What is malware?

Key Takeaways:

Malware is short for “malicious software.” It is an umbrella term that encompasses any hostile or intrusive software created with the intent to harm or exploit programmable devices or networks. Essentially, if a piece of software is intentionally doing something unwanted or harmful in your system—whether that’s corrupting files, spying on user activity, or extortion—it qualifies as malware.

Malware can come in many forms and can infect everything from personal devices to critical corporate servers. All malware ultimately has a malicious purpose, though the aims and objectives might vary. Some of the primary goals of malware include stealing sensitive information, extorting money, disrupting normal operations, conducting espionage, and exploiting system resources.

Who Are the Targets of Malware Attacks?

No one is immune from malware; it is a threat to everyone in today’s digital world. However, attackers often tailor their malware campaigns toward specific targets based on the value of the data or the ease of compromise.

Common targets include:

The Most Common Types of Malware

Malware comes in many forms, each with different behaviors and objectives. Understanding the major types of malware is the first step to defending against them.

Ransomware

Ransomware is a type of malware that encrypts a victim’s files or entire system, then demands a ransom payment in exchange for the decryption key. Once ransomware infects a system, it quickly scrambles all important data, effectively holding it hostage. Ransomware attacks have surged in recent years—hitting businesses, hospitals, and even city governments—and can be extremely profitable for cybercriminals.

Trojan (or Trojan Horse)

A Trojan is malware that masquerades as legitimate software to trick users into executing it, typically relying on social engineering and deception. A Trojan program might look like a harmless application or email attachment but in reality conceals malicious code usually aimed at stealing data, creating a backdoor for remote access, or downloading additional malware into the system.

Spyware

Spyware is malware designed to secretly monitor and record the victim’s activities. Spyware can log your keystrokes to capture passwords, take periodic screenshots, track browsing habits and communications, or even activate microphones and webcams to eavesdrop. Data can then be used for identity theft, financial fraud, or corporate espionage.

Worms

Worms are self-contained malware programs that replicate themselves in order to spread to other computers. Worm infections can spread extremely rapidly in unprotected networks and, once inside, can cause damage ranging from clogging up network traffic to delivering payloads on every infected system.

Viruses

A virus is a classic type of malware that infects other files or programs by inserting its code into them. A virus typically requires a user to unwittingly execute an infected file, at which point the virus code activates and begins to self-replicate across other files on the same system or shared drives. Viruses can corrupt or delete data, degrade system performance, or otherwise interfere in operations.

Adware

Adware is software that automatically displays advertisements on a user’s device, usually in a disruptive manner. While some adware is merely annoying, it often goes hand-in-hand with more malicious behavior. Adware programs slow down system performance and may open the door for other malware infections. In some cases, adware can track browsing activity and personal data, blurring the line into spyware.

Rootkits

A rootkit is a collection of malicious tools that enable an attacker to gain and maintain administrative-level control over a system while remaining hidden. Rootkits often modify core system processes, allowing malware and attacker actions to remain undetected by security software. They are notoriously difficult to detect and remove.

Fileless Malware

Fileless malware operates entirely in memory (RAM) rather than writing malicious files to the hard drive. Because nothing foreign is being saved to the drive, traditional file-scanning antivirus tools often struggle to detect fileless malware. These attacks might exploit scripts and macros, use PowerShell or WMI to execute payloads in memory, or inject themselves into legitimate running processes.

How Does Malware Spread?

Attackers use numerous tactics for delivering malware to systems and users. Some of the most common methods include:

How to Prevent and Protect Against Malware

A layered security approach is essential to defending against malware. No single technique is foolproof, so organizations and individuals should combine multiple preventive measures.

Key components of malware protection include:

Threat Intelligence Stops Malware Before It Executes

Traditional security tools, like antivirus and firewalls, are largely reactive, detecting malware only after an infection or malicious activity has occurred. In this era of fast-moving threats, organizations must be proactive to truly get ahead of threats. Real-time threat intelligence provides an early warning system and actionable insights that let security teams correlate signals and stop malware before it ever executes.

Recorded Future’s Threat Intelligence platform continuously collects and analyzes data from a broad range of sources to illuminate emerging malware threats. By leveraging this kind of proactive threat intelligence program, organizations can:

Don’t Just Detect Malware—Prevent It

Malware is constantly evolving, but with the right approach, defenses can evolve even faster. Stop relying on reactive measures and basic malware detection and response tools, and start building a truly proactive defense powered by real-time threat intelligence. Book a demo with Recorded Future today.

Frequently Asked Questions

What is the difference between malware and a virus?

A virus is a type of malware. Malware (short for malicious software) is the broad, umbrella term for any software designed to cause harm. A virus is a specific type of malware that attaches to a program or file and requires a human action (like opening the file) to spread and execute its malicious code. Other types of malware, like worms, can self-replicate and spread automatically without human interaction.

What is the most common type of malware?

While this can change, Trojans are consistently one of the most common types of malware. A Trojan disguises itself as legitimate or harmless software to trick a user into installing it. Once installed, the Trojan can carry out its true malicious function, such as stealing data, installing other malware (like ransomware), or giving attackers remote access to the system.

What are the common signs of a malware infection?

Common signs include a sudden and significant drop in system performance, frequent crashes or freezes, an increase in pop-up ads, being redirected to websites you didn't intend to visit, new toolbars or icons in your browser, or your antivirus software being disabled.

How does Recorded Future help organizations defend against malware?

Recorded Future provides real-time threat intelligence that helps organizations move from a reactive to a proactive defense. Instead of waiting to detect malware, Recorded Future's threat intelligence identifies malicious infrastructure (like C2 servers), malware signatures, and attacker TTPs from the open, deep, and dark web. This information is then integrated into an organization's existing security tools (like firewalls or EDR and SIEM solutions) to automatically block threats before they can execute.

How does threat intelligence stop malware attacks?

Threat intelligence provides the necessary context to stop malware effectively. It helps security teams understand:

  • Who is attacking (threat actors and their motives)
  • What they are using (specific malware strains, vulnerabilities)
  • How they are attacking (TTPs, or Tactics, Techniques, and Procedures). This intelligence allows organizations to prioritize patching the vulnerabilities malware exploits, hunt for threats within their networks, and block indicators of compromise (IOCs) like malicious IP addresses, domains, and file hashes associated with active malware campaigns.