What is Malware?
Malware, short for "malicious software," refers to any invasive programme produced by cybercriminals, called "hackers" to steal data and damage or destroy computers and computer systems. Malware types include viruses, worms, Trojan viruses, spyware, adware, and ransomware. Recent malware assaults have resulted in massive data exfiltration(Cisco, 2022)
![]() |
| (Norton, 2021) |
Types of malware
Malware is classified into several categories, including viruses, worms, trojans, ransomware, bots or botnets, adware, spyware, rootkits, file-less malware, and malvertising. While the eventual aim of a malware assault is frequently the same to get access to personal information or harm the device, generally for financial gain, the means of distribution might vary. Some may even employ a hybrid of these virus kinds(Norton, 2021).
Viruses are a sort of malware that takes the shape of a piece of code that is put into an application, programme, or system and is distributed by the victims themselves (Norton, 2021).
Worms are malware that reproduces themselves, similar to malware viruses. Unlike viruses, worm malware may replicate itself without human intervention and is not host-dependent. It does not need to attach itself to a software application to inflict harm (Norton, 2021).
Trojans are a sort of malware that masquerades as legitimate software, apps, or files to trick users into installing it and, inadvertently, granting control of their machines. Once deployed, a trojan can carry out the function for which it was created, whether to damage, disrupt, steal, or inflict other destructive activity on your data or network(Norton, 2021).
Ransomware is a type of malware that comes with a ransom. It locks and encrypts a victim’s device or data and demands a ransom to restore access. How does ransomware happen? It’s often the result of victims mistakenly downloading this malware type through email attachments or links from unknown sources. Once installed, the malware might create a backdoor for hackers to access a device and then encrypt the data, locking owners out of their devices until they pay a ransom to regain ownership(Norton, 2021).
Botnets or bots may behave more like a "spider," a computer that traverses the internet seeking security weaknesses to attack, and the hacking is done automatically or robotically. Botnets are malware that gains access to devices via malicious code. Botnets hijack devices in certain circumstances, allowing fraudsters to manipulate them remotely(Norton, 2021).
Adware is malware that includes advertisements. Adware, sometimes known as advertising-supported software, shows intrusive adverts on your computer, sometimes in pop-up ads, and tracks users' internet activities(Norton, 2021).
Spyware is a sort of malware that infiltrates computers and other devices without the owner's awareness. This is frequently done to spy on internet activity, track login and password information, or collect sensitive information that may be used fraudulently(Norton, 2021).
Rootkits are malware forms that allow hackers to remotely control victims' devices, frequently without their knowledge. Because rootkits are designed to remain hidden, they can seize or subvert security software, increasing the probability that this form of malware will remain on your computer for an extended period and cause serious harm(Norton, 2021).
Fileless malware is a form of malware that instals and executes harmful operations by utilising software, programmes, and protocols that are already built into or native to device operating systems. Fileless malware works in memory rather than on a disc. Put another way, no files are required to download this form of malware, therefore the name fileless malware(Norton, 2021).
Malvertising is a sort of virus that originates from advertisements on reputable websites. On the other hand, adware is a sort of malware already present on a device. Both assaults rely on internet advertising to cause devastation(Norton, 2021).
How can you protect against malware?
- Install and maintain antivirus software(Cisa, 2019).
- Use caution with links and attachments(Cisa, 2019).
- Block pop-up advertisements(Cisa, 2019).
- Use an account with limited permissions(Cisa, 2019).
- Disable external media AutoRun and AutoPlay features(Cisa, 2019).
- Change your passwords(Cisa, 2019).
- Keep software updated(Cisa, 2019).
- Back up data(Cisa, 2019).
- Install or enable a firewall(Cisa, 2019).
- Use anti-spyware tools(Cisa, 2019).
- Avoid using public Wi-Fi(Cisa, 2019).
References:
Cisco, 2022. What is Malware? - Definition and Examples. [online] Cisco. Available at: <https://www.cisco.com/c/en/us/products/security/advanced-malware-protection/what-is-malware.html> [Accessed 3 May 2022].
Norton, 2021. [image] Available at: <https://us.norton.com/internetsecurity-malware-types-of-malware.html> [Accessed 3 May 2022].
Stouffer, C., 2021. 10 types of malware + how to prevent malware from the start | Norton. [online] Us.norton.com. Available at: <https://us.norton.com/internetsecurity-malware-types-of-malware.html> [Accessed 3 May 2022].
Cisa, 2019. Protecting Against Malicious Code | CISA. [online] Cisa.gov. Available at: <https://www.cisa.gov/uscert/ncas/tips/ST18-271> [Accessed 3 May 2022].

Comments
Post a Comment