What is Malware?
Malware is developed as harmful software that invades or corrupts your computer and/or network. Malware can steal, encrypt, or delete your data, alter or hijack core computer functions, and spy on your computer activity without your knowledge or permission. Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way
Different types of malware have unique traits and characteristics. Types of malware include the following:
Virus
A Virus is the most common type of malware that attaches to legitimate programs, spreading when the infected program executes. It's a contagious program or code that needs a host file and human intervention. It can steal sensitive data, corrupt files, slow down performance, and even crash your entire system. E.g. - ILOVEYOU (2000), affected 45 million computers in 10 days.
Worm
A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors. It spreads across devices within a network, consumes bandwidth, overloading infected systems and making them unavailable.
It can change and delete files or introduce other malware. E.g - Stuxnet (2010), a powerful computer worm targeted at the centrifuges of Iran’s uranium enrichment facilities
Trojan
A Trojan is designed to appear as a legitimate software program to gain access to a system. They claim to perform one function but do another. Once activated following installation, Trojans can execute their malicious functions.
It might be disguised as free software, videos or music, or seemingly legitimate advertisements; pretending to be useful software or content. E.g – FakeAV, a remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs
Spyware
Spyware collects information and data on the device and user, as well as it observes user's activity like Keystrokes, browsing habits, location data, and even login information without their knowledge. E.g. - Look2Me, tracks user behavior, website logs, and social media interactions and shares this information with a remote server.
Ransomware
Ransomware infects a user's system and encrypts its data. Cyber criminals then demand a ransom payment from the victim in exchange for decrypting the system's data. It is designed to deny a user or organization access to files on their computer and cause financial loss, data loss, and reputational damage. E.g. - CryptoLocker
Rootkit
A rootkit once installed, the program gives threat actors root or privileged access to the system. Rootkits vary and hide themselves in the operating system. It is a collection of tools that allow hackers administrator-level control over the target device and modify the operating systems’ operations to facilitate non-standard functionality.
Two types of Rootkit are -
KM Root kit - Modifies kernel structures in memory to manipulate the OS
UM Root kit – Uses user-mode techniques and APIs to manipulate the OS
Adware
Adware tracks a user's browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. These are the programs that automatically deliver advertisements to host computers. It tracks your search, location and browsing history to display ads that are more relevant to you.
For example, an advertiser might use cookies to track the webpages a user visits to better target advertising. E.g. - Gator, also known as Claria, was notorious for its pop-up ads, often tricking users into downloading and installing it by bundling itself with other software.
Cryptojacking
Malware that involves unauthorized use of someone’s computer to mine cryptocurrency. This malware installs on the victim’s computer and uses their processing power to mine cryptocurrency without their knowledge or consent. E.g. XMRig, an open-source cryptojacking malware that is commonly incorporated into other types of malware that is designed to mine the Monero or Bitcoin cryptocurrency
How are Malware distributed
One of the most popular ways to spread malware is by phishing attack through email, which may be disguised to look as if it is from a familiar company such as a bank, or a personal email from a friend.
How to Prevent Malware
Malware security protection provides that second vital layer of protection for your computer or network.
Keep your system up to date with all OS and Browser updates
Avoid suspicious links and sites.
Be careful about opening email attachments or images
Do Regular System Backup.
Don't trust pop-up windows that ask you to download software
Use email filters.
Comentarii