Reference Guide
Security Management Server v10.2.10 AdminHelp
43
Rootkit
Malware that enables access to a computer while
protecting itself or other files to avoid detection and/or
removal by administrators or security technologies.
TDL, Zero
Access Rootkit
Trojan
Malware that disguises itself as a legitimate program or
file.
Zeus
Virus
Malware that propagates by inserting or appending itself to
other files.
Sality, Virut
Worm
Malware that propagates by copying itself to another
device.
Code Red,
Stuxnet
Dual Use
Dual Use indicates the file can be used for malicious and non-malicious purposes. Caution should be
used when allowing the use of these files in your organization. For example, while PsExec can be a
useful tool for executing processes on another system, that same benefit can be used to execute
malicious files on another system.
Subclass Definition Examples
Crack
Technologies that can alter (or crack) another
application to bypass licensing limitations or Digital
Rights Management protection (DRM).
Generic
Any Dual Use tool that does not fit into an existing
category.
KeyGen
Technologies which can generate or recover/reveal
product keys that can be used to bypass Digital Rights
Management (DRM) or licensing protection of software
and other digital media.
MonitoringTool
Technologies that track a user's online activities without
awareness of the user by logging and possibly
transmitting logs of one or more of the following:
• user keystrokes
• email messages
• chat and instant messaging
• web browsing activity
• screenshot captures
• application usage
Veriato 360,
Refog
Keylogger
Pass Crack
Technologies that can reveal a password or other
sensitive user credentials either by cryptographically
reversing passwords or by revealing stored passwords.
l0phtcrack, Cain
& Abel