+5 votes
57 views
in security by (242k points)
reopened
What is malware?

1 Answer

+3 votes
by (1.6m points)
 
Best answer

What is malware
How do you get malware?
How do you find out if you have malware?
How can you protect yourself from malware?

Malware - you've probably heard of it before. We explain what is so dangerous about it and how you can protect yourself..

image image

Image: <span> deepadesigns / Shutterstock.com </span>

You probably know how people call for the flu vaccination every year. This is because flu outbreaks usually have a specific season - a cold time of year when they are more likely to spread and infect people. In contrast, however, there are no predictable seasonal infections for PCs, smartphones, tablets and corporate networks. It's always flu season for them. However, instead of suffering from the chills and body aches and pains, users can get sick with some type of machine malfunction - malware.

What is malware

Malware, an abbreviated combination of the words "malicious" and "software", is a collective term for any type of software that was developed with malicious intent. Sometimes referred to as badware, malware is often used interchangeably with many of the common types of malware listed below.

Malicious intent often involves stealing your private information or creating a back door to your computer that allows someone to access it, its resources, and its data without your permission. Although malware cannot damage the physical hardware of systems or network devices, it can steal, encrypt, or delete your data, modify or hijack core computer functions, and spy on your computer activity without your knowledge or permission..

Different types of malware are:

  • Adware : Aggressive advertising software, while not always malicious, can compromise your security in order to serve ads. This can make it easy for other malware to get started. How to remove adware from your PC, read here.
  • Spyware : Spyware is malware that secretly monitors the activities of the computer user without his permission and transmits it to the author of the software.
  • Virus : A computer virus is malware that attaches itself to another program and, when executed, replicates itself - usually accidentally by the user - by modifying other computer programs and infecting them with their own bits of code.
  • Worm : Computer worms are a type of malware that resembles viruses and replicates itself to spread to other computers over a network. They usually do damage by destroying data and files.
  • Trojans : A trojan is one of the most dangerous types of malware. As soon as a Trojan is on your system, the attackers behind the Trojan gain unauthorized access to the affected computer. From there, they can be used to steal financial information or install viruses. Some Trojans are also ransomware, for example Trojan: W32 / Ransom.
  • Ransomware : Ransomware is a form of malware that locks you out of your device and encrypts your data. The aim is to force you to pay a ransom. The code behind ransomware is easy to get from online criminal marketplaces, and it is very difficult to defend yourself against it. Here you can read how you can still protect yourself from Trojan horse ransomware and how to remove ransomware.
  • Rootkit : Rootkit is a form of malware that grants the attacker administrator rights to the infected system. Mostly this is designed in such a way that it remains completely hidden from the system.
  • Keylogger : A keylogger is malware that records all of the user's keystrokes on the keyboard. Typically, the information collected is saved and sent to the attacker who is looking for sensitive information such as usernames, passwords and credit card details.
  • Cryptojacking : Malicious cryptomining, sometimes called drive-by mining, is an increasingly widespread malware that usually installs Trojans. This allows someone else to use your computer to mine cryptocurrency. Basically, a malicious cryptominer is stealing your computer resources to make money.
  • Exploit : Exploits are a type of malware that takes advantage of errors and weaknesses in a system so that the creator can take control. Among other things, exploits are linked to advertising that attacks legitimate websites that unknowingly pull harmful content from a malfunctioning website. The faulty content then tries to install itself on your computer in a drive-by download. It is not necessary to click on it.
  • Bot : Bots are software programs that are created to perform certain operations automatically. While some bots are created for relatively harmless purposes (video games, internet auctions, online competitions, etc.), it is becoming increasingly common for bots to be used maliciously. These can be used in botnets (collections of computers that are to be controlled by third parties) for DDoS attacks, as spam bots that display advertisements on websites, as web spiders that collect server data, and for the distribution of camouflaged malware on download sites. Sites are used. Websites can protect themselves from bots with CAPTCHA tests that verify users as humans.
  • Fileless Malware : Fileless Malware does not initially install anything, but instead makes changes to files that are specific to the operating system, e.g. B. PowerShell or WMI. Since the operating system recognizes the processed files as legitimate, an attack without files will not be intercepted by antivirus software - and since these attacks are stealth, they are up to ten times more successful than traditional malware attacks.
  • Backdoor : Backdoors are a covert method of bypassing normal authentication or encryption on a computer, product, embedded device (e.g. router), or other part of the computer. They are often used to secure remote access to a computer or to gain access to encrypted files.
  • Rogueware : Rogueware deceives users into thinking that they have a security problem on their system, such as a virus, and induces them to pay to have the threat removed. In reality, however, the fake security software is the malware that needs to be removed.
  • RAM scraper : A RAM scraper is a type of malware that temporarily gathers data stored in memory or RAM. This type of malware often targets point of sale (POS) systems like cash registers because they can store unencrypted credit card numbers for a short period of time before being encrypted and then passed on to the back end.
  • Grayware : The term grayware describes unwanted applications or files that are not malware but can degrade computer performance and create a cybersecurity risk. In the best case, grayware behaves in a disruptive or undesirable way, in the worst case it monitors the system and transmits sensitive information to the creator.

How do you get malware?

The two most common ways that malware accesses your system are through the Internet and email. So basically whenever you are online. Malware can infiltrate your computer by browsing hacked websites, clicking game demos, downloading infected music files, installing software from an untrusted source, or opening a malicious email attachment. So pretty much anything you download from the internet on a device that lacks a high quality anti-malware security application.

Malicious apps can hide in what appear to be legitimate applications, especially when downloaded from websites rather than a secure app store. Here it is important to heed the warning messages when installing applications, especially if they require permission to access your e-mail address or other personal information..

However, malware attacks don't work without the most important ingredient: you. Of course, an attack only works if an unknown email attachment is opened or something is installed from an untrustworthy source. Don't be ashamed if you've fallen for this - malware is tricky and often undetectable.

Even if you install something from a credible source, you may be able to install software you don't want if you don't heed permission to install other software packages at the same time. This additional software, also known as a potentially unwanted program (PUP), is often presented as a necessary component, but often is not.

How do you find out if you have malware?

Certain types of malware are easier to spot than others. Some, like ransomware and adware, make their presence known instantly by either encrypting your files or by unleashing endless advertisements at you. Others, like Trojans and spyware, will do whatever they can to hide from you for as long as possible. This means they may have been on your system long before you even notice them. And then there is malware like viruses and worms that may work in secret for a while before the symptoms of their infection appear, e.g. B. freezing, deleting or replacing files, sudden shutdown or a hyperactive processor.

The only way to detect malware before it infects your computer is to install anti-malware software, which comes with detection tools and scans, that can intercept malware on your device and block malware from running.

How can you protect yourself from malware?

Windows Defender, which is included with Windows 10, already provides adequate protection against malware for most standard users. Of course, there are other ways to protect your devices:

  • Virus protection for your Windows PC
  • Viruses: How to Protect Your Mac
  • Virus scanner for Android - do I need it?
  • Do I need a virus scanner on the iPhone?
  • Virus protection: antivirus programs in comparison

Also, stay vigilant. Avoid clicking pop-up ads while browsing the internet. Also, avoid opening unwanted email attachments or downloading software from untrusted websites or peer-to-peer file transfer networks. Also, make sure your operating system, browser and plugins are always up to date. Often times, updating your software can keep online criminals at bay.

As a mobile user, only download apps from the Google Play Store or App Store. Check the ratings and reviews every time you download an app. A low rating and low number of downloads are an indicator of better avoiding this app. Also, don't click on weird unverified links in emails, texts, and WhatsApp messages of unknown origin. Weird links from friends and contacts should also be ignored - unless you've checked security. You can do this by entering this link http://google.com/safebrowsing/diagnostic?site= followed by the link to be checked in your browser. Google Safe Browsing then checks the link for malware.

image

...