Cisco Cisco Web Security Appliance S360 User Guide

Page of 582
M A L W A R E   C A T E G O R Y   D E S C R I P T I O N S
C H A P T E R   1 5 :   A N T I - M A L W A R E   S E R V I C E S
 321
Phishing URL
A phishing URL is displayed in the browser address bar. In some cases, it 
involves the use of domain names and resembles those of legitimate 
domains. Phishing is a form of online identity theft that employs both 
social engineering and technical subterfuge to steal personal identity data 
and financial account credentials.
System Monitor
A system monitor encompasses any software that performs one of the 
following actions:
• Overtly or covertly records system processes and/or user action.
• Makes those records available for retrieval and review at a later time.
Trojan Downloader
A trojan downloader is a Trojan that, after installation, contacts a remote 
host/site and installs packages or affiliates from the remote host. These 
installations usually occur without the user’s knowledge. Additionally, a 
Trojan Downloader’s payload may differ from installation to installation 
since it obtains downloading instructions from the remote host/site.
Trojan Horse
A trojan horse is a destructive program that masquerades as a benign 
application. Unlike viruses, Trojan horses do not replicate themselves.
Trojan Phisher
A trojan phisher may sit on an infected computer waiting for a specific 
web page to be visited or may scan the infected machine looking for user 
names and passwords for bank sites, auction sites, or online payment 
sites.
Virus
A virus is a program or piece of code that is loaded onto your computer 
without your knowledge and runs against your wishes.
Worm
A worm is program or algorithm that replicates itself over a computer 
network and usually performs malicious actions. 
Table 15-1 Malware Category Descriptions (Continued)
Malware Type
Description