Malware
Also known as: Malicious software
Any software intentionally built to damage, disrupt, or gain unauthorized access to a system — including viruses, worms, ransomware, trojans, and spyware.
Last updated:
What is malware?
Malware (short for "malicious software") is any program or code written to harm, spy on, or take control of the system it lands on. The term is a catch-all that covers several functional categories:
- Viruses attach to legitimate programs and spread when the host executes
- Worms self-propagate across networks without requiring user action
- Trojans masquerade as legitimate software to trick the user into running them
- Ransomware encrypts the victim's files and demands payment for the key
- Spyware silently collects credentials, keystrokes, or screenshots
- Rootkits hide other malware from detection tools by subverting the OS
- Cryptominers use the victim's CPU/GPU to mine cryptocurrency
Most modern malware blends these categories — a single sample may start as a trojan, drop ransomware, and exfiltrate data to a command and control server.
How malware reaches a target
Common delivery paths: phishing emails with macro-laced attachments or malicious links, drive-by downloads from compromised websites, USB drops, software-supply-chain compromises (a legitimate update gets backdoored), and exploitation of unpatched public-facing services. Once executed, malware typically establishes persistence (survive reboots), beacons out to C2 infrastructure for instructions, and spreads laterally inside the network.
Detection from IP data
A host that suddenly starts making outbound connections to known-malicious IPs is one of the clearest signs of active malware on the network. Endpoint detection (EDR) catches file and behavior signatures; network-level detection catches the C2 beacons. Running suspicious destination IPs through an IP abuse report checker confirms whether a host is already flagged as malware infrastructure.