Attack Techniques

What Is Malware?

Malware (malicious software) is any software intentionally designed to damage, disrupt, gain unauthorized access to, leak private information from, or deprive access to computer systems, servers, clients, and networks.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Malware (malicious software) is any software intentionally designed to damage, disrupt, gain unauthorized access to, leak private information from, or deprive access to computer systems, servers, clients, and networks. Malware encompasses a broad category of hostile or intrusive software including viruses, worms, trojans, ransomware, spyware, adware, rootkits, botnets, keyloggers, infostealers, and fileless variants. Malware executes unauthorized operations on victim systems without informed consent, operating for purposes of extortion, data theft, espionage, system disruption, or financial fraud.

How does malware work?

Malware operates through varied delivery, installation, persistence, and payload execution mechanisms that evolve continuously to evade detection.

Delivery mechanisms vary widely. According to Fortinet and Cybereason, email phishing with malicious attachments (Office macros, executable files, PDF exploits) or links triggering drive-by downloads remains the most common vector. Malicious downloads from compromised websites, fake software, or watering hole attacks targeting specific industries provide alternative delivery paths. Supply chain attacks inject malware during software update installation, while removable media including USB drives and external hard drives contain autorun malware. Network exploitation through unpatched vulnerabilities (CVEs), weak credentials, or exposed RDP and SSH services enables direct infection without user interaction. Social engineering including pretexting, whaling, and business email compromise tricks users into installing malware voluntarily. Cloud services abuse leverages legitimate platforms such as GitHub, Google Drive, and Discord for malware hosting.

Execution and persistence methods determine how malware maintains access. File-based malware is the traditional form—written to disk and executed when launched, detected by signature scanning. Fileless malware executes directly in memory using legitimate operating system tools including PowerShell, WMI, and JavaScript, with no file artifact to scan. According to SentinelOne and Cybereason, living off the land attacks abuse pre-installed tools for execution, avoiding antivirus detection. Macro-based malware embeds in Office documents and executes when documents are opened if macros are enabled. Registry persistence adds entries to Windows Run or RunOnce registry keys for automatic startup. Scheduled tasks create hidden scheduled tasks to maintain persistence across reboots.

Payload execution follows varied patterns. Direct execution means malware runs immediately upon successful infection. Multi-stage deployment involves initial loaders downloading secondary payloads from command-and-control servers in stages, avoiding large file detection. Polymorphic malware changes binary code while maintaining functionality, evading signature detection through constant mutation. Modular architecture separates functionality into distinct modules handling command-and-control communication, credential theft, data exfiltration, and privilege escalation.

Common payload functions vary by malware type. Information stealing (infostealers) extracts credentials, cookies, browser history, clipboard data, and screen captures. Backdoor access through Remote Access Trojans (RATs) gives attackers interactive control over compromised systems. Cryptocurrency mining (cryptojacking) consumes victim CPU resources for attacker profit. Botneting integrates infected devices into botnets for distributed denial-of-service attacks, spam distribution, or distributed attack campaigns. Keylogging captures keyboard input, recording passwords and sensitive data. Data exfiltration transfers files and data to attacker infrastructure. Worm propagation enables self-replication across networks and removable media without user interaction.

How does malware differ across types?

Malware Type

Delivery

Persistence

Payload

Detection Difficulty

Ideal for

Virus

File attachment

Infects other files

Varies

Medium (signature)

Spreading via file sharing; environments with minimal endpoint protection

Worm

Network propagation

Standalone executable

Self-replicating

Medium

Rapid lateral movement across networks; unpatched environments

Trojan

Phishing, drive-by

RDP backdoor

Remote access

High (legitimate-looking)

Targeted access to specific systems; long-term persistent access

Ransomware

Phishing, exploit

Encryption key

File encryption

Medium (behavioral)

Financial extortion; disrupting business operations

Spyware

Email, download

Registry, scheduled task

Screen capture, logging

High (memory-resident)

Surveillance and data theft; espionage operations

Rootkit

Exploit, admin

Kernel-level

Privileged access

Very High (kernel hiding)

Hiding other malware; maintaining stealth administrative access

Infostealer

Phishing, malware

Process injection

Credential theft

High (memory-based)

Credential harvesting at scale; initial access brokering

Botnet

Worm, exploit

Self-propagating

DDoS, spam

Medium (C2 detection)

Distributed attacks; cryptocurrency mining; spam distribution

Fileless Malware

Phishing macro, script

PowerShell/WMI startup

Memory-resident code

Very High (no file artifact)

Evading signature-based detection; advanced persistent threats

Viruses attach to legitimate files and programs, spreading when those files are shared. All viruses are malware, but not all malware is a virus. Worms self-replicate across networks without user interaction, while viruses require file execution to spread.

Trojans appear legitimate but contain malicious functionality. Detection difficulty is high because trojans often masquerade as legitimate software. Ransomware encrypts data for extortion, with behavioral detection more effective than signature-based approaches.

Spyware operates silently to collect information, often memory-resident to avoid file-based detection. Rootkits operate at the kernel level, hiding their presence and other malware from security tools, making detection very difficult.

Infostealers focus on credential theft and data exfiltration, often using process injection to operate in memory. Botnets create distributed networks of compromised devices controlled by command-and-control infrastructure.

Fileless malware represents the highest detection difficulty because it executes entirely in memory without creating file artifacts. According to CrowdStrike, 79% of 2024 intrusions were fileless or malware-free, up from 62% in 2023, indicating attackers increasingly favor these techniques.

Why does malware matter?

Malware represents a fundamental and growing threat to organizations and individuals globally, with volume and sophistication both increasing.

AV-TEST and Malwarebytes report that 450,000 to 560,000 new malware variants are detected daily in 2024. AV-TEST (2024) registered 60 million new malware strains in 2024, bringing the total distinct malware samples to 1.2 billion as of 2024. DeepStrike (2024) detected 6.2 billion malware infections in 2024.

GetAstra (2024) estimates that over 1 billion active malware programs exist worldwide, including trojans, spyware, rootkits, cryptojackers, and fileless attacks. DeepStrike reports that 59% of organizations were subject to malware attack in 2024.

Small companies are particularly vulnerable. According to GetAstra, 47% of small companies (under $10 million revenue) were hit by ransomware in the past year. The perception that small organizations are not targets is incorrect—automated malware campaigns affect organizations of all sizes.

The financial impact is severe. The average cost of data breach in the United States reached $9 million in 2024, according to Statista (2024). DeepStrike reports the average recovery cost from ransomware and malware reached $2.73 million in 2024, up from $1.73 million in 2023. For small organizations, Comparitech (2024) reports an average recovery cost of $165,000.

GetAstra reports that 4 companies fall victim to ransomware every minute globally. The average ransom payment increased 500% to $2 million in 2024, according to GetAstra, though other sources report declining average payments, suggesting high variability based on victim and attack sophistication.

The trend toward fileless malware is particularly concerning. According to CrowdStrike, malware-free detections increased from 62% in 2021 to 71% in 2022 and reached 79% in 2024. This trend indicates attackers are moving away from traditional file-based malware toward techniques that evade signature-based detection.

What are the limitations of malware?

Malware effectiveness is constrained by multiple defensive technologies and operational requirements.

Initial infection vectors can be blocked through user awareness. Phishing, unpatched systems, and weak credentials remain the primary infection vectors, but users can avoid these through security awareness and proper configuration. Signature-based detection catalogues known malware with databases updated daily, blocking known variants.

Fileless attacks require execution of suspicious processes that behavioral detection can identify. According to SentinelOne and Cybereason, endpoint detection and response tools monitor process behavior rather than file signatures, detecting fileless malware through behavioral anomalies.

Most malware variants are active for short periods only. According to AV-TEST, while 450,000 new variants appear daily, threat lifespan is limited as security vendors quickly develop signatures and behavioral detection rules.

Malware-free (Living Off the Land) attacks are increasing, indicating traditional malware is becoming less effective as detection improves. Supply chain attacks require specific software versions, and patches mitigate vulnerability once exploits become known.

Botnets depend on command-and-control infrastructure, and law enforcement takedowns disrupt operations. Major botnet takedowns have demonstrated that centralized infrastructure creates single points of failure.

Defense gaps remain significant. Polymorphic and metamorphic malware evades signature detection by continuously changing code structure. Zero-day exploits enable infection before patches are available, creating windows of vulnerability.

User education against phishing remains inconsistent. According to Fortinet and Malwarebytes, social engineering is highly effective despite awareness training. Fileless malware detection requires behavioral analytics, which not all organizations have deployed through endpoint detection and response tools.

Legitimate tools such as PowerShell make Living Off the Land and fileless attacks harder to distinguish from administrative activity. Legacy antivirus is ineffective against fileless variants, and many organizations lack modern endpoint protection.

How can organizations defend against malware?

Organizations should implement multiple defensive layers addressing prevention, detection, and response.

Email Security should deploy advanced phishing detection, attachment sandboxing, URL filtering, and DMARC, SPF, and DKIM authentication. According to Check Point and SentinelOne, email remains the primary malware delivery vector, making email security critical. Attachment sandboxing executes suspicious files in isolated environments to detect malicious behavior before delivery.

Endpoint Detection and Response deploys EDR tools to detect suspicious process execution, fileless attacks, and behavioral anomalies. According to SentinelOne and CrowdStrike, EDR is essential for detecting modern malware that evades signature-based detection. Behavioral detection identifies suspicious PowerShell execution, process injection, and credential dumping.

Antivirus and Anti-Malware solutions should maintain current signatures and use behavioral detection plus heuristics, not signature-only scanning. According to Malwarebytes and Fortinet, signature-based detection alone is insufficient against modern malware. Multi-engine detection that combines multiple detection techniques improves coverage.

Patch Management prioritizes critical CVEs and maintains operating systems, applications, and plugins current. According to CISA and Check Point, many malware infections exploit known vulnerabilities with patches available but not deployed. Automated patching reduces the window of vulnerability.

Web Filtering blocks known malware domains and uses DNS-based filtering to prevent command-and-control callbacks. Network-level filtering stops malware communication even if initial infection succeeds.

User Training addresses phishing awareness, macro safety, and suspicious file handling. According to Fortinet and Malwarebytes, educated users are a critical defensive layer. Training should be ongoing with simulated phishing exercises to maintain awareness.

Browser Security disables macros by default, updates browsers regularly, and enables exploit protection including Windows Defender Exploit Guard. Modern browsers include sandbox and isolation features that limit malware damage if infection occurs.

Network Segmentation isolates critical systems and limits lateral movement. According to Check Point, segmentation prevents malware from spreading across the entire network if initial infection succeeds.

Monitoring and Alerting tracks suspicious process execution, outbound command-and-control traffic, and privilege escalation attempts. Security Information and Event Management (SIEM) systems correlate alerts to identify malware behavior patterns.

Incident Response procedures isolate infected devices, preserve evidence, and scan for lateral spread. According to CISA, rapid response limits damage by containing malware before it spreads or completes its objectives.

Backup and Recovery maintains offline backups and tests restoration regularly. Backups are critical for ransomware recovery, providing an alternative to paying ransoms.

Application Whitelisting allows only approved applications to execute, blocking unauthorized malware. According to Check Point, whitelisting is highly effective in controlled environments where application requirements are well-defined.

Credential Security enforces multi-factor authentication on admin accounts, uses password managers, and monitors for credential theft. Many malware families steal credentials as a primary objective, making credential protection essential.

Supply Chain Security vets third-party software and monitors for supply chain compromises. Organizations should verify software signatures and integrity before installation.

FAQs

What is the difference between malware and a virus?

A virus is a type of malware that attaches to legitimate files or programs and spreads when those files are shared. According to Fortinet (2024), malware is a broad category including viruses, worms, trojans, ransomware, spyware, rootkits, and many other hostile software types. All viruses are malware, but not all malware is a virus. Worms self-replicate without attaching to files, trojans masquerade as legitimate software, and ransomware encrypts data for extortion—none of these are viruses, but all are malware.

What is fileless malware?

Fileless malware executes directly in computer memory (RAM) without writing files to disk, using legitimate operating system tools such as PowerShell or WMI. According to SentinelOne and CrowdStrike (2024), it evades file-based antivirus scanning because there is no file artifact to detect. CrowdStrike reports that 79% of 2024 intrusions were fileless or malware-free, up from 62% in 2023. Fileless malware is detected through behavioral analysis that monitors process execution patterns rather than file signatures.

How many new malware variants are discovered daily?

AV-TEST registers 450,000 or more new malware variants daily, while Malwarebytes reports 560,000. According to AV-TEST (2024), 60 million new strains were registered in 2024 alone. However, most variants are short-lived—only a small percentage pose permanent threats. Many new variants are polymorphic versions of existing malware that change code structure to evade signature detection but have the same core functionality.

What are the most common malware distribution methods?

Primary methods include phishing emails with malicious attachments, drive-by downloads from compromised websites, supply chain attacks via software updates, social engineering, unpatched vulnerabilities, and abuse of legitimate cloud services. According to Fortinet, SASA Software, and DNSFilter (2024), fileless delivery via macros and HTML smuggling is increasingly popular because it evades traditional file-based detection. Email remains the most common initial infection vector across all malware types.

How much does malware cost organizations?

The average cost of data breach in the United States is $9 million in 2024, according to Statista. Ransomware recovery averages $2.73 million according to DeepStrike. Small organizations pay an average $165,000 recovery cost according to Comparitech. According to DeepStrike (2024), 59% of organizations were hit by malware in 2024. The trend is rising—costs have more than doubled since 2021, driven by increasing ransomware payments, operational downtime, incident response costs, and regulatory penalties for data breaches.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

Leave Training & Simulated Phishing to us.

Alway Automate, Nothing To Manage

Always automated.

Nothing to manage.

Leave Training & Simulated Phishing to us.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.

© 2026 Kinds Security Inc. All rights reserved.