Menu
  • IT Audits
    • IT Insurance Program
  • Managed IT Services
    • Request an IT Audit
    • Service Plans
  • CyberSecurity
    • Security Risk Assessment Services
    • Risk Assessment
    • Cybersecurity for Celebrities
    • WordPress Hardening
      • WordPress Security Protection Plans
  • IT Pros
    • IT Recruiter
  • Articles
  • About
    • Why us
  • Contact
  • en English
    en Englishfr Frenches Spanish
ParadoxWeb
Types of Malware

9 Types of Malware and How to Recognize Them!

Posted on January 3, 2020January 3, 2020

Understand malware classifications because understanding how they spread is vital to their containment and removal.

1. Viruses

A computer virus modifies executable files. When a victim executes a file, the virus is also executed. They are uncommon today and represent no more than 10% of all malware. Viruses are the only type of malware that infects files, making them especially hard to clean because they must be executed from a legitimate program. Antivirus programs will simply quarantine or delete the infected file.

2. Worms

Malicious worms often arrive as message attachments so if one person opens an infected email, the entire company could be infected in short order.

Worms are self-replicating. Take the case of the infamous Iloveyou worm: When it was launched, it hit nearly all email user in the world, overloading phone systems and brought down television networks.

What makes worms so devastating are their ability to spread without end-user action. They exploit files or programs to do the dirty work for them. The SQL Slammer worm used a vulnerability in Microsoft SQL to incur buffer overflows on every unpatched SQL server connected to the internet in about 10 minutes. That’s a speed record that still stands today.

3. Trojans

Hackers have replaced worms with Trojan horses. They masquerade as legitimate programs but contain malicious instructions.

A Trojan must be executed by its victim in order to work. It usually comes in the form of an email or is inadvertently downloaded by a user while visiting an infected website. The most popular Trojan is the fake antivirus program which pops up claiming you’re infected. It then instructs you to run a program to clean your PC, allowing it to take root.

Trojans are hard to defend against and spread by tricking end-users, which makes patches, firewalls and other traditional defenses ineffective.

4. Hybrids or Stealth

Malware is now mostly a combination of malicious programs. It can include parts of Trojans, worms and viruses. In some cases, the malware program appears to the end-user as a Trojan, but once executed, it infects others over a network like a worm.

Malware programs are now considered rootkits or stealth. Malware tries to modify the operating system and take control while hiding from antimalware software.

Bots are a combination of Trojans and worms attempting to make exploited clients a part of a larger network. Bots have control servers that clients check into to receive instructions. Botnets range from a few thousand computers to huge networks with hundreds of thousands of systems.

5. Ransomware

Its a Malware program that encrypts your data and asks for cryptocurrency in exchange of the decryption key. Ransomware has crippled companies, hospitals, police departments, governments and even entire cities.

Ransomware programs are mostly Trojans. Once executed, it looks for and encrypts user files within minutes.

About a quarter of victims pay the ransom and around 30% do not even get their files decrypted. The only way to protect yourself is with offline backups of all critical files.

6. Fileless malware

Fileless malware comprises over 50% of malware attacks today. Its malware that does not use files or the file system. It spreads in memory or uses registry keys, APIs or scheduled tasks.

Fileless attacks exploits an existing program, becomes a sub-process or uses Microsoft’s PowerShell. This attack is harder to detect and stop.

7. Adware

Adware exposes the compromised end-user to unwanted malicious advertising. A common adware program might redirect a user’s browser searches to look-alike web pages that contain other product promotions.

8. Malvertising

Malvertising is the use of legitimate ad networks to deliver malware to unsuspecting users. Criminals pay to place an ad on a legit website. When a user clicks on the ad, code redirects them to a malicious website and installs malware on their computer. The malware embedded in an ad can execute itself automatically without any action from the user.

Criminals use malvertising to make money. It can deliver any type of money-making malware such as ransomware or crypto mining scripts.

9. Spyware

Spyware is often used by parents to keep an eye on their children. But criminals also use spyware to log the keystrokes of victims and steal their passwords.

Malware removal

Finding and removing malware components is a complicated task. It’s easy to miss a component or delete vital ones accidentally. Furthermore, you won’t know if the malware has modified the system and made it totally untrustworthy.

To get it done right, you should call on Audit Solutions. Our well-trained professionals are experts in malware removal. Contact us today.

ParadoxWeb
IT Audits & CyberSecurity

Head Office:
Valletta, Malta.
European Union

Please follow & like us

RSS
Facebook
Facebook
fb-share-icon
Twitter
Visit Us
Follow Me
Tweet
Share

Recent Articles

  • TrickBot is a nasty, nasty, nasty piece of malware!
  • L’importance de la documentation dans votre environnement informatique
  • Dark Web et Criminalité
  • AccountGuard
  • Do not let your Kids use your work computer at home!
©2020 ParadoxWeb
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Non-necessary

Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.

en English
en Englishfr Frenches Spanish