User Guide
MALWARE CATEGORY DESCRIPTIONS
CHAPTER 15: ANTI-MALWARE SERVICES 321
Phishing URL A phishing URL is displayed in the browser address bar. In some cases, it
involves the use of domain names and resembles those of legitimate
domains. Phishing is a form of online identity theft that employs both
social engineering and technical subterfuge to steal personal identity data
and financial account credentials.
System Monitor A system monitor encompasses any software that performs one of the
following actions:
• Overtly or covertly records system processes and/or user action.
• Makes those records available for retrieval and review at a later time.
Trojan Downloader A trojan downloader is a Trojan that, after installation, contacts a remote
host/site and installs packages or affiliates from the remote host. These
installations usually occur without the user’s knowledge. Additionally, a
Trojan Downloader’s payload may differ from installation to installation
since it obtains downloading instructions from the remote host/site.
Trojan Horse A trojan horse is a destructive program that masquerades as a benign
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher A trojan phisher may sit on an infected computer waiting for a specific
web page to be visited or may scan the infected machine looking for user
names and passwords for bank sites, auction sites, or online payment
sites.
Virus A virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes.
Worm A worm is program or algorithm that replicates itself over a computer
network and usually performs malicious actions.
Table 15-1 Malware Category Descriptions (Continued)
Malware Type Description