Types of Malware in 2025: How Hackers Are Evolving Their Tricks

Malware is constantly changing—almost like it has a life of its own. Every year, thousands of new strains emerge as cybercriminals find fresh, sneaky ways to break into systems and cause chaos.

According to Mandiant’s latest report, hackers in 2025 are using a mix of new and familiar malware families. Some are recent discoveries that took experts by surprise, while others are old threats that just refuse to die out.

In this article, we’ll explore the main types of malware making waves right now, highlight the ones that hit hardest in 2024, and unpack what these trends reveal about the digital dangers we face today.

Types of Malware in 2025: How Hackers Are Evolving Their Tricks

Key Takeaways

  • Malware is a catch-all term for malicious software that can steal your data, spy on what you do, lock your files, or hand over control of your device to attackers. In 2024 alone, researchers tracked over 600 new malware families—a reminder that cyber threats are growing faster than ever.
  • Experts studied malware from two angles: the 632 newly identified families and the 205 families that were actually used in real-world attacks. This helps reveal what’s spreading quietly in the background versus what’s actively hitting victims.
  • Backdoors and ransomware continue to dominate the scene, making up 35% and 14% of observed attacks. Hackers clearly still trust these tried-and-true methods—they’re reliable, profitable, and hard to stop once they’re inside.
  • Some of the most active malware families in 2024 included BEACON (5.4%), GOOTLOADER (2.5%), WIREFIRE (2.5%), SYSTEMBC (1.8%), REDBIKE (1.8%), RANSOMHUB (1.8%), LOCKBIT (1.6%), and BASTA (1.6%). Each of these left its mark on victims across industries, from small businesses to global corporations.
  • And it’s not just ransomware and backdoors to worry about. Other stealthy threats like tunnelers, rootkits, and keyloggers still make up about a quarter of all malware observed in 2024. They might not grab headlines, but they’re quietly stealing information and opening doors for bigger attacks.

What Is Malware?

Malware stands for “malicious software,” and that name says a lot. It’s any kind of computer program that’s been made to cause trouble — sneaky, harmful, and often very destructive.

These programs can do all kinds of nasty things, like:

  • Steal your personal data — things like passwords, photos, or even your bank details.
  • Lock your important files and demand money (that’s called ransomware) just to give you access again.
  • Spy on you quietly, recording what you type or capturing screenshots without you knowing.
  • Let hackers take control of your computer from miles away, as if they owned it.

People sometimes say things like “malware virus” or “virus malware,” but that’s a bit confusing. A virus is actually just one type of malware — it spreads by attaching itself to other files, kind of like a parasite. But malware is a bigger family, which also includes things like ransomware, backdoors, trojans, and droppers — each with its own ugly way of attacking.

In the next part, we’ll see how cybersecurity experts keep track of these threats — both the new ones just appearing and the ones already being used in real attacks.


How Researchers Tracked Malware

When Mandiant’s team of cybersecurity experts studied malware, they looked at it from two main angles. Each gave them a different perspective — kind of like looking at the same storm from two sides.

1. Newly Tracked Families:
These are the malware families that were first discovered in 2024. This shows the supply side — how many brand-new threats are being built and released into the wild.
Mandiant found over 600 new malware families in that year alone! That’s a chilling reminder of how fast attackers work and how quickly new dangers appear.

2. Observed Families:
These are the ones actually found during real investigations in 2024 — the malware that attackers truly used in their campaigns.
This number was smaller, around 200 families, showing that while many threats are created, only some are actively used.

Both views matter. The newly tracked families show what’s emerging, while the observed families reveal what’s really being used out there.

By looking at both sides, researchers get a clearer, fuller picture — helping them (and us) prepare for the cyber threats that matter most.


Main Types of Malware

Malware comes in many shapes and forms, each built with a different purpose in mind. Some quietly open the door for hackers, some spread harmful files, and others sneak in to steal information or lock people out of their systems.

According to the Mandiant report, here’s how often these types of malware appeared in 2024—both as new discoveries and in real-world attacks.

1. Backdoors

31% newly tracked, 35% observed

Backdoors are like secret tunnels into a computer system. Once installed, attackers can slip in anytime to steal files, run commands, or spy on activity—often without anyone noticing.

Their strong presence in both new and existing attacks shows just how reliable and dangerous this method still is. Backdoors remain one of hackers’ favorite tools because they quietly hand over control.

2. Downloaders

19% newly tracked, 7% observed 

Downloaders act like delivery agents for other malware. They sneak into a system first and then download more harmful programs behind the scenes.

Many new downloaders were discovered in 2024, though fewer were seen in actual attacks. Still, they remind us how one small infection can open the door to something much worse.

3. Droppers

12% newly tracked, 8% observed

Droppers are the “setup crew” of cyberattacks. They silently install or launch other pieces of malicious software, preparing the system for bigger threats to follow.

Though small, their role is vital. Without droppers, many large-scale attacks wouldn’t even get off the ground.

4. Credential Stealers

6% newly tracked, 5% observed

These sneaky programs go after what people value most—usernames and passwords. Once stolen, this information can unlock entire networks or be sold to other criminals.

Even though they don’t appear as often as other types, credential stealers leave deep scars. Losing personal data or access to an account can be frustrating, frightening, and costly.

5. Ransomware

5% newly tracked, 14% observed

Ransomware is one of the most feared types of malware. It locks important files and demands payment—usually in cryptocurrency—to release them.

Interestingly, while fewer new ransomware families appeared in 2024, attackers continue to use older, proven versions. It’s a cruel reminder of how cybercriminals exploit desperation and fear to get what they want.

6. Other Malware Types

27% newly tracked, 25% observed

keyloggers, rootkits, and tunnelers. Each has a specific job—some record every keystroke, while others hide malicious traffic or maintain secret access.

They may seem small on their own, but together they make up a huge part of the modern malware landscape—constantly evolving and finding new ways to cause trouble.

Sure! Here’s your rewritten version in simple, realistic, and human-sounding language — full of natural flow, a touch of emotion, and the same structure you provided:


Malware Examples

Understanding real-life malware makes it easier to see how these digital threats actually work. The examples below come from Mandiant’s 2025 report, which analyzed thousands of cybersecurity cases from around the world. Each of these malware families showed up in a noticeable number of investigations — and every one of them tells a different story about how attackers think and operate.

Here are eight major malware examples identified in Mandiant’s 2025 report:

BEACON (Backdoor) – Found in 5.4% of cases. This sneaky tool, part of the Cobalt Strike framework, lets attackers quietly move around inside a network. They can copy files, take screenshots, and even run commands — almost like a digital ghost living inside someone’s system.

GOOTLOADER (Downloader) – Seen in 2.5% of cases. It starts off disguised as harmless JavaScript but secretly pulls in another malicious file that installs the main malware. It’s like opening what looks like a friendly email, only to realize too late that it brought something dangerous with it.

WIREFIRE (Web Shell) – Appeared in 2.5% of cases. Written in Python and linked to Pulse Secure devices, this malware gives hackers the ability to upload and run commands remotely. Think of it as a secret backdoor that someone left open on your computer — without you ever knowing.

SYSTEMBC (Tunneler) – Detected in 1.8% of cases. This clever piece of malware reroutes internet traffic through hidden paths, often using Tor, and can even install more malware. It’s like a digital smuggler, quietly moving data where no one’s watching.

REDBIKE / Akira (Ransomware) – Found in 1.8% of cases. This one locks up files using strong encryption (ChaCha20) and demands payment to unlock them. Its code shows links to older ransomware, proving how attackers keep recycling and improving old tricks.

RANSOMHUB (Ransomware) – Also 1.8% of cases. Written in Go, this nasty program can encrypt files across local drives and networks — even in safe mode. It’s fast, flexible, and ruthless, targeting both individuals and big organizations.

LOCKBIT (Ransomware) – Reported in 1.6% of cases. Famous for spreading quickly, it deletes backups, clears logs, and leaves files renamed with “.lockbit.” It’s one of those threats that spreads like wildfire and leaves chaos in its wake.

BASTA (Ransomware) – Another 1.6%. Built in C++, it uses the ChaCha20 method to encrypt files, often renaming them with “.basta.” Some versions even create random file names, making cleanup and recovery even more confusing and stressful.

What These Examples Show

Together, these malware families reveal just how creative and varied cyberattacks have become. Some, like backdoors, prefer to hide in the shadows for months, while others — especially ransomware — hit fast and hard, demanding money and causing instant damage.

The truth is, malware today is a mix of old techniques and new ideas. Attackers constantly tweak their tools, proving that cybersecurity is a never-ending race between defense and deception.


The Bottom Line

Malware isn’t going away anytime soon. Whether it’s silent backdoors or loud ransomware attacks, these threats keep evolving. Understanding how they work is the first step to fighting them. With the right knowledge, vigilance, and good habits, people and organizations can stay one step ahead — even in a world full of digital danger.


FAQs

1. What are the 7 main types of malware?

The seven main types are viruses, worms, trojans, ransomware, spyware, adware, and rootkits. Each one behaves differently, but all share the same goal — to sneak in, spread, and cause harm in one way or another.


2. What is the most common malware attack?

Backdoors and ransomware are still the top threats. Backdoors let attackers secretly control a system, while ransomware locks up important files and demands payment. Together, they’re a dangerous combo that continues to dominate cybercrime.


3. How can you prevent malware?

The best defense starts with smart habits:

  • Keep your software and systems updated.
  • Use strong, unique passwords.
  • Back up your files regularly.
  • Avoid suspicious emails, links, and downloads.

These simple steps can make all the difference — and save you from the stress and fear that come with a malware infection.


References:—

  1. M-Trends Report 2025 (Google Cloud Security)