Malware explained: How to prevent, detect and recover from it 


What are the types of malware? How can you prevent, detect, or remove it? We've got answers.




Malware definition


Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.

                                     

                                       OR


Malware, short for malicious software, is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. As Microsoft puts it, "[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network." In other words, software is identified as malware based on its intended use, rather than a particular technique or technology used to build it.


This means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of malware is a virus).


Why do cybercriminals use malware?

 


Malware encompasses all types of malicious software, including viruses, and cybercriminals use it for many reasons, such as:


  • Tricking a victim into providing personal data for identity theft
  • Stealing consumer credit card data or other financial data
  • Assuming control of multiple computers to launch denial-of-service attacks against other networks
  • Infecting computers and using them to mine bitcoin or other cryptocurrencies


                                                 Types of malware



There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. You've probably heard the words virus, trojan, and worm used interchangeably, but as Symantec explains, they describe three subtly different ways malware can infect target computers:


A worm is a standalone piece of malicious software that reproduces itself and spreads from computer to computer.


A virus is a piece of computer code that inserts itself within the code of another standalone program, then forces that program to take malicious action and spread itself.


A trojan is a program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage and spread.



Malware can also be installed on a computer "manually" by the attackers themselves, either by gaining physical access to the computer or using privilege escalation to gain remote administrator access. 


Another way to categorize malware is by what it does once it has successfully infected its victim's computers. There are a wide range of potential attack techniques used by malware


Viruses


A virus usually comes as an attachment in an email that holds a virus payload, or the part of the malware that performs the malicious action. Once the victim opens the file, the device is infected.


Ransomware


One of the most profitable, and therefore one of the most popular, types of malware amongst cybercriminals is ransomware. This malware installs itself onto a victim’s machine, encrypts their files, and then turns around and demands a ransom (usually in Bitcoin) to return that data to the user.


Scareware


Cybercriminals scare us into thinking that our computers or smartphones have become infected to convince victims to purchase a fake application. In a typical scareware scam, you might see an alarming message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!” Cybercriminals use these programs and unethical advertising practices to frighten users into purchasing rogue applications.


Spyware


Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details to its user. Spyware enables its users to monitor all forms of communications on the targeted device. Spyware is often used by law enforcement, government agencies and information security organizations to test and monitor communications in a sensitive environment or in an investigation. But spyware is also available to consumers, allowing purchasers to spy on their spouse, children and employees.


How do I know I’ve been infected with malware?

 


  • The most common signs that your computer has been compromised by malware are:

  • Slow computer performance

  • Browser redirects, or when your web browser takes you to sites you did not intend to visit 

  • Infection warnings, frequently accompanied by solicitations to buy something to fix them

  • Problems shutting down or starting up your computer

  • Frequent pop-up ads


The more of these common symptoms you see, the higher the likelihood your computer has a malware infection. Browser redirects and large numbers of pop-up warnings claiming you have a virus are the strongest indicators that your computer has been compromised.


How can I protect myself from malware?




Even though there are a lot of types of malware out there, the good news is, there are just as many ways to protect yourself from malware. Check out these top tips: 


Protect your devices


Keep your operating system and applications updated. Cybercriminals look for vulnerabilities in old or outdated software, so make sure you install updates as soon as they become available.


Never click on a link in a popup. Simply close the message by clicking on “X” in the upper corner and navigate away from the site that generated it.


Limit the number of apps on your devices. Only install apps you think you need and will use regularly. And if you no longer use an app, uninstall it. 


Use a mobile security solution like McAfee® Mobile Security, available for Android and iOS. As malware and adware campaigns continue to infect mobile applications, make sure your mobile devices are prepared for any threat coming their way.


Don’t lend out your phone or leave your devices unattended for any reason, and be sure to check their settings and apps. If your default settings have changed, or a new app has mysteriously appeared, it might be a sign that spyware has been installed.


If you don’t already have comprehensive security protection on all your devices, then try out McAfee® Total Protection, which protects all your PCs, Macs, tablets and smartphones from online threats while safeguarding your data and identity.

Be careful online


Avoid clicking on unknown links. Whether it comes via email, a social networking site or a text message, if a link seems unfamiliar, keep away from it. 


Be selective about which sites you visit. Do your best to only use known and trusted sites, as well as using a safe search plug-in like McAfee® WebAdvisor, to avoid any sites that may be malicious without your knowing. 


Beware of emails requesting personal information. If an email appears to come from your bank and instructs you to click a link and reset your password or access your account, don't click it. Go directly to your online banking site and log in there.


Avoid risky websites, such as those offering free screensavers.


Pay attention to downloads and other software purchases


Only purchase security software from a reputable company via their official website or in a retail store.


Stick to official app stores. While spyware can be found on official app stores, they thrive on obscure third-party stores promoting unofficial apps. By downloading apps for jailbroken or rooted devices, you bypass built-in security and essentially place your device’s data into the hands of a stranger.


When looking for your next favorite app, make sure you only download something that checks out. Read app reviews, utilize only official app stores, and if something comes off as remotely fishy, steer clear.


Do not open an email attachment unless you know what it is, even if it came from a friend or someone you know.


Perform regular checks


If you are concerned that your device may be infected, run a scan using the security software you have installed on your device.


Check your bank accounts and credit reports regularly.


 


With these tips and some reliable security software, you’ll be well on your way to protecting your data and devices from all kinds of malware. 


Post a Comment

Previous Post Next Post