Research Article

Evaluating Grayware Characteristics and Risks

Table 2

Categories of species in the Trend Micro grayware encyclopedia.

ID Name Description Num Pct

1SpywareInstall on user systems to track activities and collect data5207559.97
2DialerRedirect calls to premium 900 numbers for financial purpose1519617.50
3AdwareDisplay pop-ups/pop-unders and may be active after hosts terminate1412416.27
4Hacking ToolVarious toolkits for malicious purposes36724.23
5Browser Helper ObjectPlugins to browsers and track surfing habits and gather information6910.80
6Cracking ApplicationRecover passwords from encrypted forms by brute-force/algorithms6240.72
7Trojan SpywareStealthy programs to conduct harmful activities6080.70
8ToolbarPerform searching or file downloading and modify search results3940.45
9TrackwareTrack Web browsing activities for targeting ads or malicious purposes1160.13
10KeyloggerRecords keystrokes and send to attackers850.10
11Remote Access TrojanAbuse for system administration or info theft750.09
12HijackerManipulate system settings to reroute traffic450.05
13DropperProgram that can retrieve and install other malware or grayware820.09
14FreeloaderRetrieve, install, and execute other software in background490.06
15Joke ProgramAnnoy users but do not infect files4250.49