Malware
Fundamental concept of malicious software, its types, propagation methods, and impacts on systems and organizations.
Classification
- ComplexityHigh
- Impact areaTechnical
- Decision typeArchitectural
- Organizational maturityIntermediate
Technical context
Principles & goals
Use cases & scenarios
Compromises
- Data loss or exfiltration by undetected malware.
- Operational disruption from encryption or sabotage.
- Reputational and legal risks from compromised systems.
- Centralized collection and long-term retention of relevant telemetry.
- Automated playbooks for common malware scenarios.
- Close collaboration between security, IT and product teams.
I/O & resources
- Network telemetry (flows, DNS, proxy logs)
- Endpoint logs and process metadata
- Threat intelligence feeds and IOCs
- List of IOCs and hunting indicators
- Containment and remediation actions
- Forensic reports and lessons learned
Description
Malware denotes malicious software designed to compromise systems, exfiltrate data, or enable unauthorized control. It includes viruses, worms, trojans, ransomware and spyware as well as advanced polymorphic families. The concept covers attack vectors, propagation mechanisms and attacker motives and informs prevention, detection and incident response strategies.
✔Benefits
- Increased resilience via targeted detection and response strategies.
- Improved risk understanding through classification of malware types and TTPs.
- Clear guidance for forensics and recovery after incidents.
✖Limitations
- Constant evolution: signature-based methods quickly become obsolete.
- False positives/negatives in heuristics and machine-learning approaches.
- Limited usefulness without context and comprehensive telemetry.
Trade-offs
Metrics
- Detection rate
Share of malware incidents detected out of all actual incidents.
- Mean Time to Detect (MTTD)
Average time between initial compromise and detection.
- Number of confirmed incidents per period
Count of validated malware incidents within a defined period.
Examples & implementations
WannaCry outbreak (2017)
Ransomware that encrypted systems globally and impacted critical infrastructure; source of lessons learned on patch management and segmentation.
Emotet campaigns
Modular malware family that acted as a loader and enabled extensive credential theft and spam campaigns.
NotPetya (2017)
Destructive malware with massive propagation via network mechanisms; example of supply-chain and network risks.
Implementation steps
Inventory existing telemetry sources and integrations
Configure detection rules and baselines in SIEM/EDR
Establish an incident response process including playbooks
Regular exercises and postmortems for improvement
⚠️ Technical debt & bottlenecks
Technical debt
- Legacy endpoints without EDR remain hard to analyze.
- Fragmented log infrastructure complicates correlation.
- Outdated signature databases and missing feature updates in detection tools.
Known bottlenecks
Misuse examples
- Overblocking telemetry sources leading to blind spots.
- Uncritical IOC distribution without context causes alert fatigue.
- Deploying untested detection scripts in production hinders forensics.
Typical traps
- Relying on single tools instead of process and data integration.
- Lack of alert prioritization by risk context.
- Insufficient raw telemetry retention for retrospective analysis.
Required skills
Architectural drivers
Constraints
- • Legal requirements for handling telemetry and personal data
- • Limited storage and analysis capacity for high telemetry volumes
- • Heterogeneous system landscape complicates standardized detection