
π§ Introduction
When analyzing antivirus logs or researching malware, youβll encounter countless technical terms, acronyms, and security-related abbreviations. This guide on Security & Anti-Malware Terminology aims to make sense of those terms. While not exhaustive, it includes many of the most common malware categories and system-level definitions used in security analysis.
This reference also complements related SM-U guides, including How to Research for Virus and Malware Analysis, Learning HijackThis!, and Rootkits 101.
π¦ Malware Classifications & Abbreviations
Antivirus tools often categorize threats using shorthand labels. Recognizing these will help you interpret logs and reports effectively:
- Troj (Trojan) β Malware disguised as legitimate software to trick users.
- Vir (Virus) β Self-replicating code that spreads by infecting files.
- Malware β Any software designed to cause harm to a system.
- Rootkit β Conceals its presence and gains deep system-level access.
- Worm β Self-spreading malware that propagates through networks.
- Adw (Adware) β Displays unwanted advertisements.
- Spyware β Monitors user activity and collects data.
- Keylogger β Records keystrokes to steal credentials.
- Bootkit β A rootkit variant targeting the boot sector.
- Backdoor β Opens unauthorized remote access to the system.
- Ransomware β Encrypts files and demands a ransom for decryption.
Additional Malware Types
- Banker Trojan β Designed to steal online banking credentials.
- Browser Helper Object (BHO) Infection β Malicious browser add-ons.
- Master Boot Record (MBR) Infection β Infects the MBR to load early.
- Bot Trojan β Turns a device into a remotely controlled botnet node.
- Cookie Tracker β Tracks browsing for advertising or data collection.
- Dialer Trojan β Connects to premium-rate phone lines.
- Dropper Trojan β Installs other malicious components.
- EICAR Test File β Harmless file to test antivirus response.
- Exploit Malware β Leverages system vulnerabilities.
- Hoax Malware β Fake threats that scare users into installing malware.
- Hijacker β Alters browser/system settings (e.g., homepage redirects).
- Hack Tool β Software used for unauthorized access or exploitation.
- Heuristic Detection (Heur) β Identifies threats based on behavior.
- IRC Trojan β Targets Internet Relay Chat activity.
- Macro Virus β Targets macros in apps like Microsoft Office.
- Password Stealing Trojan β Collects saved login credentials.
- Phishing Malware β Mimics trusted services to harvest data.
- Polymorphic Virus β Constantly changes code to evade detection.
- Process Killer β Disables security software.
- Redirect Trojan β Forces browsers to load malicious sites.
- Remote Access Trojan (RAT) β Gives full remote control of the system.
- Spamming Malware β Sends spam from infected devices.
- Scamming Malware β Defrauds users using deception.
- Rogue Malware (ROGUE) β Fake antivirus software.
For more tools and research resources, visit Malware & Virus Analysis Resources.
π Security Concepts & System Terms
Understanding the terms below will improve your ability to analyze system behavior, troubleshoot threats, and understand security logs.
- ActiveX β Internet Explorer component used to extend browser functions.
- Administrator β A user account with full system control.
- Algorithm β A defined method used for calculations, encryption, or automation.
- Alias β An alternate name for malware (e.g., TDL4 = Alureon).
- Anti-Malware / Anti-Spyware / Antivirus β Tools used to detect and remove malicious software.
- Application Programming Interface (API) β Connects apps to system functions.
- Armoring (Crypting) β Obfuscates malware to avoid detection.
- ASCII β A standard for encoding characters.
- Attributes β File or folder properties (e.g., hidden, read-only).
- BAT (Batch File) β Scripting file used to run command sequences.
- BIOS β Firmware that initializes hardware on startup.
- Botnet β A group of infected computers controlled remotely.
- Cache β Temporary storage to speed up system or web performance.
- Cookie β Text files used by websites to store user preferences.
- Debugger / Decompiler β Tools used to analyze or reverse-engineer code.
- Denial of Service (DoS) / DDoS β Overwhelms services to disrupt functionality.
- DNS β Resolves domain names into IP addresses.
- Driver β Software enabling communication between OS and hardware.
- DLL β Shared library files containing executable code.
- Emergency Rescue Disk / Recovery USB β Tools for offline system recovery.
- Encryption / Decryption β Secures or reveals encoded data.
- Exceptions β Whitelisted items excluded from security scans.
- FAT (File Allocation Table) β Disk structure storing file locations.
- Firewall β Filters and protects network traffic.
- FTP (File Transfer Protocol) β Transfers files across networks.
- Hacker β Someone who accesses systems without authorization.
- Header β Initial file data describing its format.
- Host β The source system hosting services or files.
- HTTP / HTTPS β Protocols for loading websites (HTTPS is encrypted).
- Identity Theft β Fraudulent use of someoneβs personal data.
- ISP (Internet Service Provider) β Company providing internet access.
- LAN (Local Area Network) β A private network in a small location.
- MIME β Internet standard for sending varied content types.
- Mutex β Prevents multiple apps from accessing the same resource simultaneously.
- Partition β Disk segment treated as a separate drive.
- Payload β The part of malware that executes malicious activity.
- PE (Portable Executable) β Windows file format for executables.
- PUP β Potentially Unwanted Program; not always malware.
- P2P β Peer-to-peer file-sharing software.
- Protocol β Communication rules between systems (e.g., TCP/IP).
- Proxy β Intermediary between device and internet, often for anonymity.
- Quarantine β Isolates suspicious files to prevent spread.
- Redirect β Changes a browserβs navigation path.
- Sector β A physical segment of storage media.
- Patch β Fixes software bugs or vulnerabilities.
- String β A sequence of characters, often found in code.
- Services β Programs or drivers running in the background.
- Signature β Malwareβs unique fingerprint used for detection.
- Variant β A modified strain of known malware.
- Volume β A logical storage unit such as a disk or partition.
- UPX β A tool for compressing executables.
- WAN β A large, distributed network (e.g., the internet).
- Windows Explorer β Interface for navigating files and folders.
- Windows Registry β Stores configuration settings for Windows and software.
π§ Conclusion
This Security & Anti-Malware Terminology guide can help you better understand what you’re seeing in system logs, malware reports, and threat alerts. With these definitions, youβll be equipped to handle advanced malware detection, system hardening, and log analysis.
As malware evolves, so must your understanding. Whether itβs learning about File Padding Techniques, investigating a Chrome CVE, reviewing a Tomcat vulnerability, or ensuring Windows 10 privacy, this foundation prepares you to take action.
Donβt forget to bookmark Free Virus and Malware Removal for practical tools and scanning advice, and keep building your skills across our malware and forensic categories.
Stay curious, stay secureβand revisit this Security & Anti-Malware Terminology guide anytime you need a refresher. You can find another database of words at Malwarebytes.