Malware
Derived from the words "malicious" and "software," malware is a form of hostile,
intrusive, or annoying software or code that is generally transmitted online. Malware
is often used to enter a computer system without conforming to standard authentication
procedures. The most common forms of malware include:
- Adware - A software package,
which displays ads in an unexpected and often unwanted fashion. Adware can be covertly
installed on computers through one of two methods: users can be tricked into clicking
a malware link, or users may use a file-sharing program to install freeware that
secretly includes adware. Some forms of adware automatically activate pay-per-click
advertisement links to perform
click fraud.
- Backdoor - A method of
bypassing standard authentication procedures while attempting to avoid detection.
A backdoor may be installed on an individual's computer through a vulnerability
in the operating system or through an existing piece of malware, such as a Trojan
horse, worm, or rootkit. The backdoor turns the computer into a zombie, enabling
attackers to run scripts to invisibly surf the net, load and reload pages that support
ads, and click on ads.
- Bot - A software application
that performs automated tasks online. These tasks are generally simple and structurally
repetitive, such as web spidering. Bots can be used maliciously to commit click
fraud by botnets through a command-and-control infrastructure. Newer versions of
bots can scan their hosts for vulnerabilities and weak passwords and use such information
to self-propagate.
- Computer worm - A program
that self-replicates through a network. Computer worms typically spread by exploiting
vulnerabilities and bugs in operating systems and outdated applications. As a worm
spreads, it can create a
botnet
- Rootkit - A composition
of one or more programs designed to hide the presence of other forms of malware,
such as Trojans and viruses, from both users and antivirus solutions. Rootkits subvert
or evade standard operating system security mechanisms by either modifying paths
or modifying system structures. They may modify parts of the operating system or
install themselves as kernel modules or drivers, depending on the operating system.
Rootkits exist for several operating systems, including Microsoft Windows, Mac OS,
and Linux.
- Trojan horse - A form
of malware that seems to perform a desirable function but once installed on a computer,
gives cyber-criminals unauthorized access to that computer. A computer worm or a
virus can be a Trojan horse. Trojan horses can be used to assimilate computers into
botnets in order to perpetrate click fraud.
- Virus - A computer program
that infects a computer and self-replicates without the consent or knowledge of
the computer’s owner. Many current viruses are the result of old threats, like rootkits,
that have been recycled or reinvented. Unlike a worm, a virus can only spread from
computer to computer when its host is delivered as executable code to the target
computer online or through a removable connection medium like a USB drive. Viruses
can be used and spread to create a botnet.
Learn More About Malware:
Anchor Intelligence: Click Fraud Glossary