Computer virus types. How many types of computer viruses exist?

Computer viruses cannot be described in several words. There are tens of types and subtypes of them, and each one has a lot of unique characteristics. Describing them all can take hours or even days – but I tried to make a short comprehension on each type. This information will be useful for everyone who has a computer and uses it every day.

But first, let me answer a single question. What is a computer virus? A computer virus is an umbrella term for malicious software. However, such a definition is not 100% correct. Malicious software, or malware, is a class of programs designed to make money on their victims, or just to mischief the users who got one. And originally, viruses are just a type of malware – and not a common term. You can read more general information in a separate article – but there we will review only computer virus types.

How many types of computer viruses are there?

It is hard to give a correct answer. Each day, a lot of different types of computer viruses appear, and a certain amount turns inactive. Even if we look at the most active ones, we will struggle to count them all without missing something. So, let’s tamper the circle and look only at general types – there are still more than 10 of them.

Computer virus types

Backdoor viruses : silent and sly

It is a kind of computer virus that allows the fraudster access to your computer without your permission. This software is usually used to create botnets – a network of zombie computers that do what crooks want. Inflating the polls on the websites, DDoS attacks, email spamming – all these things are not pleasant. Sometimes, backdoors are used as a combination of downloader and spyware.

Short reference about botnets

The term “botnet” is used to refer to a large collection of internet-connected devices – mainly PCs. You can call them minions because these computers are so easily used. They perform the tasks of other computers. Internet-connected TVs and routers are just about as easy. But an easy thing to forget is that bots are usually infected with some malicious software to ensure the continuous distribution of new malware. You can use a botnet to send spam emails, perform DDoS attacks, and fake login sessions. It is possible to gain access to other devices or control their activity. However, all this is very expensive and dangerous – and it often requires a lot of human-powered labor.

Downloader malware: mitosis in the computer virus world.

Downloaders do exactly what is supposed by their name. The software is often used to download other viruses – or to manipulate your internet usage. If you see a message or banner in your browser – it might be downloader malware trying to get a connection from your computer and perform a malicious operation. Downloader viruses make your system weaker by stopping your security tools, modifying the registry and networking settings.

Having the downloader malware on your computer means having a chance to get any malware on your computer – including ransomware or vandal viruses.

Spyware. Your data is not only yours

Spyware is a computer virus that spies on you and your system. It generally collects personal data like contacts, cameras, and microphones, and it also tracks your online activities. The purpose of spyware is to infect your computer and make money through selling your data – even the most sensitive. Crooks have no morality, so they will not even think about possible consequences for you.

Spyware mechanism
Illustration of how does spyware work

Spyware usually gives the full information about the infected computer to the fraudster who controls it. It collects even your PC configurations – that information can be valuable, too. At all, spyware looks like malware for massive attacks – but it is also used precisely against certain persons. Pegasus Spyware is a perfect example of one.

Stealer: spyware’s bro

Stealers are sometimes classified as a sub-type of spyware. From a certain point of view, they really do not have a lot of differences from spyware, but deep dive into their actions points at significant distinguishes. While spyware collects all possible information about your system and you personally, stealer aims at passwords, conversation logs, or even files. Stealers are often guests in cyberattacks on corporations – they ease network hacking and allow the cybercriminals to get the most valuable files.

Keylogger malware – keep your fingers on the keyboard

Keylogger is a type of spyware that listens in on your keystrokes and provides some interesting information about your internet activity to the cybercriminal. It is very simple – it does not infect your computer with viruses but just sits quietly in your computer until you actually need it to monitor a specific activity. For example, it records all the letters typed on your keyboard and sends them to a cybercriminal server, in order to install the malware in your computer.

Adware – look at this banner!

Adware programs are a kind of program that contain advertisements, tracking cookies, or links to online ads. This program is usually downloaded through a link in emails or by clicking on a pop-up window. Usually, adware programs do not have a very significant effect on your computer performance or your privacy. However, there are times when their effect on your computer is more severe – for example, when your browser crashes, a popup window with an advertisement appears on your screen, or they slow down your browser and decrease your battery life.

Malvertising on the Web
Adware-generated banners that flood your browser

Browser hijackers

These viruses are brother-in-arms with adware. Browser hijackers are malicious programs that completely alter your browser settings in order to spy on you and show you advertisements. In order to do so, hijackers usually change your browser settings or infect it with viruses. One more typical symptom of browser hijacker activity is search query redirections – instead of Google, you will see the search results in Bing, Yahoo or even

Ransomware – the most dangerous computer virus

Ransomware is a computer virus that encrypts your personal files and asks you to pay a ransom for their decryption. These viruses do not only make your files inaccessible but can also make your files permanently inaccessible. Due to the extreme toughness of the encryption key of some of the ransomware examples, there is no way to decrypt the files. In this case, you have no choice but to stay with your files ciphered. Paying the ransom is always a bad idea.

Files after the ransomware encryption

Nowadays, ransomware is the biggest worry of companies. It is used for large-scale corporate attacks, but some ransomware families aim at individuals. More than 50,000 ransomware attacks occurred daily in 2017.

Exploit virus. Turn your system into ahead of cheese

Exploit malware is a small malicious thing that appears in your computer with a single final target – inject other malware. It usually contains some functionality of downloader virus but does completely different things to your system. It searches for security breaches in the software you have on your disk. When it finds one, it reports it to the crooks. Then, burglars prepare the malware which will exploit these breaches in order to infect the computer network. Yes, it is generally used in attacks on corporations.

What is an exploit?

An exploit is a small part of a software program that becomes exploitable or “jailbroken.” An exploit allows you to modify the behavior of the program. When you use the program, it offers you certain access keys for setting up configurations or displaying different features. Exploit programs offer you a way to hack the program and gain full access to its contents. However, exploit programs cannot steal data – they only set up their access keys.

Coin mining malware

Coin Miner virus mine cryptocurrencies using your hardware – in particular, Monero and DarkCoin. Coin miner viruses compromise the graphics card of your computer in order to improve the speed of mining algorithms. There are no known coins that are mined by coin miners. The problem with using coin miners is that most of them are very slow – sometimes they use up to 80% percent of your computer’s resources – and also put it at risk of overheating.

Coin miner
Coin miner virus consumes almost all CPU power

How to prevent computer virus injection?

To avoid being infected with such viruses – it’s important to have the newest security system on your computer and to be careful with your privacy settings in social networks. You should always be vigilant and check for new malware attacks on your computer. Also, if you are using a public WiFi network – use a trusted and secure one. For example, if you go to Starbucks, use a public library – instead of waiting for a free connection – or use a virtual private network.

Safeguarding yourself against viruses is not an easy job. But it’s worth it. Taking the right measures, and knowing how to avoid being a victim of a virus is the best way to protect yourself from all these destructive viruses. And the security system, exactly – a proper anti-malware program – must be ahead of everything you do for making your system secure.

About Polina Lisovskaya

I works as a marketing manager for years now and loves searching for interesting topics for you

Check Also

What is a chrome virus?

What is a Chrome virus?

Chrome virus is a collective name for various kinds of potentially unwanted programs that mainly …

What is anti-virus scanner?

What is an anti-virus scanner?

Antivirus scanner or virus scanner comes in a package with an anti-virus software. It’s function …

Leave a Reply