Malware

MITRE ATTACK layer: Execution

Malware is malicious software designed to disrupt operations, gain unauthorized access, steal data, or establish persistent control over a system.

How is Malware abused

Attackers distribute malware through phishing attachments, malicious downloads, compromised websites, or exploited vulnerabilities, often using obfuscation to evade detection.

Why Malware matters

Malware enables attackers to spy, steal, disrupt, or move laterally within environments, frequently acting as the foundation for larger attacks such as data exfiltration or ransomware campaigns.

Real-world example

BlackLotus Malware in Cloud Environments

In 2025, cybersecurity researchers observed BlackLotus UEFI malware being used in targeted campaigns against enterprise and cloud environments. The malware infected systems at the firmware level, enabling stealthy persistence and evasion of traditional security controls. Attackers distributed it through compromised installers and malicious payloads, allowing them to maintain long-term access and execute further malicious activities without detection.

Source

Get the full attack repository

Get our entire attack repository in a single, offline-ready PDF guide, featuring 25+ real-world attacks.

Please enter a valid email.Please enter a email.
By clicking 'Download EBOOK', you agree to processing of personal data according to the Privacy Policy.

Additional Resources

Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report

See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central.

Read more
Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report

Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months.

Read more
Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies

Get a clear, practical guide to understanding threats and strengthening your organization’s security.

Read more

Trusted by