Skip to content
Fast-turnaround security assessments available — 10+ years development & security experienceGet started
Back to Glossary
Glossary2 min read

Malware

Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.

Malware, short for malicious software, is any program or code intentionally designed to harm computer systems, steal data, or gain unauthorized access. It encompasses a broad range of threat types including viruses, worms, trojans, ransomware, spyware, and rootkits.

How It Works

Malware reaches target systems through various delivery mechanisms. Phishing emails carry malicious attachments or links to compromised downloads. Drive-by downloads exploit browser vulnerabilities when users visit infected websites. Supply chain attacks embed malware in legitimate software updates. Removable media, misconfigured network services, and social engineering round out the common delivery vectors.

Once executed, malware behavior varies by type. Ransomware encrypts files and demands payment for the decryption key. Trojans disguise themselves as legitimate software while providing backdoor access to attackers. Worms self-replicate across networks without user interaction. Rootkits modify the operating system to hide their presence from security software and administrators. Many modern malware families combine multiple capabilities — a trojan might install a keylogger, establish a backdoor, and deploy ransomware as a final-stage payload.

Advanced malware employs evasion techniques to avoid detection. Polymorphic malware changes its code signature with each infection. Fileless malware operates entirely in memory, leaving no artifacts on disk for traditional antivirus to scan. Some variants detect sandbox environments used by security researchers and alter their behavior to appear benign during analysis.

Defense Strategies

Effective malware defense requires layers. Endpoint protection solutions combine signature-based detection with behavioral analysis. Network monitoring identifies suspicious traffic patterns associated with command-and-control communication. Email filtering blocks malicious attachments and links before they reach users. Regular patching eliminates the vulnerabilities that malware exploits to gain initial access. User awareness training reduces the success rate of social engineering delivery methods.

Why It Matters

Malware remains the primary mechanism through which attackers achieve their objectives, from data theft to operational disruption. Understanding how malware operates, spreads, and evades detection is essential for building effective defenses and responding to incidents when prevention fails.

Need your application tested? Get in touch.

Need your application tested?

We find these vulnerabilities in real applications every day.

Request an Assessment