TypeDescriptionExamples
WormsSpreads independently without the need of a host file or user interactionWannacry
TrojansMalicious software designed as legitimate programs to trick users into running itZbot
RansomwareEncrypts files or locks users out of the system and demands a ransom to access the files/systemLockbit
RootkitsA type of malware that provides admin access to a system while hiding its presence2005 Sony BMG Rootkit
BootkitsA type of rootkit that infects the MBR (master boot record); this allows the malware to be loaded before the OS startsMebromi
BotnetsA collection of compromised computers/devices (zombies) remotely controlled by an attacker; typically used for DDoS attacksMirai
KeyloggersRecords all the keystrokes that a user makesSpyEye
StealersFocuses on stealing certain information off a user’s system, such as passwords, credit cards, or personal informationEmotet
PolymorphicChanges its code or appearance after spreading, preventing detection from signature-based detectorsStorm Worm
MetamorphicLike polymorphic but changes the entire code base each iterationSimile
RATRemote Access Trojan, or Remote Access Tool; used to provide the attacker with complete control of the system. Typically comes with a keylogger.DarkComet
Logic BombMalicious code that lies dormant until triggered when a specific condition happensFarewell Dossier
Data WipersArguably the most destructive on this list; designed to completely destroy or corrupt the systemShamoon
DropperTypically a small initial stage of a larger attack; designed to covertly install other malware onto the systemDridex