This feature refers to malicious software designed with the primary intention of causing harm to a system or its data. These operations typically aim to disrupt the availability and integrity of the targeted system. Examples include actions such as replacing critical system files, altering system settings to disable important features, deleting or corrupting essential data, or rendering the system unusable. Destructive malware often employs tactics that make restoration difficult, such as encrypting files with ransomware, overwriting boot sectors, or modifying system configurations to prevent normal booting. The goal of such attacks is to inflict significant damage, potentially causing financial losses, operational downtime, or irreparable harm to the victim's digital infrastructure.

Categories Alteration, Disruption
Dangerousness High

Associated with Releases