• News
  • Security
  • Products
  • About Seqrite
Blogs on Information Technology, Network & Cybersecurity | Seqrite Blog
  • News
  • Security
  • Products
  • About Seqrite
Home  /  Cybersecurity • Malware • Ransomware  /  How hackers name malware and vulnerabilities?
How hackers name malware and vulnerabilities?
07 December 2017

How hackers name malware and vulnerabilities?

Written by Seqrite
Seqrite
Cybersecurity, Malware, Ransomware

Although there aren’t many predefined standards for naming malware and vulnerabilities, they are often segregated according to the genre, impact and even malicious functionalities. Moreover, giving unique names to the vulnerabilities is nearly impossible due to the expansive conglomerate of options. However, there are many provisions for naming the malware samples based on their functionalities. In addition to that, there is a host of generic nomenclature techniques for adding a sense of panic to the proceedings.

Why Naming is Important?

The concept of naming malware and vulnerabilities works perfectly for the bigger malware families. Once a malware family is detected, a specific last name can be assigned to the same. This approach is important from the threat intelligence perspective. There are several organizations that have formulated specific standards for naming these malware and vulnerabilities depending upon the functionality of sample, author’s name and even the concerned domain of crisis.

Existing Naming Standards

The malware and vulnerability naming scheme has been standardized by Computer Antivirus Research Organization (CARO). Depending upon the threat, analysts have formulated a few considerations for naming the malware.

1. Type: This consideration describes the type of malware an organization is dealing with. The possible choices include backdoors, Trojans, worms, viruses and even ransomware threats.

2. Platform: It is important to analyze the platform which is affected by the mentioned malware or vulnerability. The options here can be Windows, Android, Mac OS and a few more. One such example would be the WannaCry ransomware which specifically affected the Windows OS.

3. Family: This aspect groups malware depending upon the common traits or creators. An example would be categorizing Petya and Mischa within the double ransomware family, as marketed by their common creator— Janus.

4. Variant Letter: Here is a technical determinant that sequentially segregates each version of the malware family in a chronological and alphabetical order.

5. Additional Insights: Here is a general category that uses other details apart from the ones mentioned earlier.

Naming Malware and Vulnerabilities

It is important to understand how specific malware and vulnerabilities are named. While Mischa and Petya were named by the common creator Janus for heightening the impact, the likes of Heartbleed and WannaCry have certain interesting explanations behind the nomenclature.

Heartbleed is a vulnerability that leaks security certificates and information with attackers intimating organizations using a heartbeat like signal. The server, upon receiving the signal, reciprocates by bleeding information to the attacker. This is why ‘Heartbleed’ actually fits in as a name.

WannaCry is a shortened form of WanaCryptor which basically derives its name from the Cryptoworm ransomware. This threat sabotages the secured hard drives by encrypting the information within. A worm which encrypts the information and only hands over the key upon receiving Bitcoin payments is fittingly named WannaCry.

CryptoLocker Trojan is yet another example where a malware is named according to the platform and even functionality. This threat targets the Windows OS and encrypts confidential and important datasets.

Apart from that, we have the randomly named ZeuS Trojan horse that comes as a Zbot package and targets Microsoft Windows for carrying out a host of criminal tasks. The existence of ‘bot’ in the naming schema reveals that this form of vulnerability is spread via the drive-in downloads and different phishing schemes. Moreover, this larger than life name for this malware signifies the impact it has on the IT networks.

Another malware, OSX or Tsunami.A poses multiple threats and the nomenclature is according to the existing standards. The naming is based on the impact this malware has on the Linux systems. The .A variant letter reveals that this malware has been around for quite a long time. In addition to that, this is an IRC bot which can easily initiate DDoS attacks and run shell or terminal commands on an infected system.

Inference

Naming a malware and vulnerability isn’t as straightforward as it seems. There are a few standards which can determine the exact process; thereby allowing users to study the same from the perspective of public relations. Lastly, there are many malware and Trojan which are rendered impactful names for grabbing attention.

As an IT security partner for your business, Seqrite provides comprehensive endpoint security from advanced cyber threats. To know more, visit our website or

seqrite_cta1

 Previous PostHoliday seasons: Breeding ground for cybercriminals
Next Post  Seqrite Endpoint Security Enterprise Suite receives BEST+++ certi...
Seqrite

About Seqrite

Follow us for the latest updates and insights related to security for enterprise networks. Subscribe to our newsletter to stay...

Articles by Seqrite »

Related Posts

  • ZTNA Use Cases and Benefits for BFSI

    May 19, 2025
  • Market Guide for Choosing the Right ZTNA Solution

    May 14, 2025
  • Protect What Matters Most with Data Discovery and Classification

    May 12, 2025
Featured Authors
  • Seqrite
    Seqrite

    Follow us for the latest updates and insights related to security for...

    Read more..
  • Sanjay Katkar
    Sanjay Katkar

    Sanjay Katkar is the Joint Managing Director of Quick Heal Technologies...

    Read more..
  • Mahua Chakrabarthy
    Mahua Chakrabarthy

    A tea connoisseur who firmly believes that life is too short for dull content....

    Read more..
Topics
apt (19) Cyber-attack (35) cyber-attacks (58) cyberattack (16) cyberattacks (13) Cybersecurity (322) cyber security (31) Cyber threat (33) cyber threats (48) Data (11) data breach (55) data breaches (28) data loss (28) data loss prevention (34) data privacy (11) data protection (24) data security (15) DLP (49) Encryption (16) endpoint security (107) Enterprise security (17) Exploit (14) firewall (11) GDPR (12) hackers (11) malware (76) malware attack (23) malware attacks (12) MDM (25) Microsoft (15) Network security (22) Patch Management (12) phishing (27) Ransomware (67) ransomware attack (30) ransomware attacks (30) ransomware protection (13) security (11) Seqrite (33) Seqrite Encryption (27) Seqrite EPS (33) Seqrite Services (16) UTM (34) Vulnerability (16) windows (11)
Loading
Resources
  • White Papers
  • Datasheets
  • Threat Reports
  • Manuals
  • Case Studies
About Us
  • About Seqrite
  • Leadership
  • Awards & Certifications
  • Newsroom
Archives
  • By Date
  • By Category
Loading

© 2025 Quick Heal Technologies Ltd. Cookie Policies Privacy Policies