What is Malware?

You've probably heard the tech jargon for malware before, but how exactly does a Trojan horse fit inside your computer? And what kind of cookie could possibly be bad? Discover what these names really mean and how they affect our Macs.

Adware/PUP

Adware usually arrives in the form of browser extensions or toolbars bundled with other applications. Once installed, it can collect information on the websites you visit, display popup advertisements, and redirect web pages. While not overtly malicious, adware can still pose a privacy threat. These programs are sometimes also classified as Potentially Unwanted Programs (PUPs).

Botnet

Botnets are networks of compromised computers controlled and coordinated by a bad actor. Botnet malware turns an individual computer into a node in a larger network of “bots,” a kind of “hive mind” of distributed computing power that can then be used for malicious purposes such launching attacks on other systems or spreading malware.

Hybrid Threat

A hybrid threat combines multiple attack methods—like cyberattacks, disinformation, and espionage—to disrupt systems or influence behavior. Often state-backed, these threats blur the line between warfare and cybercrime, making them hard to detect and counter.

Infostealer

An infostealer is malware designed to steal user information. Infostealer malware on a Mac will be looking for login details and credentials to banking sites, social media accounts, email addresses, and more. Some infostealer malware specializes in finding the private cryptographic keys that secure Bitcoin and other cryptocurrency wallets—a potentially devastating financial threat. Once an infostealer finds what it’s looking for, it sends the victim’s private information to a bad actor, who can then use it to steal real-world assets or perpetuate identity theft.

Keystroke Logger

A keystroke logger, also known as a keylogger, is a piece of malware that records each and every key you press on your keyboard. This means personal emails, passwords, social security numbers and credit card information can all be recorded and sent to remote attackers. This data is often sold by malicious parties and used to violate your privacy, steal your identity, or open credit accounts under your name.

Ransomware

Ransomware, as its name implies, is a type of malware that tries to extort money from computer users by holding their systems ransom—usually by locking systems or encrypting user data until the victim pays up! Ransomware is an attractive choice for cybercriminals because it presents them with a very clear means of making money off their victims. Ransomware preys on the idea that computer systems and everything they hold (documents, photos, financial records, mp3 files, etc.) are of such vital importance to most people that holding them ransom is an effective way of extorting cash.

Scareware

Scareware is malicious software designed to frighten users into taking harmful actions—like downloading fake security tools or paying for bogus virus removal. It often uses alarming pop-ups or warnings to create a false sense of urgency.

Stalkerware

Stalkerware is perhaps the most personal of malware threats—because it’s used to spy on victims by people who know them, usually without their knowledge or consent. It’s often used by jealous, controlling, or abusive partners in the context of intimate relationships. While stalkerware programs are sometimes marketed as “parental monitoring tools” for concerned moms and dads, the companies that sell stalkerware make it clear through their advertising that this privacy-invading software is designed for use on other adults.

Tracking Cookies

Each time you view a website, information about your visit is stored in the form of tracking cookies. This is often useful when you return to an online store and it remembers the contents of your shopping cart, but this web browser feature can be used by malicious and spammy advertisers to track, record, and mine data about your surfing experience.

Trojan Horse

Much like its mythological counterpart, a trojan horse arrives in the guise of a fun or useful program that you may actually want. Oftentimes, trojan horses can be found on torrent sites, disguised as copies of pirated programs. Once installed, they perform malicious activities such as allowing an attacker to access your computer remotely, pilfering data, or installing other malware components. Modern trojans often work in pairs, as a kind of one-two punch. An initial, first-stage trojan sneaks onto your system—and then downloads and executes a far more serious second-stage malware payload on your Mac.

Virus

Some of the first malware ever created came in the form of computer viruses, which would "infect" otherwise innocent files, changing their behaviour to self-replicate or damage a computer system. These days, true computer viruses are relatively rare, but the name has become a generic term used to describe (inaccurately, some would argue!) different types of malware, including trojan horses, keyloggers, worms, etc.

Wiper

The malware equivalent of burning down the competition’s business, wipers are fundamentally destructive programs designed to erase data or deny a victim access to their files and systems. The end goal of wiper malware is usually nothing more than destruction, which is why wiper malware is frequently associated with nation-state actors and cyber vigilantes seeking to cause disruption and chaos.