What malicious program replicates itself and can transfer by any type of means?

Malware covers malicious programs which are specifically designed to delete, block, modify, or copy data or to disrupt the performance of computers and/or computer networks. This class includes viruses, worms, Trojans, and other programs used to automatically conduct malicious activity (hacking tools, constructors which can be used to create polymorphic code etc.).

Viruses and Worms

Viruses and worms are malicious programs that self-replicate on computers or via computer networks without the user being aware; each subsequent copy of such malicious programs is also able to self-replicate.

Malicious programs which spread via networks or infect remote machines when commanded to do so by the “owner” (e.g. Backdoors) or programs that create multiple copies that are unable to self-replicate are not part of the Viruses and Worms subclass.

The main characteristic used to determine whether or not a program is classified as a separate behaviour within the Viruses and Worms subclass is how the program propagates (i.e. how the malicious program spreads copies of itself via local or network resources.)

Any program within this subclass can have additional Trojan functions.

It should also be noted that many worms use more than one method in order to spread copies via networks. The rules for classifying detected objects with multiple functions should be used to classify these types of worms.

More about Viruses and Worms >>>

Trojans

Trojans are malicious programs that perform actions which are not authorized by the user: they delete, block, modify or copy data, and they disrupt the performance of computers or computer networks. Unlike viruses and worms, the threats that fall into this category are unable to make copies of themselves or self-replicate.

Trojans are classified according to the type of action they perform on an infected computer.

More about Trojans >>>

Suspicious packers

Malicious programs are frequently compressed – or packed – using a variety of methods combined with file encryption in order to prevent reverse engineering of the program and to hinder analysis of program behaviour with proactive and heuristic methods. Antivirus programs detect the results of the actions of suspicious packers, i.e. packed items.

There are ways to prevent packed files from being unpacked: for example, the packer may not decipher the code fully, only to the extent that it is executed; or it may fully decrypt and launch a malicious program only on a certain day of the week.

More about Suspicious paсkers >>>

Malicious tools

Malicious tools are malicious programs designed to automatically create viruses, worms, or Trojans, conduct DoS attacks on remote servers, hack other computers, etc. Unlike viruses, worms, and Trojans, malware in this subclass does not present a direct threat to the computer it runs on, and the program’s malicious payload is only delivered on the direct order of the user.

More about Malicious tools >>>

What is a virus?

A virus is a computer program that replicates itself by modifying system or application software and then traveling from computer to computer, via disks or a network. Most viruses are harmless, but some viruses can erase files on your hard drive, slow down your computer, or do other kinds of damage. You can protect your computer against most types of viruses by installing virus protection software. See our security page for more information.

What is a Trojan?

Trojan Horses are impostors — files that claim to be something desirable — but, in fact, are malicious. A very important distinction between Trojan horse programs and true viruses is that they do not replicate themselves. Trojans contain malicious code that when triggered cause loss, or even theft, of data. For a Trojan horse to spread, you must invite these programs onto your computers — for example, by opening an email attachment or downloading and running a file from the Internet. See our security page for more information.

What is a worm?

Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. See our security page for more information.

What is SpyWare?

Ad-ware programs gather information from your computer for marketing purposes. The information is used to decide, for instance, which advertisements to display when you are on a specific Web site or which advertisements to display in pop-up windows on your desktop.

Spyware programs also gather information from your computer, but are less likely to have obtained your authorization to gather that information. Spyware may be more difficult to identify and remove, and may use that information for other purposes in addition to marketing. In the remainder of this document, the term malware (short for malicious software) is used to refer to both ad-ware, spyware, joke programs, and dialers. See our security page for more information.

Which malware can replicate itself and can transfer by any type of means?

Worms. A worm replicates itself by infecting other computers that are on the same network. They're designed to consume bandwidth and interrupt networks.

What type of malicious program is designed to replicate itself and transfer from?

What is a worm? Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file.

What is worm and Trojan?

WORMS. TROJAN HORSE. A Worm is a form of malware that replicates itself and can spread to different computers via Network. Trojan Horse is a form of malware that capture some important information about a computer system or a computer network. The main objective of worms to eat the system resources.

What is a malicious program called?

What is Malware? Malware is a catch-all term for various malicious software, including viruses, adware, spyware, browser hijacking software, and fake security software. Once installed on your computer, these programs can seriously affect your privacy and your computer's security.