Hackers break’s into people machines and Infect their System with a Virus. His Hideout Place has Dark Atmosphere, Multiple Displays, Cables Everywhere.

Everyday thousands of people are getting infected by different types of maleware. The most common types of maleware today are viruses, worms and trojans.


  • Viruses – Viruses cannot spread without the help of us humans. They are like parasites because they need a host to attach themselves to. The host is usually a legitimate looking program or file. Once this program is launched, the virus is executed and infects other files on the computer. Viruses can be very destructive. They can do damage to your computer hardware and software and files. Viruses are spread through the sharing of files and most popular via email attachments.
  • Worms – A worm is a malicious program that can replicate itself onto other computers on a network, Unlike a virus, worms don’t need a human to be able to spread and infect systems. Once it infects a system, it uses that system to send out other copies of itself to other random systems attempting to infect them.
  • Trojan Horse – A trojan horse is a malicious program that can be used to do silly to a system like changing its desktop, mess with the user interface, and take control of the mouse. It can be used for some serious things like accessing your data, erasing files, stealing your passwords and capturing your keystrokes.
  • Logic Bombs – Logic bombs are usually pieces of code that are programmed into software and lie dormant until a certain time or until a user does a certain action which causes it to be executed. When it is triggered it performs a certain function that the program wasn’t intended to do.
  • Bacteria – Bacteria make many copies of themselves and entually end up taking up all the computer resources such as all of its processor power, memory and disk space.
  • Blended Threats – Blended threat combine all of the characteristics of the above and use them along with system vulnerabilities to spread and infect machines.

Citation- David Melnichuk [The hackers Underground handbook] 2/2015 P98