions</i>. Advances in Intelligent Systems and Computing. Vol.&#160;1187. Singapore: Springer. pp.&#160;339–350. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F978-981-15-6014-9_39">10.1007/978-981-15-6014-9_39</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-981-15-6014-9" title="Special:BookSources/978-981-15-6014-9"><bdi>978-981-15-6014-9</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:224940546">224940546</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20220304031316/https://link.springer.com/chapter/10.1007/978-981-15-6014-9_39">Archived</a> from the original on 4 March 2022<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Revisiting+Cloud+Security+Attacks%3A+Credential+Attack&amp;rft.btitle=Rising+Threats+in+Expert+Applications+and+Solutions&amp;rft.place=Singapore&amp;rft.series=Advances+in+Intelligent+Systems+and+Computing&amp;rft.pages=339-350&amp;rft.pub=Springer&amp;rft.date=2021&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A224940546%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1007%2F978-981-15-6014-9_39&amp;rft.isbn=978-981-15-6014-9&amp;rft.aulast=Singh&amp;rft.aufirst=Vaishali&amp;rft.au=Pandey%2C+S.+K.&amp;rft_id=https%3A%2F%2Flink.springer.com%2Fchapter%2F10.1007%2F978-981-15-6014-9_39&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-UKan-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-UKan_80-0">^</a></b></span> <span class="reference-text">"LNCS 3786 – Key Factors Influencing Worm Infection", U. Kanlayasiri, 2006, web (PDF): <a rel="nofollow" class="external text" href="https://doi.org/10.1007%2F11604938_5">SL40-PDF</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20230227061952/https://link.springer.com/chapter/10.1007/11604938_5">Archived</a> 27 February 2023 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>.</span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFCohen2020" class="citation web cs1">Cohen, Jason (28 August 2020). <a rel="nofollow" class="external text" href="https://au.pcmag.com/encryption/68294/windows-computers-account-for-83-of-all-malware-attacks-in-q1-2020">"Windows Computers Account for 83% of All Malware Attacks in Q1 2020"</a>. <i>PCMag Australia</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20211202085917/https://au.pcmag.com/encryption/68294/windows-computers-account-for-83-of-all-malware-attacks-in-q1-2020">Archived</a> from the original on 2 December 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">2 December</span> 2021</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=PCMag+Australia&amp;rft.atitle=Windows+Computers+Account+for+83%25+of+All+Malware+Attacks+in+Q1+2020&amp;rft.date=2020-08-28&amp;rft.aulast=Cohen&amp;rft.aufirst=Jason&amp;rft_id=https%3A%2F%2Fau.pcmag.com%2Fencryption%2F68294%2Fwindows-computers-account-for-83-of-all-malware-attacks-in-q1-2020&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFWagnerŞahinWinterroseRiordan2016" class="citation book cs1">Wagner, Neal; Şahin, Cem Ş.; Winterrose, Michael; Riordan, James; Pena, Jaime; Hanson, Diana; Streilein, William W. (December 2016). <a rel="nofollow" class="external text" href="https://ieeexplore.ieee.org/document/7849908">"Towards automated cyber decision support: A case study on network segmentation for security"</a>. <i>2016 IEEE Symposium Series on Computational Intelligence (SSCI)</i>. pp.&#160;1–10. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FSSCI.2016.7849908">10.1109/SSCI.2016.7849908</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-5090-4240-1" title="Special:BookSources/978-1-5090-4240-1"><bdi>978-1-5090-4240-1</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:9065830">9065830</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20211202091053/https://ieeexplore.ieee.org/document/7849908/">Archived</a> from the original on 2 December 2021<span class="reference-accessdate">. Retrieved <span class="nowrap">1 January</span> 2022</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Towards+automated+cyber+decision+support%3A+A+case+study+on+network+segmentation+for+security&amp;rft.btitle=2016+IEEE+Symposium+Series+on+Computational+Intelligence+%28SSCI%29&amp;rft.pages=1-10&amp;rft.date=2016-12&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A9065830%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1109%2FSSCI.2016.7849908&amp;rft.isbn=978-1-5090-4240-1&amp;rft.aulast=Wagner&amp;rft.aufirst=Neal&amp;rft.au=%C5%9Eahin%2C+Cem+%C5%9E.&amp;rft.au=Winterrose%2C+Michael&amp;rft.au=Riordan%2C+James&amp;rft.au=Pena%2C+Jaime&amp;rft.au=Hanson%2C+Diana&amp;rft.au=Streilein%2C+William+W.&amp;rft_id=https%3A%2F%2Fieeexplore.ieee.org%2Fdocument%2F7849908&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHembergZipkinSkowyraWagner2018" class="citation book cs1">Hemberg, Erik; Zipkin, Joseph R.; Skowyra, Richard W.; Wagner, Neal; O'Reilly, Una-May (6 July 2018). <a rel="nofollow" class="external text" href="https://doi.org/10.1145/3205651.3208287">"Adversarial co-evolution of attack and defense in a segmented computer network environment"</a>. <i>Proceedings of the Genetic and Evolutionary Computation Conference Companion</i>. GECCO '18. New York, NY, USA: Association for Computing Machinery. pp.&#160;1648–1655. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1145%2F3205651.3208287">10.1145/3205651.3208287</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4503-5764-7" title="Special:BookSources/978-1-4503-5764-7"><bdi>978-1-4503-5764-7</bdi></a>. <a href="/wiki/S2CID_(identifier)" class="mw-redirect" title="S2CID (identifier)">S2CID</a>&#160;<a rel="nofollow" class="external text" href="https://api.semanticscholar.org/CorpusID:51603533">51603533</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=bookitem&amp;rft.atitle=Adversarial+co-evolution+of+attack+and+defense+in+a+segmented+computer+network+environment&amp;rft.btitle=Proceedings+of+the+Genetic+and+Evolutionary+Computation+Conference+Companion&amp;rft.place=New+York%2C+NY%2C+USA&amp;rft.series=GECCO+%2718&amp;rft.pages=1648-1655&amp;rft.pub=Association+for+Computing+Machinery&amp;rft.date=2018-07-06&amp;rft_id=https%3A%2F%2Fapi.semanticscholar.org%2FCorpusID%3A51603533%23id-name%3DS2CID&amp;rft_id=info%3Adoi%2F10.1145%2F3205651.3208287&amp;rft.isbn=978-1-4503-5764-7&amp;rft.aulast=Hemberg&amp;rft.aufirst=Erik&amp;rft.au=Zipkin%2C+Joseph+R.&amp;rft.au=Skowyra%2C+Richard+W.&amp;rft.au=Wagner%2C+Neal&amp;rft.au=O%27Reilly%2C+Una-May&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1145%2F3205651.3208287&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-84"><span class="mw-cite-backlink"><b><a href="#cite_ref-84">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20120621103611/http://www.microsoft.com/security/pc-security/malware-removal.aspx">"Malicious Software Removal Tool"</a>. Microsoft. Archived from <a rel="nofollow" class="external text" href="http://www.microsoft.com/security/pc-security/malware-removal.aspx">the original</a> on 21 June 2012<span class="reference-accessdate">. Retrieved <span class="nowrap">21 June</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=Malicious+Software+Removal+Tool&amp;rft.pub=Microsoft&amp;rft_id=http%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fpc-security%2Fmalware-removal.aspx&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-PCmag-85"><span class="mw-cite-backlink">^ <a href="#cite_ref-PCmag_85-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-PCmag_85-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRubenking2014" class="citation web cs1">Rubenking, Neil J. (8 January 2014). <a rel="nofollow" class="external text" href="https://www.pcmag.com/article2/0,2817,2388652,00.asp">"The Best Free Antivirus for 2014"</a>. pcmag.com. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170830175450/https://www.pcmag.com/article2/0,2817,2388652,00.asp">Archived</a> from the original on 30 August 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">4 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=The+Best+Free+Antivirus+for+2014&amp;rft.pub=pcmag.com&amp;rft.date=2014-01-08&amp;rft.aulast=Rubenking&amp;rft.aufirst=Neil+J.&amp;rft_id=https%3A%2F%2Fwww.pcmag.com%2Farticle2%2F0%2C2817%2C2388652%2C00.asp&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-86"><span class="mw-cite-backlink"><b><a href="#cite_ref-86">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.antivirusgratis.org">"Free antivirus profiles in 2018"</a>. <i>antivirusgratis.org</i>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20180810131706/https://www.antivirusgratis.org/">Archived</a> from the original on 10 August 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">13 February</span> 2020</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=antivirusgratis.org&amp;rft.atitle=Free+antivirus+profiles+in+2018&amp;rft_id=https%3A%2F%2Fwww.antivirusgratis.org&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-87"><span class="mw-cite-backlink"><b><a href="#cite_ref-87">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20180902220617/https://www.techadvisor.co.uk/download/security/crowdinspect-1500-3329721/">"Quickly identify malware running on your PC"</a>. <i>techadvisor.co.uk</i>. Archived from <a rel="nofollow" class="external text" href="https://www.techadvisor.co.uk/download/security/crowdinspect-1500-3329721">the original</a> on 2 September 2018<span class="reference-accessdate">. Retrieved <span class="nowrap">2 September</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=techadvisor.co.uk&amp;rft.atitle=Quickly+identify+malware+running+on+your+PC&amp;rft_id=https%3A%2F%2Fwww.techadvisor.co.uk%2Fdownload%2Fsecurity%2Fcrowdinspect-1500-3329721&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-88"><span class="mw-cite-backlink"><b><a href="#cite_ref-88">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://antivirus.comodo.com/how-antivirus-software-works.php">"How Antivirus Software Works?"</a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170112193703/https://antivirus.comodo.com/how-antivirus-software-works.php">Archived</a> from the original on 12 January 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">16 October</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=unknown&amp;rft.btitle=How+Antivirus+Software+Works%3F&amp;rft_id=https%3A%2F%2Fantivirus.comodo.com%2Fhow-antivirus-software-works.php&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-:3-89"><span class="mw-cite-backlink">^ <a href="#cite_ref-:3_89-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:3_89-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSouppayaScarfone2013" class="citation report cs1">Souppaya, Murugiah; Scarfone, Karen (22 July 2013). <a rel="nofollow" class="external text" href="https://csrc.nist.gov/pubs/sp/800/83/r1/final">Guide to Malware Incident Prevention and Handling for Desktops and Laptops</a> (Report). National Institute of Standards and Technology.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=report&amp;rft.btitle=Guide+to+Malware+Incident+Prevention+and+Handling+for+Desktops+and+Laptops&amp;rft.pub=National+Institute+of+Standards+and+Technology&amp;rft.date=2013-07-22&amp;rft.aulast=Souppaya&amp;rft.aufirst=Murugiah&amp;rft.au=Scarfone%2C+Karen&amp;rft_id=https%3A%2F%2Fcsrc.nist.gov%2Fpubs%2Fsp%2F800%2F83%2Fr1%2Ffinal&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-g370-90"><span class="mw-cite-backlink">^ <a href="#cite_ref-g370_90-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-g370_90-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-g370_90-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.geeksforgeeks.org/what-is-browser-sandboxing/">"What is Browser Sandboxing?"</a>. <i>GeeksforGeeks</i>. 19 February 2024. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240707050014/https://www.geeksforgeeks.org/what-is-browser-sandboxing/">Archived</a> from the original on 7 July 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">7 July</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=GeeksforGeeks&amp;rft.atitle=What+is+Browser+Sandboxing%3F&amp;rft.date=2024-02-19&amp;rft_id=https%3A%2F%2Fwww.geeksforgeeks.org%2Fwhat-is-browser-sandboxing%2F&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-91"><span class="mw-cite-backlink"><b><a href="#cite_ref-91">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFAl-SalehEspinozaCrandall2013" class="citation journal cs1">Al-Saleh, Mohammed Ibrahim; Espinoza, Antonio M.; Crandall, Jedediah R. (2013). <a rel="nofollow" class="external text" href="https://doi.org/10.1049%2Fiet-ifs.2012.0192">"Antivirus performance characterisation: system-wide view"</a>. <i>IET Information Security</i>. <b>7</b> (2): 126–133. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.1049%2Fiet-ifs.2012.0192">10.1049/iet-ifs.2012.0192</a></span>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1751-8717">1751-8717</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=IET+Information+Security&amp;rft.atitle=Antivirus+performance+characterisation%3A+system-wide+view&amp;rft.volume=7&amp;rft.issue=2&amp;rft.pages=126-133&amp;rft.date=2013&amp;rft_id=info%3Adoi%2F10.1049%2Fiet-ifs.2012.0192&amp;rft.issn=1751-8717&amp;rft.aulast=Al-Saleh&amp;rft.aufirst=Mohammed+Ibrahim&amp;rft.au=Espinoza%2C+Antonio+M.&amp;rft.au=Crandall%2C+Jedediah+R.&amp;rft_id=https%3A%2F%2Fdoi.org%2F10.1049%252Fiet-ifs.2012.0192&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-a944-92"><span class="mw-cite-backlink">^ <a href="#cite_ref-a944_92-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-a944_92-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://misile00.github.io/notes/Browser-Sandboxing">"What is browser sandboxing? How to escape the sandbox?"</a>. <i>misile00's personal website</i>. 15 June 2024. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240424000722/https://misile00.github.io/notes/Browser-Sandboxing">Archived</a> from the original on 24 April 2024<span class="reference-accessdate">. Retrieved <span class="nowrap">7 July</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=unknown&amp;rft.jtitle=misile00%27s+personal+website&amp;rft.atitle=What+is+browser+sandboxing%3F+How+to+escape+the+sandbox%3F&amp;rft.date=2024-06-15&amp;rft_id=https%3A%2F%2Fmisile00.github.io%2Fnotes%2FBrowser-Sandboxing&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-z758-93"><span class="mw-cite-backlink"><b><a href="#cite_ref-z758_93-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGuriKedmaKachlonElovici2014" class="citation conference cs1">Guri, Mordechai; Kedma, Gabi; Kachlon, Assaf; Elovici, Yuval (2014). "AirHopper: Bridging the air-gap between isolated networks and mobile phones using radio frequencies". <i>2014 9th International Conference on Malicious and Unwanted Software: The Americas (MALWARE)</i>. IEEE. pp.&#160;58–67. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1411.0237">1411.0237</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FMALWARE.2014.6999418">10.1109/MALWARE.2014.6999418</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4799-7329-3" title="Special:BookSources/978-1-4799-7329-3"><bdi>978-1-4799-7329-3</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=AirHopper%3A+Bridging+the+air-gap+between+isolated+networks+and+mobile+phones+using+radio+frequencies&amp;rft.btitle=2014+9th+International+Conference+on+Malicious+and+Unwanted+Software%3A+The+Americas+%28MALWARE%29&amp;rft.pages=58-67&amp;rft.pub=IEEE&amp;rft.date=2014&amp;rft_id=info%3Aarxiv%2F1411.0237&amp;rft_id=info%3Adoi%2F10.1109%2FMALWARE.2014.6999418&amp;rft.isbn=978-1-4799-7329-3&amp;rft.aulast=Guri&amp;rft.aufirst=Mordechai&amp;rft.au=Kedma%2C+Gabi&amp;rft.au=Kachlon%2C+Assaf&amp;rft.au=Elovici%2C+Yuval&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-s209-94"><span class="mw-cite-backlink"><b><a href="#cite_ref-s209_94-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGuriMonitzMirskiElovici2015" class="citation conference cs1">Guri, Mordechai; Monitz, Matan; Mirski, Yisroel; Elovici, Yuval (2015). "BitWhisper: Covert Signaling Channel between Air-Gapped Computers Using Thermal Manipulations". <i>2015 IEEE 28th Computer Security Foundations Symposium</i>. IEEE. pp.&#160;276–289. <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1503.07919">1503.07919</a></span>. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1109%2FCSF.2015.26">10.1109/CSF.2015.26</a>. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-4673-7538-2" title="Special:BookSources/978-1-4673-7538-2"><bdi>978-1-4673-7538-2</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.atitle=BitWhisper%3A+Covert+Signaling+Channel+between+Air-Gapped+Computers+Using+Thermal+Manipulations&amp;rft.btitle=2015+IEEE+28th+Computer+Security+Foundations+Symposium&amp;rft.pages=276-289&amp;rft.pub=IEEE&amp;rft.date=2015&amp;rft_id=info%3Aarxiv%2F1503.07919&amp;rft_id=info%3Adoi%2F10.1109%2FCSF.2015.26&amp;rft.isbn=978-1-4673-7538-2&amp;rft.aulast=Guri&amp;rft.aufirst=Mordechai&amp;rft.au=Monitz%2C+Matan&amp;rft.au=Mirski%2C+Yisroel&amp;rft.au=Elovici%2C+Yuval&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-95"><span class="mw-cite-backlink"><b><a href="#cite_ref-95">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGuriKachlonHassonKedma2015" class="citation conference cs1">Guri, Mordechai; Kachlon, Assaf; Hasson, Ofer; Kedma, Gabi; Mirsky, Yisroel; Elovici, Yuval (2015). <a rel="nofollow" class="external text" href="https://www.usenix.org/system/files/sec15-paper-guri-update_v2.pdf"><i>GSMem: Data Exfiltration from Air-Gapped Computers over GSM Frequencies</i></a> <span class="cs1-format">(PDF)</span>. USENIX Security Symposium. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a>&#160;<a href="/wiki/Special:BookSources/978-1-939133-11-3" title="Special:BookSources/978-1-939133-11-3"><bdi>978-1-939133-11-3</bdi></a>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20240301215837/https://www.usenix.org/system/files/sec15-paper-guri-update_v2.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 1 March 2024.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&amp;rft.genre=conference&amp;rft.btitle=GSMem%3A+Data+Exfiltration+from+Air-Gapped+Computers+over+GSM+Frequencies&amp;rft.pub=USENIX+Security+Symposium&amp;rft.date=2015&amp;rft.isbn=978-1-939133-11-3&amp;rft.aulast=Guri&amp;rft.aufirst=Mordechai&amp;rft.au=Kachlon%2C+Assaf&amp;rft.au=Hasson%2C+Ofer&amp;rft.au=Kedma%2C+Gabi&amp;rft.au=Mirsky%2C+Yisroel&amp;rft.au=Elovici%2C+Yuval&amp;rft_id=https%3A%2F%2Fwww.usenix.org%2Fsystem%2Ffiles%2Fsec15-paper-guri-update_v2.pdf&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-96"><span class="mw-cite-backlink"><b><a href="#cite_ref-96">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHanspachGoetzDaidakulovElovici2016" class="citation arxiv cs1">Hanspach, Michael; Goetz, Michael; Daidakulov, Andrey; Elovici, Yuval (2016). "Fansmitter: Acoustic Data Exfiltration from (Speakerless) Air-Gapped Computers". <a href="/wiki/ArXiv_(identifier)" class="mw-redirect" title="ArXiv (identifier)">arXiv</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://arxiv.org/abs/1606.05915">1606.05915</a></span> [<a rel="nofollow" class="external text" href="https://arxiv.org/archive/cs.CR">cs.CR</a>].</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=preprint&amp;rft.jtitle=arXiv&amp;rft.atitle=Fansmitter%3A+Acoustic+Data+Exfiltration+from+%28Speakerless%29+Air-Gapped+Computers&amp;rft.date=2016&amp;rft_id=info%3Aarxiv%2F1606.05915&amp;rft.aulast=Hanspach&amp;rft.aufirst=Michael&amp;rft.au=Goetz%2C+Michael&amp;rft.au=Daidakulov%2C+Andrey&amp;rft.au=Elovici%2C+Yuval&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> <li id="cite_note-97"><span class="mw-cite-backlink"><b><a href="#cite_ref-97">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRazakAnuarSallehFirdaus2016" class="citation journal cs1">Razak, Mohd Faizal Ab; Anuar, Nor Badrul; Salleh, Rosli; Firdaus, Ahmad (1 November 2016). <a rel="nofollow" class="external text" href="https://www.sciencedirect.com/science/article/pii/S1084804516301904">"The rise of "malware": Bibliometric analysis of malware study"</a>. <i>Journal of Network and Computer Applications</i>. <b>75</b>: 58–76. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fj.jnca.2016.08.022">10.1016/j.jnca.2016.08.022</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a>&#160;<a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1084-8045">1084-8045</a>.</cite><span title="ctx_ver=Z39.88-2004&amp;rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&amp;rft.genre=article&amp;rft.jtitle=Journal+of+Network+and+Computer+Applications&amp;rft.atitle=The+rise+of+%22malware%22%3A+Bibliometric+analysis+of+malware+study&amp;rft.volume=75&amp;rft.pages=58-76&amp;rft.date=2016-11-01&amp;rft_id=info%3Adoi%2F10.1016%2Fj.jnca.2016.08.022&amp;rft.issn=1084-8045&amp;rft.aulast=Razak&amp;rft.aufirst=Mohd+Faizal+Ab&amp;rft.au=Anuar%2C+Nor+Badrul&amp;rft.au=Salleh%2C+Rosli&amp;rft.au=Firdaus%2C+Ahmad&amp;rft_id=https%3A%2F%2Fwww.sciencedirect.com%2Fscience%2Farticle%2Fpii%2FS1084804516301904&amp;rfr_id=info%3Asid%2Fen.wikipedia.org%3AMalware" class="Z3988"></span></span> </li> </ol></div> <div class="mw-heading mw-heading2"><h2 id="External_links">External links</h2><span class="mw-editsection"><span class="mw-editsection-bracket">[</span><a href="/w/index.php?title=Malware&amp;action=edit&amp;section=33" title="Edit section: External links"><span>edit</span></a><span class="mw-editsection-bracket">]</span></span></div> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/40px-Wiktionary-logo-en-v2.svg.png" decoding="async" width="40" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/60px-Wiktionary-logo-en-v2.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/9/99/Wiktionary-logo-en-v2.svg/80px-Wiktionary-logo-en-v2.svg.png 2x" data-file-width="512" data-file-height="512" /></span></span></div> <div class="side-box-text plainlist">Look up <i><b><a href="https://en.wiktionary.org/wiki/malware" class="extiw" title="wiktionary:malware">malware</a></b></i> in Wiktionary, the free dictionary.</div></div> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1235681985"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1237033735"><div class="side-box side-box-right plainlinks sistersitebox"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1126788409"> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-file-width="1024" data-file-height="1376" /></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Malware" class="extiw" title="commons:Category:Malware">Malware</a></span>.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="http://www.idmarch.org/document/Malware">Further Reading: Research Papers and Documents about Malware on IDMARCH (Int. Digital Media Archive)</a></li> <li><a rel="nofollow" class="external text" href="https://technet.microsoft.com/en-us/sysinternals/Video/gg618529">Advanced Malware Cleaning</a> – a Microsoft video</li></ul> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style></div><div role="navigation" class="navbox" aria-labelledby="Malware_topics" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Malware" title="Template:Malware"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Malware" title="Template talk:Malware"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Malware" title="Special:EditPage/Template:Malware"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Malware_topics" style="font-size:114%;margin:0 4em"><a class="mw-selflink selflink">Malware</a> topics</div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Infectious malware</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Comparison_of_computer_viruses" title="Comparison of computer viruses">Comparison of computer viruses</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Computer virus</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Computer worm</a></li> <li><a href="/wiki/List_of_computer_worms" title="List of computer worms">List of computer worms</a></li> <li><a href="/wiki/Timeline_of_computer_viruses_and_worms" title="Timeline of computer viruses and worms">Timeline of computer viruses and worms</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Concealment</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoor</a></li> <li><a href="/wiki/Clickjacking" title="Clickjacking">Clickjacking</a></li> <li><a href="/wiki/Man-in-the-browser" title="Man-in-the-browser">Man-in-the-browser</a></li> <li><a href="/wiki/Man-in-the-middle_attack" title="Man-in-the-middle attack">Man-in-the-middle</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkit</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie computer</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Malware for profit</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnet</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Fleeceware" title="Fleeceware">Fleeceware</a></li> <li><a href="/wiki/Form_grabbing" title="Form grabbing">Form grabbing</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialer</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke logging</a></li> <li><a href="/wiki/Internet_bot#Malicious_purposes" title="Internet bot">Malbot</a></li> <li><a href="/wiki/Privacy-invasive_software" title="Privacy-invasive software">Privacy-invasive software</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Web_threat" title="Web threat">Web threats</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">By operating system</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Category:Android_(operating_system)_malware" title="Category:Android (operating system) malware">Android malware</a></li> <li><a href="/wiki/Category:Classic_Mac_OS_viruses" title="Category:Classic Mac OS viruses">Classic Mac OS viruses</a></li> <li><a href="/wiki/Category:IOS_malware" title="Category:IOS malware">iOS malware</a></li> <li><a href="/wiki/Linux_malware" title="Linux malware">Linux malware</a></li> <li><a href="/wiki/Category:MacOS_malware" title="Category:MacOS malware">MacOS malware</a></li> <li><a href="/wiki/Macro_virus" title="Macro virus">Macro virus</a></li> <li><a href="/wiki/Mobile_malware" title="Mobile malware">Mobile malware</a></li> <li><a href="/wiki/Palm_OS_viruses" title="Palm OS viruses">Palm OS viruses</a></li> <li><a href="/wiki/HyperCard_viruses" class="mw-redirect" title="HyperCard viruses">HyperCard viruses</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Protection</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Anti-keylogger" title="Anti-keylogger">Anti-keylogger</a></li> <li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Browser_security" title="Browser security">Browser security</a></li> <li><a href="/wiki/Data_loss_prevention_software" title="Data loss prevention software">Data loss prevention software</a></li> <li><a href="/wiki/Defensive_computing" title="Defensive computing">Defensive computing</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Countermeasures</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_and_network_surveillance" title="Computer and network surveillance">Computer and network surveillance</a></li> <li><a href="/wiki/Honeypot_(computing)" title="Honeypot (computing)">Honeypot</a></li> <li><a href="/wiki/Operation:_Bot_Roast" title="Operation: Bot Roast">Operation: Bot Roast</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Software_distribution" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="2"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Software_distribution" title="Template:Software distribution"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Software_distribution" title="Template talk:Software distribution"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Software_distribution" title="Special:EditPage/Template:Software distribution"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Software_distribution" style="font-size:114%;margin:0 4em"><a href="/wiki/Software_distribution" title="Software distribution">Software distribution</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software_license" title="Software license">Licenses</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Beerware" title="Beerware">Beerware</a></li> <li><a href="/wiki/Floating_licensing" title="Floating licensing">Floating licensing</a></li> <li><a href="/wiki/Free_and_open-source_software" title="Free and open-source software">Free and open-source</a> <ul><li><a href="/wiki/Free_software" title="Free software">Free</a></li> <li><a href="/wiki/Open-source_software" title="Open-source software">Open source</a></li></ul></li> <li><a href="/wiki/Freely_redistributable_software" title="Freely redistributable software">Freely redistributable</a></li> <li><a href="/wiki/License-free_software" title="License-free software">License-free</a></li> <li><a href="/wiki/Proprietary_software" title="Proprietary software">Proprietary</a></li> <li><a href="/wiki/Public-domain_software" title="Public-domain software">Public domain</a></li> <li><a href="/wiki/Source-available_software" title="Source-available software">Source-available</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Compensation models</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Commercial_software" title="Commercial software">Commercial software</a> <ul><li><a href="/wiki/Retail_software" title="Retail software">Retail software</a></li></ul></li> <li><a href="/wiki/Crippleware" title="Crippleware">Crippleware</a></li> <li><a href="/wiki/Crowdfunding" title="Crowdfunding">Crowdfunding</a></li> <li><a href="/wiki/Freemium" title="Freemium">Freemium</a></li> <li><a href="/wiki/Freeware" title="Freeware">Freeware</a></li> <li><a href="/wiki/Pay_what_you_want" title="Pay what you want">Pay what you want</a> <ul><li><a href="/wiki/Careware" title="Careware">Careware</a></li> <li><a href="/wiki/Donationware" title="Donationware">Donationware</a></li></ul></li> <li><a href="/wiki/Open-core_model" title="Open-core model">Open-core model</a></li> <li><a href="/wiki/Postcardware" class="mw-redirect" title="Postcardware">Postcardware</a></li> <li><a href="/wiki/Shareware" title="Shareware">Shareware</a> <ul><li><a href="/wiki/Nagware" class="mw-redirect" title="Nagware">Nagware</a></li></ul></li> <li><a href="/wiki/Trialware" class="mw-redirect" title="Trialware">Trialware</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Delivery methods</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Digital_distribution" title="Digital distribution">Digital distribution</a></li> <li><a href="/wiki/File_sharing" title="File sharing">File sharing</a></li> <li><a href="/wiki/On-premises_software" title="On-premises software">On-premises</a></li> <li><a href="/wiki/Pre-installed_software" title="Pre-installed software">Pre-installed</a></li> <li><a href="/wiki/Product_bundling" title="Product bundling">Product bundling</a></li> <li><a href="/wiki/Retail_software" title="Retail software">Retail software</a></li> <li><a href="/wiki/Sneakernet" title="Sneakernet">Sneakernet</a></li> <li><a href="/wiki/Software_as_a_service" title="Software as a service">Software as a service</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Deceptive and/or illicit</th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Unwanted_software_bundling" class="mw-redirect" title="Unwanted software bundling">Unwanted software bundling</a></li> <li><a class="mw-selflink selflink">Malware</a> <ul><li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horse</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worm</a></li></ul></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shovelware" title="Shovelware">Shovelware</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Software_release_life_cycle" title="Software release life cycle">Software release life cycle</a></th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Abandonware" title="Abandonware">Abandonware</a></li> <li><a href="/wiki/End-of-life_product" title="End-of-life product">End-of-life</a></li> <li><a href="/wiki/Long-term_support" title="Long-term support">Long-term support</a></li> <li><a href="/wiki/Software_maintenance" title="Software maintenance">Software maintenance</a></li> <li><a href="/wiki/Software_maintainer" title="Software maintainer">Software maintainer</a></li> <li><a href="/wiki/Software_publisher" title="Software publisher">Software publisher</a></li> <li><a href="/wiki/Vaporware" title="Vaporware">Vaporware</a> <ul><li><a href="/wiki/List_of_vaporware" title="List of vaporware">list</a></li></ul></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li> <li><a href="/wiki/Software_protection_dongle" title="Software protection dongle">Software protection dongle</a></li> <li><a href="/wiki/License_manager" class="mw-redirect" title="License manager">License manager</a></li> <li><a href="/wiki/Product_activation" title="Product activation">Product activation</a></li> <li><a href="/wiki/Product_key" title="Product key">Product key</a></li> <li><a href="/wiki/Software_copyright" title="Software copyright">Software copyright</a></li> <li><a href="/wiki/Software_license_server" title="Software license server">Software license server</a></li> <li><a href="/wiki/Software_patent" title="Software patent">Software patent</a></li> <li><a href="/wiki/Torrent_poisoning" title="Torrent poisoning">Torrent poisoning</a></li></ul> </div></td></tr></tbody></table></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div><div role="navigation" class="navbox" aria-labelledby="Information_security" style="padding:3px"><table class="nowraplinks mw-collapsible autocollapse navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="col" class="navbox-title" colspan="3"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1239400231"><div class="navbar plainlinks hlist navbar-mini"><ul><li class="nv-view"><a href="/wiki/Template:Information_security" title="Template:Information security"><abbr title="View this template">v</abbr></a></li><li class="nv-talk"><a href="/wiki/Template_talk:Information_security" title="Template talk:Information security"><abbr title="Discuss this template">t</abbr></a></li><li class="nv-edit"><a href="/wiki/Special:EditPage/Template:Information_security" title="Special:EditPage/Template:Information security"><abbr title="Edit this template">e</abbr></a></li></ul></div><div id="Information_security" style="font-size:114%;margin:0 4em"><a href="/wiki/Information_security" title="Information security">Information security</a></div></th></tr><tr><th scope="row" class="navbox-group" style="width:1%">Related security categories</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Computer_security" title="Computer security">Computer security</a></li> <li><a href="/wiki/Automotive_security" title="Automotive security">Automotive security</a></li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a> <ul><li><a href="/wiki/Cybersex_trafficking" title="Cybersex trafficking">Cybersex trafficking</a></li> <li><a href="/wiki/Computer_fraud" title="Computer fraud">Computer fraud</a></li></ul></li> <li><a href="/wiki/Cybergeddon" title="Cybergeddon">Cybergeddon</a></li> <li><a href="/wiki/Cyberterrorism" title="Cyberterrorism">Cyberterrorism</a></li> <li><a href="/wiki/Cyberwarfare" title="Cyberwarfare">Cyberwarfare</a></li> <li><a href="/wiki/Electromagnetic_warfare" class="mw-redirect" title="Electromagnetic warfare">Electromagnetic warfare</a></li> <li><a href="/wiki/Information_warfare" title="Information warfare">Information warfare</a></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a></li> <li><a href="/wiki/Mobile_security" title="Mobile security">Mobile security</a></li> <li><a href="/wiki/Network_security" title="Network security">Network security</a></li> <li><a href="/wiki/Copy_protection" title="Copy protection">Copy protection</a></li> <li><a href="/wiki/Digital_rights_management" title="Digital rights management">Digital rights management</a></li></ul> </div></td><td class="noviewer navbox-image" rowspan="3" style="width:1px;padding:0 0 0 2px"><div><figure class="mw-halign-center" typeof="mw:File"><a href="/wiki/File:CIAJMK1209-en.svg" class="mw-file-description" title="vectorial version"><img alt="vectorial version" src="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/150px-CIAJMK1209-en.svg.png" decoding="async" width="150" height="150" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/225px-CIAJMK1209-en.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/c5/CIAJMK1209-en.svg/300px-CIAJMK1209-en.svg.png 2x" data-file-width="496" data-file-height="496" /></a><figcaption>vectorial version</figcaption></figure></div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Threat_(computer)" class="mw-redirect" title="Threat (computer)">Threats</a></th><td class="navbox-list-with-group navbox-list navbox-even hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Adware" title="Adware">Adware</a></li> <li><a href="/wiki/Advanced_persistent_threat" title="Advanced persistent threat">Advanced persistent threat</a></li> <li><a href="/wiki/Arbitrary_code_execution" title="Arbitrary code execution">Arbitrary code execution</a></li> <li><a href="/wiki/Backdoor_(computing)" title="Backdoor (computing)">Backdoors</a></li> <li>Bombs <ul><li><a href="/wiki/Fork_bomb" title="Fork bomb">Fork</a></li> <li><a href="/wiki/Logic_bomb" title="Logic bomb">Logic</a></li> <li><a href="/wiki/Time_bomb_(software)" title="Time bomb (software)">Time</a></li> <li><a href="/wiki/Zip_bomb" title="Zip bomb">Zip</a></li></ul></li> <li><a href="/wiki/Hardware_backdoor" title="Hardware backdoor">Hardware backdoors</a></li> <li><a href="/wiki/Code_injection" title="Code injection">Code injection</a></li> <li><a href="/wiki/Crimeware" title="Crimeware">Crimeware</a></li> <li><a href="/wiki/Cross-site_scripting" title="Cross-site scripting">Cross-site scripting</a></li> <li><a href="/wiki/Cross-site_leaks" title="Cross-site leaks">Cross-site leaks</a></li> <li><a href="/wiki/DOM_clobbering" title="DOM clobbering">DOM clobbering</a></li> <li><a href="/wiki/History_sniffing" title="History sniffing">History sniffing</a></li> <li><a href="/wiki/Cryptojacking" title="Cryptojacking">Cryptojacking</a></li> <li><a href="/wiki/Botnet" title="Botnet">Botnets</a></li> <li><a href="/wiki/Data_breach" title="Data breach">Data breach</a></li> <li><a href="/wiki/Drive-by_download" title="Drive-by download">Drive-by download</a></li> <li><a href="/wiki/Browser_Helper_Object" title="Browser Helper Object">Browser Helper Objects</a></li> <li><a href="/wiki/Computer_virus" title="Computer virus">Viruses</a></li> <li><a href="/wiki/Data_scraping" title="Data scraping">Data scraping</a></li> <li><a href="/wiki/Denial-of-service_attack" title="Denial-of-service attack">Denial-of-service attack</a></li> <li><a href="/wiki/Eavesdropping" title="Eavesdropping">Eavesdropping</a></li> <li><a href="/wiki/Email_fraud" title="Email fraud">Email fraud</a></li> <li><a href="/wiki/Email_spoofing" title="Email spoofing">Email spoofing</a></li> <li><a href="/wiki/Exploit_(computer_security)" title="Exploit (computer security)">Exploits</a></li> <li><a href="/wiki/Dialer#Fraudulent_dialer" title="Dialer">Fraudulent dialers</a></li> <li><a href="/wiki/Hacktivism" title="Hacktivism">Hacktivism</a></li> <li><a href="/wiki/Infostealer" title="Infostealer">Infostealer</a></li> <li><a href="/wiki/Insecure_direct_object_reference" title="Insecure direct object reference">Insecure direct object reference</a></li> <li><a href="/wiki/Keystroke_logging" title="Keystroke logging">Keystroke loggers</a></li> <li><a class="mw-selflink selflink">Malware</a></li> <li><a href="/wiki/Payload_(computing)" title="Payload (computing)">Payload</a></li> <li><a href="/wiki/Phishing" title="Phishing">Phishing</a> <ul><li><a href="/wiki/Voice_phishing" title="Voice phishing">Voice</a></li></ul></li> <li><a href="/wiki/Polymorphic_engine" title="Polymorphic engine">Polymorphic engine</a></li> <li><a href="/wiki/Privilege_escalation" title="Privilege escalation">Privilege escalation</a></li> <li><a href="/wiki/Ransomware" title="Ransomware">Ransomware</a></li> <li><a href="/wiki/Rootkit" title="Rootkit">Rootkits</a></li> <li><a href="/wiki/Scareware" title="Scareware">Scareware</a></li> <li><a href="/wiki/Shellcode" title="Shellcode">Shellcode</a></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a></li> <li><a href="/wiki/Social_engineering_(security)" title="Social engineering (security)">Social engineering</a></li> <li><a href="/wiki/Spyware" title="Spyware">Spyware</a></li> <li><a href="/wiki/Software_bug" title="Software bug">Software bugs</a></li> <li><a href="/wiki/Trojan_horse_(computing)" title="Trojan horse (computing)">Trojan horses</a></li> <li><a href="/wiki/Hardware_Trojan" title="Hardware Trojan">Hardware Trojans</a></li> <li><a href="/wiki/Remote_access_trojan" class="mw-redirect" title="Remote access trojan">Remote access trojans</a></li> <li><a href="/wiki/Vulnerability_(computing)" class="mw-redirect" title="Vulnerability (computing)">Vulnerability</a></li> <li><a href="/wiki/Web_shell" title="Web shell">Web shells</a></li> <li><a href="/wiki/Wiper_(malware)" title="Wiper (malware)">Wiper</a></li> <li><a href="/wiki/Computer_worm" title="Computer worm">Worms</a></li> <li><a href="/wiki/SQL_injection" title="SQL injection">SQL injection</a></li> <li><a href="/wiki/Rogue_security_software" title="Rogue security software">Rogue security software</a></li> <li><a href="/wiki/Zombie_(computing)" title="Zombie (computing)">Zombie</a></li></ul> </div></td></tr><tr><th scope="row" class="navbox-group" style="width:1%">Defenses</th><td class="navbox-list-with-group navbox-list navbox-odd hlist" style="width:100%;padding:0"><div style="padding:0 0.25em"> <ul><li><a href="/wiki/Application_security" title="Application security">Application security</a> <ul><li><a href="/wiki/Secure_coding" title="Secure coding">Secure coding</a></li> <li>Secure by default</li> <li><a href="/wiki/Secure_by_design" title="Secure by design">Secure by design</a> <ul><li><a href="/wiki/Misuse_case" title="Misuse case">Misuse case</a></li></ul></li></ul></li> <li><a href="/wiki/Computer_access_control" title="Computer access control">Computer access control</a> <ul><li><a href="/wiki/Authentication" title="Authentication">Authentication</a> <ul><li><a href="/wiki/Multi-factor_authentication" title="Multi-factor authentication">Multi-factor authentication</a></li></ul></li> <li><a href="/wiki/Authorization" title="Authorization">Authorization</a></li></ul></li> <li><a href="/wiki/Computer_security_software" title="Computer security software">Computer security software</a> <ul><li><a href="/wiki/Antivirus_software" title="Antivirus software">Antivirus software</a></li> <li><a href="/wiki/Security-focused_operating_system" title="Security-focused operating system">Security-focused operating system</a></li></ul></li> <li><a href="/wiki/Data-centric_security" title="Data-centric security">Data-centric security</a></li> <li><a href="/wiki/Code_obfuscation" class="mw-redirect" title="Code obfuscation">Obfuscation (software)</a></li> <li><a href="/wiki/Data_masking" title="Data masking">Data masking</a></li> <li><a href="/wiki/Encryption" title="Encryption">Encryption</a></li> <li><a href="/wiki/Firewall_(computing)" title="Firewall (computing)">Firewall</a></li> <li><a href="/wiki/Intrusion_detection_system" title="Intrusion detection system">Intrusion detection system</a> <ul><li><a href="/wiki/Host-based_intrusion_detection_system" title="Host-based intrusion detection system">Host-based intrusion detection system</a> (HIDS)</li> <li><a href="/wiki/Anomaly_detection" title="Anomaly detection">Anomaly detection</a></li></ul></li> <li><a href="/wiki/Information_security_management" title="Information security management">Information security management</a> <ul><li><a href="/wiki/Information_risk_management" class="mw-redirect" title="Information risk management">Information risk management</a></li> <li><a href="/wiki/Security_information_and_event_management" title="Security information and event management">Security information and event management</a> (SIEM)</li></ul></li> <li><a href="/wiki/Runtime_application_self-protection" title="Runtime application self-protection">Runtime application self-protection</a></li> <li><a href="/wiki/Site_isolation" title="Site isolation">Site isolation</a></li></ul> </div></td></tr></tbody></table></div> <p><br /> </p> <style data-mw-deduplicate="TemplateStyles:r1130092004">.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;justify-content:center;align-items:baseline}.mw-parser-output .portal-bar-bordered{padding:0 2em;background-color:#fdfdfd;border:1px solid #a2a9b1;clear:both;margin:1em auto 0}.mw-parser-output .portal-bar-related{font-size:100%;justify-content:flex-start}.mw-parser-output .portal-bar-unbordered{padding:0 1.7em;margin-left:0}.mw-parser-output .portal-bar-header{margin:0 1em 0 0.5em;flex:0 0 auto;min-height:24px}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;flex:0 1 auto;padding:0.15em 0;column-gap:1em;align-items:baseline;margin:0;list-style:none}.mw-parser-output .portal-bar-content-related{margin:0;list-style:none}.mw-parser-output .portal-bar-item{display:inline-block;margin:0.15em 0.2em;min-height:24px;line-height:24px}@media screen and (max-width:768px){.mw-parser-output .portal-bar{font-size:88%;font-weight:bold;display:flex;flex-flow:column wrap;align-items:baseline}.mw-parser-output .portal-bar-header{text-align:center;flex:0;padding-left:0.5em;margin:0 auto}.mw-parser-output .portal-bar-related{font-size:100%;align-items:flex-start}.mw-parser-output .portal-bar-content{display:flex;flex-flow:row wrap;align-items:center;flex:0;column-gap:1em;border-top:1px solid #a2a9b1;margin:0 auto;list-style:none}.mw-parser-output .portal-bar-content-related{border-top:none;margin:0;list-style:none}}.mw-parser-output .navbox+link+.portal-bar,.mw-parser-output .navbox+style+.portal-bar,.mw-parser-output .navbox+link+.portal-bar-bordered,.mw-parser-output .navbox+style+.portal-bar-bordered,.mw-parser-output .sister-bar+link+.portal-bar,.mw-parser-output .sister-bar+style+.portal-bar,.mw-parser-output .portal-bar+.navbox-styles+.navbox,.mw-parser-output .portal-bar+.navbox-styles+.sister-bar{margin-top:-1px}</style><div class="portal-bar noprint metadata noviewer portal-bar-bordered" role="navigation" aria-label="Portals"><span class="portal-bar-header"><a href="/wiki/Wikipedia:Contents/Portals" title="Wikipedia:Contents/Portals">Portal</a>:</span><ul class="portal-bar-content"><li class="portal-bar-item"><span class="nowrap"><span typeof="mw:File"><a href="/wiki/File:Crystal_Clear_app_linneighborhood.svg" class="mw-file-description"><img alt="icon" src="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/19px-Crystal_Clear_app_linneighborhood.svg.png" decoding="async" width="19" height="19" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/29px-Crystal_Clear_app_linneighborhood.svg.png 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/f/f9/Crystal_Clear_app_linneighborhood.svg/38px-Crystal_Clear_app_linneighborhood.svg.png 2x" data-file-width="407" data-file-height="407" /></a></span> </span><a href="/wiki/Portal:Internet" title="Portal:Internet">Internet</a></li></ul></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"><style data-mw-deduplicate="TemplateStyles:r1038841319">.mw-parser-output .tooltip-dotted{border-bottom:1px dotted;cursor:help}</style></div><div role="navigation" class="navbox authority-control" aria-label="Navbox" style="padding:3px"><table class="nowraplinks hlist navbox-inner" style="border-spacing:0;background:transparent;color:inherit"><tbody><tr><th scope="row" class="navbox-group" style="width:1%"><a href="/wiki/Help:Authority_control" title="Help:Authority control">Authority control databases</a>: National <span class="mw-valign-text-top noprint" typeof="mw:File/Frameless"><a href="https://www.wikidata.org/wiki/Q14001#identifiers" title="Edit this at Wikidata"><img alt="Edit this at Wikidata" src="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/10px-OOjs_UI_icon_edit-ltr-progressive.svg.png" decoding="async" width="10" height="10" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/15px-OOjs_UI_icon_edit-ltr-progressive.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/8/8a/OOjs_UI_icon_edit-ltr-progressive.svg/20px-OOjs_UI_icon_edit-ltr-progressive.svg.png 2x" data-file-width="20" data-file-height="20" /></a></span></th><td class="navbox-list-with-group navbox-list navbox-odd" style="width:100%;padding:0"><div style="padding:0 0.25em"><ul><li><span class="uid"><a rel="nofollow" class="external text" href="https://d-nb.info/gnd/4687059-3">Germany</a></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="https://id.loc.gov/authorities/sh2009005103">United States</a></span></li><li><span class="uid"><span class="rt-commentedText tooltip tooltip-dotted" title="malware"><a rel="nofollow" class="external text" href="https://aleph.nkp.cz/F/?func=find-c&amp;local_base=aut&amp;ccl_term=ica=ph800109&amp;CON_LNG=ENG">Czech Republic</a></span></span></li><li><span class="uid"><a rel="nofollow" class="external text" href="http://olduli.nli.org.il/F/?func=find-b&amp;local_base=NLX10&amp;find_code=UID&amp;request=987007540770705171">Israel</a></span></li></ul></div></td></tr></tbody></table></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐f69cdc8f6‐78s75 Cached time: 20241122140517 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.454 seconds Real time usage: 1.736 seconds Preprocessor visited node count: 7007/1000000 Post‐expand include size: 270331/2097152 bytes Template argument size: 3541/2097152 bytes Highest expansion depth: 14/100 Expensive parser function count: 14/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 402043/5000000 bytes Lua time usage: 0.935/10.000 seconds Lua memory usage: 6883301/52428800 bytes Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1508.516 1 -total 57.12% 861.695 1 Template:Reflist 24.88% 375.387 44 Template:Cite_web 8.40% 126.647 15 Template:Cite_journal 7.66% 115.517 1 Template:Computer_hacking 7.46% 112.501 1 Template:Sidebar_with_collapsible_lists 6.37% 96.026 13 Template:Cite_book 5.25% 79.252 1 Template:Short_description 4.72% 71.238 2 Template:Sister_project 4.55% 68.643 2 Template:Side_box --> <!-- Saved in parser cache with key enwiki:pcache:idhash:20901-0!canonical and timestamp 20241122140517 and revision id 1257292404. Rendering was triggered because: page-view --> </div><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Malware&amp;oldid=1257292404">https://en.wikipedia.org/w/index.php?title=Malware&amp;oldid=1257292404</a>"</div></div> <div id="catlinks" class="catlinks" data-mw="interface"><div id="mw-normal-catlinks" class="mw-normal-catlinks"><a href="/wiki/Help:Category" title="Help:Category">Categories</a>: <ul><li><a href="/wiki/Category:Malware" title="Category:Malware">Malware</a></li><li><a href="/wiki/Category:Security_breaches" title="Category:Security breaches">Security breaches</a></li><li><a href="/wiki/Category:Computer_programming" title="Category:Computer programming">Computer programming</a></li><li><a href="/wiki/Category:Cybercrime" title="Category:Cybercrime">Cybercrime</a></li></ul></div><div id="mw-hidden-catlinks" class="mw-hidden-catlinks mw-hidden-cats-hidden">Hidden categories: <ul><li><a href="/wiki/Category:Webarchive_template_wayback_links" title="Category:Webarchive template wayback links">Webarchive template wayback links</a></li><li><a href="/wiki/Category:CS1:_long_volume_value" title="Category:CS1: long volume value">CS1: long volume value</a></li><li><a href="/wiki/Category:Articles_with_short_description" title="Category:Articles with short description">Articles with short description</a></li><li><a href="/wiki/Category:Short_description_is_different_from_Wikidata" title="Category:Short description is different from Wikidata">Short description is different from Wikidata</a></li><li><a href="/wiki/Category:Use_dmy_dates_from_August_2017" title="Category:Use dmy dates from August 2017">Use dmy dates from August 2017</a></li><li><a href="/wiki/Category:All_articles_with_unsourced_statements" title="Category:All articles with unsourced statements">All articles with unsourced statements</a></li><li><a href="/wiki/Category:Articles_with_unsourced_statements_from_July_2024" title="Category:Articles with unsourced statements from July 2024">Articles with unsourced statements from July 2024</a></li><li><a href="/wiki/Category:All_articles_with_failed_verification" title="Category:All articles with failed verification">All articles with failed verification</a></li><li><a href="/wiki/Category:Articles_with_failed_verification_from_July_2024" title="Category:Articles with failed verification from July 2024">Articles with failed verification from July 2024</a></li><li><a href="/wiki/Category:Commons_category_link_from_Wikidata" title="Category:Commons category link from Wikidata">Commons category link from Wikidata</a></li></ul></div></div> </div> </main> </div> <div class="mw-footer-container"> <footer id="footer" class="mw-footer" > <ul id="footer-info"> <li id="footer-info-lastmod"> This page was last edited on 14 November 2024, at 05:00<span class="anonymous-show">&#160;(UTC)</span>.</li> <li id="footer-info-copyright">Text is available under the <a href="/wiki/Wikipedia:Text_of_the_Creative_Commons_Attribution-ShareAlike_4.0_International_License" title="Wikipedia:Text of the Creative Commons Attribution-ShareAlike 4.0 International License">Creative Commons Attribution-ShareAlike 4.0 License</a>; additional terms may apply. By using this site, you agree to the <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use" class="extiw" title="foundation:Special:MyLanguage/Policy:Terms of Use">Terms of Use</a> and <a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy" class="extiw" title="foundation:Special:MyLanguage/Policy:Privacy policy">Privacy Policy</a>. Wikipedia® is a registered trademark of the <a rel="nofollow" class="external text" href="https://wikimediafoundation.org/">Wikimedia Foundation, Inc.</a>, a non-profit organization.</li> </ul> <ul id="footer-places"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-mobileview"><a href="//en.m.wikipedia.org/w/index.php?title=Malware&amp;mobileaction=toggle_view_mobile" class="noprint stopMobileRedirectToggle">Mobile view</a></li> </ul> <ul id="footer-icons" class="noprint"> <li id="footer-copyrightico"><a href="https://wikimediafoundation.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/static/images/footer/wikimedia-button.svg" width="84" height="29" alt="Wikimedia Foundation" loading="lazy"></a></li> <li id="footer-poweredbyico"><a href="https://www.mediawiki.org/" class="cdx-button cdx-button--fake-button cdx-button--size-large cdx-button--fake-button--enabled"><img src="/w/resources/assets/poweredby_mediawiki.svg" alt="Powered by MediaWiki" width="88" height="31" loading="lazy"></a></li> </ul> </footer> </div> </div> </div> <div class="vector-settings" id="p-dock-bottom"> <ul></ul> </div><script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-f69cdc8f6-x5wzj","wgBackendResponseTime":146,"wgPageParseReport":{"limitreport":{"cputime":"1.454","walltime":"1.736","ppvisitednodes":{"value":7007,"limit":1000000},"postexpandincludesize":{"value":270331,"limit":2097152},"templateargumentsize":{"value":3541,"limit":2097152},"expansiondepth":{"value":14,"limit":100},"expensivefunctioncount":{"value":14,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":402043,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1508.516 1 -total"," 57.12% 861.695 1 Template:Reflist"," 24.88% 375.387 44 Template:Cite_web"," 8.40% 126.647 15 Template:Cite_journal"," 7.66% 115.517 1 Template:Computer_hacking"," 7.46% 112.501 1 Template:Sidebar_with_collapsible_lists"," 6.37% 96.026 13 Template:Cite_book"," 5.25% 79.252 1 Template:Short_description"," 4.72% 71.238 2 Template:Sister_project"," 4.55% 68.643 2 Template:Side_box"]},"scribunto":{"limitreport-timeusage":{"value":"0.935","limit":"10.000"},"limitreport-memusage":{"value":6883301,"limit":52428800}},"cachereport":{"origin":"mw-web.codfw.main-f69cdc8f6-78s75","timestamp":"20241122140517","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Malware","url":"https:\/\/en.wikipedia.org\/wiki\/Malware","sameAs":"http:\/\/www.wikidata.org\/entity\/Q14001","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q14001","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2002-01-04T04:13:09Z","dateModified":"2024-11-14T05:00:03Z","headline":"software that is intentionally hostile, intrusive, or damaging to a computer or network"}</script> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10