# Malware **MITRE ATTACK layer: Execution** Malware is malicious software designed to disrupt operations, gain unauthorized access, steal data, or establish persistent control over a system. ## How is Malware abused Attackers distribute malware through phishing attachments, malicious downloads, compromised websites, or exploited vulnerabilities, often using obfuscation to evade detection. ## Why Malware matters Malware enables attackers to spy, steal, disrupt, or move laterally within environments, frequently acting as the foundation for larger attacks such as data exfiltration or ransomware campaigns. ## Real-world example ### BlackLotus Malware in Cloud Environments In 2025, cybersecurity researchers observed BlackLotus UEFI malware being used in targeted campaigns against enterprise and cloud environments. The malware infected systems at the firmware level, enabling stealthy persistence and evasion of traditional security controls. Attackers distributed it through compromised installers and malicious payloads, allowing them to maintain long-term access and execute further malicious activities without detection. [Source](https://www.securityweek.com/microsoft-shares-resources-for-blacklotus-uefi-bootkit-hunting/) ## Related topics ### Ransomware **Execution** [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/ransomware.html) ### Spyware **Execution** [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/spyware.html) ### Drive-by Download Attack **Execution** [Read more](https://www.manageengine.com/products/desktop-central/attack-glossary/drive-by-download-attack.html) ## Additional Resources ### Achieve 442% ROI and reduce patching time by 95% — Forrester TEI Report See how organizations gained 442% ROI and major efficiency improvements with Endpoint Central. [Read more](https://www.manageengine.com/products/desktop-central/forrester-total-economic-impact-uems.html?utm_source=ec-attackglossary) ### Experience enterprise-grade protection proven in real-world tests — AV-Comparatives Report Discover how Endpoint Central’s antivirus earned recognition through rigorous, real-world security validation in just eight months. [Read more](https://www.manageengine.com/products/desktop-central/malware-protection-av-comparatives-dec2025.html?utm_source=ec-attack_glossary) ### Simplify endpoint security and build cyber resilience — Endpoint Security For Dummies Get a clear, practical guide to understanding threats and strengthening your organization’s security. [Read more](https://www.manageengine.com/products/desktop-central/endpoint-security-for-dummies.html?utm_source=ec_attack-glossary)