Learning Center May 20, 2025 Reading Time: 5 minutes

What Is Malware? Common Types and How to Stop Them

What Is Malware?

Malicious software, or malware, is any code intentionally designed to infiltrate, disrupt, or damage systems, networks, or users. It operates without consent and often without visibility.

While malware has existed for decades, it continues to serve as a primary access vector and launchpad for breaches from cybercriminals and foreign intelligence services alike. Protecting against malware in your organization’s own networks may not be enough to protect against malware infections, however. Hackers are increasingly targeting vendors, cloud platforms, and supply chains with malware to wage malicious cyber-operations, according to SecurityScorecard research.

SecurityScorecard’s 2025 Global Third-Party Breach Report shows:

  • 16 of the top 25 threat actors in the past year were ransomware actors, including C10p, LockBit, RansomHub, BlackSuit, Akira, and Medusa
  • Ransomware—a kind of malware that encrypts its targets or locks users out of systems—came from third-party breaches 41.4% of the time in the past year

Why Malware Still Dominates

Despite advances in endpoint detection, malware continues to work in 2025 because:

  • It evolves faster than traditional defenses
  • Hackers can adapt it and tailor it to different targets
  • It’s now delivered through vendors and trusted systems
  • It combines access, espionage, and extortion in one toolset
  • Hackers can use obfuscation in their attacks to evade detection

But malware often travels stealthily, such as through a software update a misconfigured file transfer tool.

7 Common Malware Types

SecurityScorecard tracks over 120 threat groups and surfaces infection information on over 150 malware families regularly through its sinkhole.

The STRIKE Team’s in-house malware information sharing platform (MISP) and threat sharing feeds provide a plethora of data to inform security programs and drive contextualized decision-making. SecurityScorecard’s malware attribution system includes over 1 million classified command-and-control IP addresses and over 350,000 classified malware samples.

Malware generally breaks down into a few distinct and linked categories:

1. Ransomware

Encrypts systems or data and demands payment for restoration. Modern ransomware variants and groups may also steal data, threaten leaks, or attack targeted organizations on multiple occasions.

Examples: C10p, LockBit, RansomHub
Defense: Segment networks, maintain offline backups, monitor for early signs of lateral movement.

2. Trojans

Disguised as legitimate software, trojans (a name that pays homage to trojan horses) create hidden access points for attackers.

Examples: Emotet, TrickBot
Defense: Verify software sources, monitor traffic to known command-and-control (C2) IPs, use Endpoint Detection and Response (EDR) tools.

3. Spyware

Silently records user activity, capturing keystrokes, credentials, or screen data. Can be installed without user awareness.

Examples: Zeus, Red Shell
Defense: Restrict permissions, monitor browser and app behavior, provide anti-phishing training.

4. Adware

Injects unwanted ads or redirects browser activity. Attackers can also use it to install more serious threats.

Examples: Fireball, DollarRevenue
Defense: Block unauthorized browser extensions, enforce browsing security policies, and avoid visiting unsafe sites. Monitor for decreased system performance or new and unauthorized apps.

5. Worms

Self-replicating malware that spreads across systems without user input.

Examples: WannaCry, Conficker
Defense: Patch vulnerabilities, close unnecessary ports, limit cross-system access.

6. Rootkits

Embed deeply in system processes or firmware, granting persistent attacker access and control over victim devices.

Examples: Necurs, ZeroAccess
Defense: Monitor for low-level system changes, use integrity validation tools, restrict admin privileges.

7. Fileless Malware

Operates entirely in memory, often using legitimate system tools such as PowerShell.

Examples: Frodo, Number of the Beast
Defense: Disable unnecessary scripting, log command-line activity, deploy behavior-based detection.

How Malware Reaches You: The Supply Chain Factor

Sophisticated threat actors use malware that rarely breaches noisily. Instead, it often arrives through:

Third-party ecosystems now act as launchpads for malware delivery across industries.

How to Detect and Prevent Malware in 2025

1. Use Threat Intelligence for Context

Correlate malware samples and campaigns using real-world data. This can enable visibility into:

  • Which malware families are active
  • Which vendors or partners are compromised
  • Whether suspicious activity matches known threat actor tactics

SecurityScorecard maintains a network of honeypots and sinkholes that detect internet-based malware and allow SecurityScorecard to report malware issues, track malware signals from command-and-control infrastructure, and track threat actor behavior. SecurityScorecard also collects data on botnet activity. 

2. Monitor Command-and-Control Activity

C2 infrastructure is often reused. Watch for traffic to:

SecurityScorecard collects over 2 billion DNS requests per day to identify early signals of compromise.

3. Segment and Contain Early

Once malware lands, speed matters. Contain affected systems through:

  • Network segmentation
  • Access restrictions
  • Rapid threat isolation protocols

Containment efforts can prevent data theft, encryption, or lateral movement.

4. Audit Third-Party Access and Credentials

Attackers can deliver malware by using stolen or reused credentials or targeting third parties with weak security practices. Ask:

SecurityScorecard’s Supply Chain Detection and Response (SCDR) solution tracks vendor credential exposure, malware presence, and third- and fourth-party access risks.

What to Do After Malware Is Detected

  • Isolate the system immediately
  • Preserve logs, memory dumps, and forensic artifacts
  • Notify legal, security, and affected partners
  • Investigate scope, including third-party involvement
  • Remove malware and patch exploited vulnerabilities
  • Document and update playbooks for future response

If a vendor was the source, activate your third-party breach protocol.

Protect Your Supply Chain with Real-Time Threat Detection
SecurityScorecard’s SCDR solution offers continuous monitoring of your third-party ecosystem, enabling swift identification and mitigation of cyber threats. Enhance your organization’s resilience by proactively managing supply chain risks.
đź”— Understand SCDR

default-img
default-img

Begin your odyssey to understand and reduce cyber risk

Get Your Free Score Today