Malicious code is code that exploits vulnerabilities to spread malicious payloads to computer systems.

Most viruses and trojans depend on humans to spread them

Computer worms spread by themselves.

Zero-Day Attack

This exploits a Zero-day vulnerability, which is a vulnerability that has existed since the release of the software or product, that have not been addressed by cybersecurity.

Window of vulnerability

Is the time between the release of the software and the first fix, that solves the bug.

image.png

Sources of malicious code

Script kiddies

Anyone with minimal level of technical expertise can download a virus (ready-to-use software) and unleash it in the internet.

These criminals are often located in countries with weak law enforcement.

Drive-by Download

Is when you unintentionally download something, without explicitly clicking on a download link.

It could happen when visiting a website or clicking a pop-up window. It takes advantage of security flaws of your operating system or app.

Examples

The Zeus Trojan (ZeuS, Zbot, Trojan ZeuS)

→ It was often used to steal banking information using man-in-the-browser keystroke logging and form grabbing.

Advance Persistent Threat (APT)

Are often created by military units, intelligence agencies or shadowy groups that are most likely associated with government agencies.