top of page

Understanding Malware: A Beginner's Guide




What is Malware?


Malware is developed as harmful software that invades or corrupts your computer and/or network. Malware can steal, encrypt, or delete your data, alter or hijack core computer functions, and spy on your computer activity without your knowledge or permission. Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way


Different types of malware have unique traits and characteristics. Types of malware include the following:


Virus


A Virus is the most common type of malware that attaches to legitimate programs, spreading when the infected program executes. It's a contagious program or code that needs a host file and human intervention. It can steal sensitive data, corrupt files, slow down performance, and even crash your entire system. E.g. - ILOVEYOU (2000), affected 45 million computers in 10 days.


Worm


A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors. It spreads across devices within a network, consumes bandwidth, overloading infected systems and making them unavailable.

It can change and delete files or introduce other malware. E.g - Stuxnet (2010), a powerful computer worm targeted at the centrifuges of Iran’s uranium enrichment facilities


Trojan


A Trojan is designed to appear as a legitimate software program to gain access to a system. They claim to perform one function but do another. Once activated following installation, Trojans can execute their malicious functions.


It might be disguised as free software, videos or music, or seemingly legitimate advertisements; pretending to be useful software or content. E.g – FakeAV, a remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs


Spyware


Spyware collects information and data on the device and user, as well as it observes user's activity like Keystrokes, browsing habits, location data, and even login information without their knowledge.  E.g. - Look2Me, tracks user behavior, website logs, and social media interactions and shares this information with a remote server. 


Ransomware


Ransomware infects a user's system and encrypts its data. Cyber criminals then demand a ransom payment from the victim in exchange for decrypting the system's data. It is designed to deny a user or organization access to files on their computer and cause financial loss, data loss, and reputational damage. E.g. - CryptoLocker


Rootkit


A rootkit once installed, the program gives threat actors root or privileged access to the system. Rootkits vary and hide themselves in the operating system. It is a collection of tools that allow hackers administrator-level control over the target device and modify the operating systems’ operations to facilitate non-standard functionality.


Two types of Rootkit are -

  • KM Root kit - Modifies kernel structures in memory to manipulate the OS

  • UM Root kit – Uses user-mode techniques and APIs to manipulate the OS


Adware


Adware tracks a user's browser and download history with the intent to display pop-up or banner advertisements that lure the user into making a purchase. These are the programs that automatically deliver advertisements to host computers. It tracks your search, location and browsing history to display ads that are more relevant to you.


For example, an advertiser might use cookies to track the webpages a user visits to better target advertising. E.g. - Gator, also known as Claria, was notorious for its pop-up ads, often tricking users into downloading and installing it by bundling itself with other software.


Cryptojacking


Malware that involves unauthorized use of someone’s computer to mine cryptocurrency. This malware installs on the victim’s computer and uses their processing power to mine cryptocurrency without their knowledge or consent. E.g. XMRig,  an open-source cryptojacking malware that is commonly incorporated into other types of malware that is designed to mine the Monero or Bitcoin cryptocurrency


How are Malware distributed


One of the most popular ways to spread malware is by phishing attack through email, which may be disguised to look as if it is from a familiar company such as a bank, or a personal email from a friend.


How to Prevent Malware


Malware security protection provides that second vital layer of protection for your computer or network. 

  1. Keep your system up to date with all OS and Browser updates

  2. Avoid suspicious links and sites.

  3. Be careful about opening email attachments or images

  4. Do Regular System Backup.

  5. Don't trust pop-up windows that ask you to download software

  6. Use email filters.

Comentarii


bottom of page