Beware of Malware! Malware is used to describe any applications or code that can damage or disrupt your device and its functionality. When a device becomes infected with malware, you may encounter compromised data, unauthorized access, or being locked out of your device until you pay a ransom. Cybercriminals, or the people who distribute malware, are motivated by money and will use malware-infected devices to launch attacks to obtain data like banking credentials and personal information that can be sold (such as your SSN), as well as to sell access to computing resources or to coerce payment information from victims.
How Does It Work?
Malware works by using trickery to disable or impede the normal use of a device. Once a cybercriminal has gained access to your device through either one or a few methods such as phishing (Check out our blog on that here), a malicious website, an infected file, and more, they will take advantage of that situation by launching additional attacks aimed at obtaining data such as account credentials, personal information, payment information, and more.
Anyone can become a victim of a malware attack. Although some people may know how to spot certain ways hackers try to deliver malware such as through phishing emails, cybercriminals are constantly evolving and improving their methods, so even the most up-to-date person might miss an attack. Malware attacks also differ greatly, so one type of malware might look and behave completely contrary to what another form of malware might be doing; you might not even know it’s there!
Types of Malware
Malware is constantly changing and evolving, making it difficult to narrow down the different forms of attacks; over time, some malware types have become hybrids of one another, making them even more difficult to identify. However, there are some commonly spotted forms of malware that may help you identify other, more complicated malware types.
Viruses are a type of malware that delivers a piece of malicious code inserted into an application, program, or system. Malware viruses are activated by the victims themselves. These viruses are much like the bodily viruses that humans experience because they require a host (aka, a device) to live. They lie dormant until triggered to attack, perhaps from users downloading an email attachment with the virus attached. Once triggered, the virus replicates and spreads copies of itself from computer to computer, infecting a whole network.
Overall, malware viruses can:
- Seize applications
- Steal data
- Send infected files to contact lists
- Launch ransomware attacks
- Launch DDoS (distributed denial-of-service) attacks
Similar to malware viruses, worm malware can self-replicate, but unlike a virus, it requires no human interaction to do so. Worms also do not require a host device, meaning it does not need to attach itself to a software program to cause damage. Malware worms can be spread through software vulnerabilities, installed by removable media, or attached in emails or direct messages. Once those attachments are opened, they could lead to a malicious website or automatically download the worm malware. One the worm is installed, it silently infects your computer or even your entire network without you knowing.
Overall, malware worms can:
- Delete or modify files
- Steal data
- Infect many computers at once
- Launch DDoS attacks
- Launch ransomware attacks
- Create botnets
- Install backdoors for hackers
Trojan malware is malware disguised as bon-a-fide software, applications, or files to trick the user into downloading it and unknowingly giving hackers access to their computers. Once installed, the trojan malware can perform the action it was designed for, whether it be to damage, disrupt, steal, or inflict some other harm on your computer or network. Trojan malware is normally spread through malicious website downloads, direct messages, or email attachments. Like viruses, trojans require human interaction to be activated. In comparing viruses to trojans, a virus is host-dependent and self replicates, while a trojan does not.
Overall, trojan malware can:
- Delete, modify, or steal data
- Spy on users
- Access networks
- Take remote control of devices
- Launch DD0S attacks
Ransomware is a type of malware that locks the victim’s device or data and demands a ransom to restore access. Ransomware is most commonly downloaded through email attachments or unknown links. Once installed, the ransomware might create a backdoor for a hacker to enter your computer and begin encrypting data or locking you out of your device until you pay a ransom to regain access and/or ownership. More commonly, the ransom is demanded in bitcoin or another form of cryptocurrency.
Overall, ransomware can:
- Hold devices hostage
- Encrypt data to make in inaccessible
- Result in financial loss
Malware Bots or Botnets
Bots are automated programs designed to carry out a task, they can be good (like chatbots or shop bots) or bad (like zombie bots). Malicious bots act as a sort of “spider”, meaning the bot program “crawls” through the internet looking for holes in security infrastructures to attack automatically. A malicious bot is designed to infect a host (device) and steal information. Some simpler malware bots include file-sharing and spam bots. A file-sharing bot takes a query term from a user such as a popular movie or album, and responds to the question stating that they have the movie/album for download, but when the user clicks on the provided link, they are infected with a malicious bot instead. A spam bot will flood your inbox or DMs with unsolicited messages, most commonly from aggressive advertisers. A botnet is created by individual zombie bots, where the bots infect thousands of computers, creating a network that different hackers can “rent out” and use to perform malicious attacks across thousands of computers at once.
Overall, malicious bots and botnets can:
- Record activity such as keystroke and webcam use, as well as taking screenshots
- Send phishing emails from your device
- Give hackers remote control of your device(s)
- Launch DDoS attacks
Adware is an advertising malware that displays unwanted advertisements on your computer and more recently on your phone, most often as a pop-up that tracks your browsing activity to send targeted ads. Some of these adware programs can be used for simple marketing purposes, but things go bad when cybercriminals use adware to collect your data to be sold to third parties online or to use against you to perform credit card fraud or identity theft.
Overall, malware adware can:
- Install spyware
- Share user data with third parties
- Attract users to malicious sites
How To Prevent and Detect Malware
Use Multi-factor Authentication
Multi-factor authentication (MFA) adds an additional layer of security to your accounts by introducing another step in the sign-in process. Most often, this extra step is a one-time code used to verify your identity that is sent to your mobile number that you are prompted to enter before the login process is complete. For more information on MFA and 2FA sign-in processes, check out our blog here.
Avoid Suspicious Emails, Links, and Websites
If you’re unsure of an email, advertisement, attachment, link or other form of media you see online, don’t click on it! It could be a phishing attack used to deliver malware.
Keep Software Up to Date
Keeping your software up to date is very important. Software updates repair security holes that cybercriminals can exploit. You should update your computer or device as soon as you can once a new update comes out, or you can turn on automatic updates to avoid the hassle.
Know the Warning Signs
Being alert and aware of the warning signs of a malware attack can help protect your data and your device. Some warning signs to be aware of are:
- Your computer or device is freezing, sluggish, or crashing
- Emails are being sent without your consent
- Your device suddenly has little or no storage space
- Programs are opening, closing, and modifying themselves
- Your device is flooded with pop-ups or unwanted content
Install Antivirus Software
Antivirus software can help protect your device and data from malware attacks by monitoring and stopping cyber treats before they occur.
Regularly Back Up Files
Backing up your files and information can help prevent data loss in the event of a malware attack (such as a ransomware attack). Having a back up of your data also ensures that in the event of a power outage or computer issues, your information will be secure and saved.
If you suspect that your device has been infected with malware, having a professional IT technician to help is definitely recommended. Malware can be tricky and almost virtually undetectable, so removing it is not an obvious task. Our technicians here at Monmouth Computer Associates are seasoned experts in removing malware and resetting your computer after an attack, and will ensure your device is protected against any further attacks.