{"id":82030,"date":"2023-07-05T09:52:47","date_gmt":"2023-07-05T09:52:47","guid":{"rendered":"https:\/\/www.techopedia.com\/?post_type=definition&p=82030"},"modified":"2023-12-20T11:55:11","modified_gmt":"2023-12-20T11:55:11","slug":"threatware","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/threatware","title":{"rendered":"Threatware"},"content":{"rendered":"

What Is Threatware?<\/span><\/h2>\n

Threatware is a type of <\/span>malicious software<\/span><\/a> or malware that\u2019s designed to damage a computer system\u2019s files. <\/span><\/p>\n

This includes any type of program that is designed to steal or destroy a victim\u2019s personal data, including <\/span>ransomware<\/span><\/a>, <\/span>spyware<\/span><\/a>, <\/span>worms<\/span><\/a>, <\/span>viruses<\/span><\/a>, and <\/span>keyloggers<\/span><\/a>.\u00a0\u00a0<\/span><\/p>\n

How Does Threatware Work?<\/span><\/h2>\n

Hackers attempt to circulate threatware by tricking users into downloading an infected file. One of the most common ways hackers do this is with <\/span>phishing<\/span><\/a> and <\/span>social engineering<\/span><\/a> scams.\u00a0<\/span><\/p>\n

When using a phishing email to circulate malware, a hacker will send a user an email impersonating a friend, coworker, or trusted brand to mislead them into clicking on a malicious attachment or URL. Downloading the file or visiting the compromised website will infect the device with a malicious program.\u00a0<\/span><\/p>\n

What is phishing?<\/div>
Phishing is a type of cyberattack that involves tricking individuals into providing sensitive information, such as usernames, passwords, credit card details, or personal information, by posing as a trustworthy entity. The attackers typically create fraudulent websites, emails, or messages that mimic legitimate organizations or individuals, such as banks, social media platforms, or online services.<\/div><\/div>\n

Once the malicious program has made its way onto your computer, it can start to exfiltrate and export personal data from your device to send to the attacker.<\/span><\/p>\n

It\u2019s important to note that phishing is just one of many methods hackers can use to spread malicious software. Other methods include:<\/span><\/p>\n