Browse Definitions :
Definition

dropper

A dropper is a small helper program that facilitates the delivery and installation of malware. Spammers and other bad actors use droppers to circumvent the signatures that anti-virus programs use to block or quarantine malicious code. It's much easier to change the dropper, should its signature become recognized, than it would be to rewrite the malicious codebase.

Droppers, like many of their larger Trojan horse counterparts, can be persistent or non-persistent. Non-persistent droppers install malware and then automatically remove themselves. Persistent droppers copy themselves to a hidden file and stay there until they complete the task they were created for.

Droppers can be spread by people who:

  • Open an infected e-mail attachment.
  • Pick up a drive-by download on an infected website.
  • Click on a malicious link in an email or on a website.
  • Using an infected flash drive.

Sometimes droppers are bundled with free utility programs (such as ad blockers) to avoid detection by antivirus software. When the free program executes, the dropper will first download and install malware before it unpacks and installs the legitimate utility.

How droppers hide

Droppers may require user execution but they can also be executed through exploitation of a security vulnerability. Droppers are often disguised and hidden in a computer’s directories (folders), so that although they are visible, they look like valid programs or file types. Sometimes droppers are bundled with free utility programs (such as ad blockers) to avoid detection by antivirus software. When the free program executes, the dropper will first download and install malware before it unpacks and installs the legitimate utility.

Droppers aren't associated with any file extensions, which makes them harder to detect. The software, which essentially acts like a Trojan horse is often used in spear phishing attacks.

Although droppers are traditionally standalone programs, their capabilities are increasingl included as part of a malware package. In late 2014, for example, the FBI reported that malware used in attacks on Sony associated with their movie The Interview came wrapped in an executable dropper that installed itself as a Windows service. Data collected by the 2020 Verizon DBIR shows that nearly 25% of public sector incidents involve a dropper.

Preventing droppers

The Cybersecurity and Infrastructure Security Agency (CISA) recommends users and administrators:

  • Block email attachments that cannot be scanned by antivirus software.
  • Implement a zero-trust strategy.
  • Adhere to the principle of least privilege (POLP).
  • Implement network slicing to segment and segregate networks and functions.

Take a Quiz!

1. Zeus, also known as Zbot, is a popular malware tookit that allows bad actors to build their own _________________.
a. virus signatures
b. Trojan horses
Answer

2. What is a mantrap?
a. a command and control server that issues directives to infected devices.
b. a small room with two doors.
Answer

3. What do you call the programming that's embedded in the persistent memory of your computer keyboard?
a. software driver
b. firmware
Answer

4. What does a backdoor do?
a. helps circumvent a computer's security mechanisms.
b. decouples the the front end of a website from the back end to improve privacy.
Answer

5. Persistent droppers are often used to carry out APT attacks. What does APT stand for?
a. advanced persistent threat
b. automated programming thread
Answer

This was last updated in October 2020

Continue Reading About dropper

Networking
Security
  • cloud security

    Cloud security, also known as 'cloud computing security,' is a set of policies, practices and controls deployed to protect ...

  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is a method for identifying and assessing privacy risks throughout the development lifecycle of...

  • proof of concept (PoC) exploit

    A proof of concept (PoC) exploit is a nonharmful attack against a computer or network. PoC exploits are not meant to cause harm, ...

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close