Looks Too Good To Be True Banner

Malware

Derived from the words "malicious" and "software," malware is a form of hostile, intrusive, or annoying software or code that is generally transmitted online. Malware is often used to enter a computer system without conforming to standard authentication procedures. The most common forms of malware include:

  • Adware - A software package, which displays ads in an unexpected and often unwanted fashion. Adware can be covertly installed on computers through one of two methods: users can be tricked into clicking a malware link, or users may use a file-sharing program to install freeware that secretly includes adware. Some forms of adware automatically activate pay-per-click advertisement links to perform click fraud.
  • Backdoor - A method of bypassing standard authentication procedures while attempting to avoid detection. A backdoor may be installed on an individual's computer through a vulnerability in the operating system or through an existing piece of malware, such as a Trojan horse, worm, or rootkit. The backdoor turns the computer into a zombie, enabling attackers to run scripts to invisibly surf the net, load and reload pages that support ads, and click on ads.
  • Bot - A software application that performs automated tasks online. These tasks are generally simple and structurally repetitive, such as web spidering. Bots can be used maliciously to commit click fraud by botnets through a command-and-control infrastructure. Newer versions of bots can scan their hosts for vulnerabilities and weak passwords and use such information to self-propagate.
  • Computer worm - A program that self-replicates through a network. Computer worms typically spread by exploiting vulnerabilities and bugs in operating systems and outdated applications. As a worm spreads, it can create a botnet
  • Rootkit - A composition of one or more programs designed to hide the presence of other forms of malware, such as Trojans and viruses, from both users and antivirus solutions. Rootkits subvert or evade standard operating system security mechanisms by either modifying paths or modifying system structures. They may modify parts of the operating system or install themselves as kernel modules or drivers, depending on the operating system. Rootkits exist for several operating systems, including Microsoft Windows, Mac OS, and Linux.
  • Trojan horse - A form of malware that seems to perform a desirable function but once installed on a computer, gives cyber-criminals unauthorized access to that computer. A computer worm or a virus can be a Trojan horse. Trojan horses can be used to assimilate computers into botnets in order to perpetrate click fraud.
  • Virus - A computer program that infects a computer and self-replicates without the consent or knowledge of the computer’s owner. Many current viruses are the result of old threats, like rootkits, that have been recycled or reinvented. Unlike a worm, a virus can only spread from computer to computer when its host is delivered as executable code to the target computer online or through a removable connection medium like a USB drive. Viruses can be used and spread to create a botnet.

Learn More About Malware:
Anchor Intelligence: Click Fraud Glossary