Please enable JavaScript.
Coggle requires JavaScript to display documents.
Malware & Social Engineering Attacks - Coggle Diagram
Malware & Social Engineering Attacks
Malware Fundamentals ✓
What is Malware? ✓
Definition ✓
Key Traits (Stealth, Unauthorized, Persistence) ✓
Impacts (Data theft, Disruption, Financial loss) ✓
How Malware Spreads ✓
Email attachments / Phishing links
Infected USB drives
Malicious downloads / Fake updates
Network propagation (worms)
Malvertising
How Malware Works ✓
Entry / Infection
Concealment (rootkits, obfuscation, mutating malware)
Oligomorphic
Polymorphic
Metamorphic
Payload execution
Harmless (pranks, jokes)
Destructive (delete/corrupt files)
Theft (passwords, banking info)
Control (botnets)
Ransomware (encrypt files, demand payment)
Payload Capabilities
Collect data
Hardware keylogger
Delete data
Modify system security settings
Launch attacks
Types of Malware ✓
Viruses ✓
Example: Melissa
Worms ✓
Example: Code Red
Trojans ✓
Example: Zeus Trojan
Ransomware ✓
Encrypts files, demands payment
Examples: CryptoLocker, WannaCry
Spyware / Adware ✓
Keyloggers, info stealers, pop-up ads
Rootkits / Logic Bombs ✓
Hide presence / Trigger on condition
Social Engineering Attacks ✓
Phishing ✓
Spear phishing
Whaling
Vishing
Spam ✓
Malware via bulk emails
Typo-Squatting ✓
Fake domains (e.g., goggle.com)
Tailgating / Dumpster Diving ✓
Physical intrusion, trash info
Shoulder Surfing ✓
Observing passwords/PINs
Real-World Case Studies ✓
Carbanak APT ✓
Bank theft via spear phishing & malware
Code Red Worm ✓
Self-replicating, DoS, website defacement
Stuxnet ✓
Targeted SCADA/ICS, cyber-weapon