Cybersecurity|| What is Malware?|| Types of Malware in cyber security|| LearnTopicWise

What is Malware?

Malware- Malware is intrusive software that is designed to damage and destroy computers and computer systems. Malware is a contraction for “malicious software.” The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.

Examples of common malware include viruses, worms, Trojan horses, spyware, adware, and ransomware.

  • Key point- "Short for Malicious Software, malware is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. Below are a few common types of malware."

Types of Malware in cybersecurity-

In cybersecurity, there are various types of malware are present- 

1. Virus - A virus is a malicious executable code that is attached to other executable files, often legitimate programs. Most viruses require end-user activation and can activate at a specific time or date. Viruses can be harmless and simply display a picture or they can be destructive, such as those that modify or delete data. Viruses can also be programmed to mutate to avoid detection. Most viruses are now spread by USB drives, optical disks, network shares, or email.

2. Worms- Worms are malicious code that replicates themselves by independently exploiting vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms can run by themselves. Other than the initial infection, they no longer require user participation. After a host is infected, the worm is able to spread very quickly over the network. Worms share similar patterns. They all have an enabling vulnerability, a way to propagate themselves, and they all contain a payload.

3. Trojan horse - A Trojan horse is malware that carries out malicious operations under the guise of the desired operation. This malicious code exploits the privileges of the user that runs it. Often, Trojans are found in image files, audio files, or games. A Trojan horse differs from a virus because it binds itself to non-executable files.

4. Spyware – This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings. Spyware often bundles itself with legitimate software or with Trojan horses.

5. Adware – Advertising-supported software is designed to automatically deliver advertisements. Adware is often installed with some versions of the software. Some adware is designed to only deliver advertisements but it is also common for adware to come with spyware

6. Ransomware – This malware is designed to hold a computer system or the data it contains captive until payment is made. Ransomware usually works by encrypting data in the computer with a key unknown to the user. Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware is spread by a downloaded file or some software vulnerability.

7. Bot – A bot is a malware designed to automatically perform the action, usually online. While most bots are harmless, one increasing use of malicious bots is botnets. Several computers are infected with bots that are programmed to quietly wait for commands provided by the attacker.

8. Scareware – This is a type of malware designed to persuade the user to take a specific action based on fear. Scareware forges pop-up windows that resemble operating system dialogue windows. These windows convey forged messages stating the system is at risk or needs the execution of a specific program to return to normal operation. In reality, no problems were assessed or detected and if the user agrees and clears the mentioned program to execute, his or her system will be infected with malware.

9. Rootkit – This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a computer infected by a rootkit must be wiped and reinstalled.

10. Man-In-The-Middle (MitM) – MitM allows the attacker to take control of a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination. MitM attacks are widely used to steal financial information. Many malware and techniques exist to provide attackers with MitM capabilities.

11. Man-In-The-Mobile (MitMo) – A variation of man-in-middle, MitMo is a type of attack used to take control over a mobile device. When infected, the mobile device can be instructed to exfiltrate user-sensitive information and send it to the attackers. Zeus, an example of an exploit with MitMo capabilities, allows attackers quietly to capture 2-step verification SMS messages sent to users.


Symptoms of Malware in computer-

There are some symptoms, which can help to identified malware attack-

  • There is an increase in CPU usage.
  • There is a decrease in computer speed.
  • The computer freezes or crashes often.
  • There is a decrease in Web browsing speed.
  • There are unexplainable problems with network connections.
  • Files are modified.
  • Files are deleted.
  • There is a presence of unknown files, programs, or desktop icons.
  • There are unknown processes running.
  • Programs are turning off or reconfiguring themselves.
  • Email is being sent without the user’s knowledge or consent.



<<<Previous                                                                                                                                Next>>>


Others Topics-

Comments

Popular posts from this blog

Cybersecurity|| Protect Your Computing Devices From Viruses, Hackers, Spies|| LearnTopicWise

Cybersecurity|| How to crack Wifi password?|| Techniques of cracking WiFi password|| LearnTopicWise

Stopping By Woods On A Snowy Evening- Robert Frost || Lesson- 9 Poetry || Class- 12 English || UP-BOARD || LearnTopicWise

Cybersecurity|| What is meant by your data?|| Explain different types of data|| LearnTopicWise