Xygeni User Guides
  • Welcome to Xygeni
  • Getting Started
    • Create a Free Trial Account
    • Quick start with your code repository
    • Quick start with Xygeni CLI
    • Quick start with a preloaded project
    • Log in to Xygeni
    • Subscribe to Xygeni
  • Introduction to Xygeni
    • Key Concepts
      • Projects in Xygeni
      • Project Baseline
      • Detected Issues
      • Remediation Actions
      • Policies
      • Risk Level
      • SDLC Inventory
      • Standards Compliance
      • GuardRails
    • Xygeni Products
    • How Xygeni works
    • Xygeni Web UI Overview
      • Projects Screen
        • Risk Level
    • Integrating Xygeni into your Workflow
    • Prioritization Funnels
      • Custom Funnels
      • Prioritization Criteria (Stages)
        • Reachability
        • Exploitability
        • Fixable
    • Guardrails
    • Generate a SBOM
    • Reports
      • Trends
      • Scan History
    • Supported Integrations
    • Customizations
  • Xygeni Products
    • Application Security Posture Management (ASPM)
      • ASPM User Interface Guide
      • All Risks
        • Statistics
        • Issues Evolution
        • Issue Comparison Between Different Scans
      • Governance
      • Inventory
        • All Assets
        • Repositories
        • Components
        • CI/CD Assets
        • Delivery Assets
        • Systems & Tools
        • Collaborators
      • Health Check
      • Inventory Scanner
        • Inventory Scanner Configuration
        • Inventory Collaborators Scan
      • Importing reports from 3rd party tools
        • External Scanners Supported
          • Report upload for Kiuwan
            • ExportRule (.java)
    • Code Security (SAST)
      • Code Security (SAST) User Interface Guide
        • Risks (SAST)
        • Malicious Code
      • Malware Scanner
        • Malware Scanner Configuration
        • Malware Detectors
      • SAST Scanner
        • SAST Scanner Configuration
    • Open Source (SCA)
      • Open Source (SCA) User Interface Guide
      • Open Source Components
      • Supported Package Managers for dependency resolution
      • Risks (SCA)
      • OSS Prioritization Funnels
      • OSS Auto-Remediation
      • Malware Early Warning (MEW)
        • How Malware Early Warning works
        • Common types of Malware found in open source packages
      • Dependency Scanner
        • Dependency scanner configuration
        • Dependency Analyzers
      • Suspect Dependencies Scanner
        • Suspect Deps Scanner Configuration
        • Suspect Deps Detectors
    • CI/CD Security
      • CI/CD Security User Interface Guide
      • CI/CD Details
      • Build Attestations
      • CI/CD Scanner
        • CI/CD Misconfigurations Scanner Configuration
      • Compliance Scanner
        • Supported compliance standards
    • Secrets Security
      • Secrets User Interface Guide
      • Secrets Scanner
        • Secrets scanner configuration
      • Secret Leaks Handling
        • Secret Leaks Handling
        • How to Prevent Hard-Coded Secrets
        • Secret Leaks Handling CheatSheet
      • Secrets Auto-Remediation
    • IaC Security
      • IaC User Interface Guide
      • IaC Scanner
        • IaC Scanner Configuration
    • Malware
    • Build Security
      • Build Security Concepts
      • Build Attestations
      • Attestation format
      • How SALT works
      • Installing Salt CLI
      • Salt Command-Line Reference
      • SALT Architecture
      • SALT How To…​
    • Anomalous Activity Detection
      • Anomalous Activity Detection User Interface Guide
      • Xygeni Sensors
        • Xygeni Sensor for Azure
        • Xygeni Sensor for BitBucket
        • Xygeni Sensor for GitHub
          • GitHub Audit Log Processing
        • Xygeni Sensor for GitLab
        • Xygeni Sensor for Jenkins
        • Anomaly Detection's Detectors
      • Code Tampering Scanner
        • Code Tampering Scanner Configuration
    • Compliance & Malware Insights
      • SSCS Compliance
      • Malicious Packages DB
  • Scan Management
    • Manage Scans
    • Scan History
  • Xygeni Scanner CLI
    • Xygeni Scanners
    • Xygeni CLI Overview
      • Xygeni CLI Prerequisites
      • Xygeni CLI Installation
      • Xygeni CLI Docker Image
      • Xygeni CLI Authentication
        • CLI Authentication with Xygeni
      • SCM, CI/ CD and Container Registry tokens
      • Xygeni CLI Operation Modes
        • Single scan
          • Scanning a docker image
        • Multi Scan
        • Organization scan
      • Xygeni CLI Configuration options
      • Xygeni CLI Output Formats
      • Exporting Xygeni results to 3rd party tools
      • Automatic Remediation
      • Generate SBOM with the Xygeni CLI
      • CLI utils
        • Credentials Encryption
        • Central Configuration
      • Xygeni Guardrails
        • CI/CD Audit Analysis
      • Xygeni CLI Error Codes
      • Xygeni Scanner Reference
  • Xygeni Administration
    • Platform Administration
      • Profile
      • Subscription
      • Users Management
      • Projects Management
      • Groups Management
      • Policies
      • Integrations
        • Xygeni Single Sign-On (SSO) Authentication
          • SSO - OKTA
          • SSO - Microsoft Entra ID
        • Integrate Scanner CLI into CI/CD Systems
          • Azure Pipelines Integration
          • BitBucket Integration
          • CircleCI Integration
          • GitHub Actions Integration
          • GitLab Runner Integration
          • Jenkins Integration
          • Travis CI Integration
        • Git Hooks with Xygeni
        • Collaboration & communication Tools
        • Ticketing Systems
        • Remediation systems
      • Notifications
    • Rest API
  • Support
  • Changelog
    • Version 5.11 - April 11, 2025
    • Version 5.9 – March 26, 2025
Powered by GitBook
On this page
Export as PDF
  1. Xygeni Products
  2. Open Source (SCA)
  3. Malware Early Warning (MEW)

Common types of Malware found in open source packages

Common Types of Malware Found in OSS

Backdoor

A backdoor is a method of bypassing standard authentication procedures to gain access to a system. Attackers can install backdoors to maintain persistent access to compromised systems, allowing them to execute commands and control the system remotely. These are often used to launch further attacks or exfiltrate data over an extended period.

Dropper

A dropper is a malware designed to install other malicious software onto a target system. Droppers can be standalone programs or embedded within other legitimate software. Once executed, they "drop" additional payloads, including any form of malware such as trojans, ransomware, or spyware.

Evader

Evader malware is specifically designed to avoid detection by antivirus software and other security measures. It employs techniques such as code obfuscation, encryption, and polymorphism to hide its presence and actions from security systems, making it difficult to detect and remove.

Generic

Generic malware refers to a broad category of malicious software that doesn't fit into a specific subtype but shares common malicious characteristics. These can include unauthorized data access, system damage, and network disruption. Generic malware often serves as a catch-all term for unidentified or novel threats.

Phishing

Phishing involves tricking users into divulging sensitive information such as login credentials or financial data. This is typically done through fraudulent emails, websites, or legitimate messages. Phishing malware can include keyloggers or other tools to capture the user's input and relay it back to the attacker.

Spyware

Spyware is designed to gather information about a user or organization without their knowledge. It can include capturing keystrokes, screenshots, browsing habits, and accessing sensitive information stored on the system. Spyware often operates stealthily to avoid detection while continuously collecting data.

Banker

Banker malware explicitly targets banking and financial transactions. It aims to steal sensitive information such as login credentials, account numbers, and PINs. Banker malware often uses keylogging, screen capturing, and man-in-the-middle attacks to intercept data during online banking sessions.

Trojan

A Trojan, or Trojan horse, disguises itself as legitimate software to trick users into executing it. Once installed, it can perform various malicious activities, such as creating backdoors, stealing data, or downloading additional malware. Trojans rely on social engineering to spread, often through email attachments or software downloads.

Keylogger

Keyloggers record every keystroke on a computer, capturing sensitive information such as usernames, passwords, and credit card numbers. The attacker then receives this data. Keyloggers can be hardware or software-based and are often used with other malware to maximize data theft.

Stealer

Stealer malware is designed to extract specific types of information from a system, such as passwords, cookies, and browser history. It targets stored credentials and sensitive data to transmit back to the attacker. Stealers often focus on web browsers and email clients to harvest valuable information.

Bot

A bot is a type of malware that turns an infected computer into a "bot" or "zombie," which an attacker can control remotely. Bots are typically used to form botnets, networks of compromised computers used to conduct large-scale attacks, such as distributed denial-of-service (DDoS) attacks, spam campaigns, or data breaches.

Ransomware

Ransomware encrypts a victim's files and demands a ransom payment for the decryption key. It often spreads through phishing emails or exploit kits. The encryption used by ransomware is typically strong, making it nearly impossible to recover the files without the decryption key provided by the attacker upon payment.

Worm

Worms are self-replicating malware that spreads across networks by exploiting vulnerabilities. Unlike viruses, worms do not need to attach themselves to an existing program. They can cause significant damage by consuming bandwidth, overloading servers, and delivering payloads, such as ransomware or trojans, to other systems on the network.

Crypto-Miner

Miner malware uses the infected system's resources to mine cryptocurrencies, such as Bitcoin or Monero, without the user's consent. It can significantly slow down the system and increase power consumption. Miner malware often spreads through malicious websites, infected software downloads, and vulnerabilities in network security.

PreviousHow Malware Early Warning worksNextDependency Scanner

Last updated 1 month ago