Combines characteristics of viruses, worms, Trojan Horses, and other malicious code with server and Internet vulnerabilities to spread itself.
A virus, which uses multiple infection techniques. This may include the exploitation of various program vulnerabilities, incorporation of trojan behavior, file infection routines, Internet propagation routines, network share propagation routines, and spreading without any human intervention.
A computer network attack that seeks to maximize the severity of damage and speed of contagion by combining methods, for example using characteristics of both viruses and worms, while also taking advantage of vulnerabilities in computers, networks, or other physical systems. An attack using a blended approach might send a virus via an e-mail attachment, along with a Trojan horse embedded in an HTML file that will cause damage to the recipient computer. The Nimda, CodeRed, and Bugbear exploits were all examples of blended threats.
A virus or worm using multiple infection techniques. This can include exploiting program vulnerabilities, Trojan behavior, infecting files, Internet propagation routines, network-share propagation routines, and spreading with no human intervention.
threats that combine the characteristics of viruses, worms, Trojan horses, and malicious code with server and internet vulnerabilities to initiate, transmit, and spread an attack; can spread rapidly and cause widespread damage.
A blended threat is a malware that is made up of a combination of different malware components, such as, a worm, a trojan horse and a computer virus that uses multiple techniques to attack and propagate.