A payload (sometimes translated as "payload" in French, but the English term is more commonly used) refers to the part of a malicious software (malware) that performs thereal malicious action or themalicious intent of an attack. In other words, it is the malware component that carries the "load of the attack and directly causes the damage or adverse effects on the target system.
To fully understand the payload, it is important to distinguish it from the other parts of a malware or attack:
- Exploit (or attack vector) : is the method or means used to enter in a system or network. An exploit exploits a vulnerability (security hole) to gain initial access. For example, an exploit could be an e-mail from phishingan unpatched software vulnerability, or an attack by brute force. The feat is the entrance.
- Payload : once the exploit has successfully penetrated, the payload is what is "delivered" or "loaded on the target system. This is the malicious code that is executed and achieves the attacker's objective. The payload is the malicious action.
In short, the exploit opens the door, and the payload passes through the door and does damage.
π Features
- Specific objective: each payload is designed to perform a specific malicious action. The objective can vary greatly depending on the attacker's intentions.
- Diversity of actions : payloads can perform a wide range of malicious actions. Here are some common examples:
-
- Data theft : the payload can be designed to exfiltrate sensitive information (passwords, personal data(e.g. financial information, trade secrets, etc.) from the compromised system to a server controlled by the attacker.
- Encryption of data (ransomware) : a ransomware payload will encrypt files of the victim, making them inaccessible. The attacker will then demand a ransom (usually in cryptocurrency) in exchange for the decryption key.
- Deleting or modifying data : the payload can be used to deleting or altering data causing damage and disruption to the victim's operations.
- Installation of backdoors : a backdoor payload creates a secret access to the compromised system, allowing the attacker to return later for further malicious actions.
- Taking control of the system : the payload can allow the attacker to remote control the infected system, using it to launch further attacks, host illegal content or spy on user activity.
- Display of intrusive advertising (adware) : an adware payload will display unwanted advertising to the user, generating revenue for the attacker and damaging the user experience.
- Use of system resources (cryptojacking) : a cryptojacking payload uses the calculation resources of the infected system (CPU, GPU) to mine cryptocurrencies without the user's knowledge.
- Denial of service (DoS or DDoS) : the payload can transform the infected system into a "zombie" within a botnetused to launch denial-of-service attacks against other targets, overloading their servers and making them unavailable.
- Invisible and discreet: payloads are often designed to be discreet and difficult to detectThey may use obfuscation, encryption or stealth techniques to evade detection systems. They may use obfuscation, encryption or stealth techniques to evade detection systems.
- Essential part of malware analysis : understanding the payload of malware is crucial for theanalysis of and response to cyber security. By analysing the payload, experts can determine :
-
- Type of attack : is it ransomware, a spywarea botnet, etc.?
- The striker's objective: data theft, disruption, espionage, financial gain, etc.?
- Potential damage : what are the risks for the victim?
- The remediation : how to clean up an infected system and protect against similar attacks in the future?