Malware is a type of malicious software which can cause damage to a PC, it can take many forms and can be tricky to avoid but what are the common types of Malware Attacks?
Ransomware – an attack that is designed to infiltrate a users system and encrypt or deny access to critical files until a ransom is paid. This form of attack is of growing concern. Cyber Criminals are offering what is called Ransom as a Service (RaaS) to other cyber criminals as the form of attack increases. One of the most common types of Malware, Ransomware comes in a few forms:
Scareware – is a form of Ransomware that attempts to cause anxiety or panic to an individual or organisation in various ways. A common form is for an attacker to create adverts or pop ups on websites that display messages such as “your computer is infected with a virus, download this software” which prompts the viewer to panic and oblige.
Screen Lockers – Screen Lockers work in a similar way to Scareware, Screen Lockers display a message across a users screen usually displaying a message from a government agency such as the FBI stating that may say something like “illegal activity has been found and to pay a fine”. The main objective of the attack is to cover the users screen until a ransom is paid.
Encrypting Ransomware – this form of attack is particularly difficult to recover from. The users critical files are encrypted and must pay a fine to have the key. Many Ransomware Attackers once acquired the payment do not return the files. Leaving the victim out of pocket and without their critical files.
Viruses – are characterized by a piece of code that is designed to cause damage or disrupt files on a computer. Viruses do not inherently multiply without human interaction. It is considered a type of Malware due to this. There are many forms a virus can take such as: Boot Sector, Direct Action, Resident Virus and many more.
Worms – similar to a Virus with one critical difference, Worms multiply and spread without human interaction. There are many forms of Computer Worms such as: Bot Worms, Instant Messaging Worms and Emails Worms.
Rootkits – a common type of Malware that infects a computer mostly without the users knowledge. A Rootkit Malware Attack seeks the ‘root’ access / administrator privileges. There are many types of Rootkit Malware including: Bootloader, Kernel and Memory.
Cryptomining – occurrences of cryptomining Malware is ever increasing. It is the practice of computer infection with the sole purpose of using the PC to mine bitcoin or other cryptocurrencies. Often computers are infected via a Trojan Horse.
Trojans – A very dangerous form of attack, it portrays itself as something useful to the user. The user convinced of this installs the software, from there the attacker has total control over the PC. There are many types of Trojans including: Backdoor, Banker, Downloader and many more.
Botnet – A Botnet is a combination of the words ‘robot’ and ‘network’ referring to the a Malware campaign run by bots. Once a Botnet has infected the device, it often attempts to multiply. Victims often complain of a PC running slow or unexplained emails being sent from their email address. Botnets are often used for Mass Email Campaigns, DDoS attacks and IoT Attacks.
Fileless – a form of attack that is very difficult to trace and combat. Unlike other forms of Malware, Fileless is not stored on the victims SSD or Hard Drive it exists somewhere within the memory but often not found through traditional Anti-Virus / Anti-malware Software.
Adware – a form of attack that causes adverts to obscure the users screen many experts believe Adware is a form of PUP. Often downloaded with freeware, Adware can be attached and downloaded with useful software without the user aware.
Key logger – referred to as a Malware Attack that tracks and records every key pressed on a key board in attempt to steal sensitive data such as passwords and bank details.
Tecnica offer comprehensive IT Cyber Security that prevents, protects and prepares against both the common types of Malware and the uncommon. With a wealth of over 35 years of experience our Cyber Security experts are the trusted IT Security Partner across Glasgow, Edinburgh, Aberdeen and throughout Scotland. To discover how your organisation could be better protected, contact us today. Or read more at IT Security – Scotland, Fife, Edinburgh, Glasgow, Aberdeen, Perth (tecnica-ltd.co.uk)