• Home
  • News
  • Contact us
  • Support
Tecnica LtdTecnica LtdTecnica LtdTecnica Ltd
  • Managed IT Services
    • IT Support
    • Helpdesk
    • System Monitoring
    • Device Management
    • IT Administration
    • IT Strategy
  • Solutions
    • Virtualization
    • Storage Solutions
    • Remote Access
    • VoIP Phone Systems
    • Upgrades and Migration
    • Networking
  • Cloud Services
    • Public Cloud
    • Private Cloud
    • Hybrid Cloud
    • Disaster Recovery & Business Continuity (DRBC)
  • IT Security
    • Cyber Security
      • Cyber Essentials
    • Network Security
    • Endpoint Security
    • Email/Web Filtering
  • Professional Services
    • IT Consultancy
    • Design and Implementation
    • Web and App Development
    • SharePoint Development
    • Microsoft Solutions
  • About Us
    • Contact Us
    • Our Partners
    • Careers
    • Privacy Policy

What are the common types of Malware

    Home Blog Cyber Security What are the common types of Malware
    NextPrevious

    What are the common types of Malware

    By Tecnica | Cyber Security | 0 comment | 26 October, 2022 | 0

    Malware is a type of malicious software which can cause damage to a PC, it can take many forms and can be tricky to avoid but what are the common types of Malware Attacks?

    What are the common types of Malware? Tecnica, Dunfermline, Glasgow, Edinburgh, Fife, Dundee, Aberdeen, Inverness, Perth

    Ransomware – an attack that is designed to infiltrate a users system and encrypt or deny access to critical files until a ransom is paid. This form of attack is of growing concern. Cyber Criminals are offering what is called Ransom as a Service (RaaS) to other cyber criminals as the form of attack increases. One of the most common types of Malware, Ransomware comes in a few forms:

    Scareware – is a form of Ransomware that attempts to cause anxiety or panic to an individual or organisation in various ways. A common form is for an attacker to create adverts or pop ups on websites that display messages such as “your computer is infected with a virus, download this software” which prompts the viewer to panic and oblige.

    Screen Lockers – Screen Lockers work in a similar way to Scareware, Screen Lockers display a message across a users screen usually displaying a message from a government agency such as the FBI stating that may say something like “illegal activity has been found and to pay a fine”. The main objective of the attack is to cover the users screen until a ransom is paid.

    Encrypting Ransomware – this form of attack is particularly difficult to recover from. The users critical files are encrypted and must pay a fine to have the key. Many Ransomware Attackers once acquired the payment do not return the files. Leaving the victim out of pocket and without their critical files.

    Viruses – are characterized by a piece of code that is designed to cause damage or disrupt files on a computer. Viruses do not inherently multiply without human interaction. It is considered a type of Malware due to this. There are many forms a virus can take such as: Boot Sector, Direct Action, Resident Virus and many more.

    Worms – similar to a Virus with one critical difference, Worms multiply and spread without human interaction. There are many forms of Computer Worms such as: Bot Worms, Instant Messaging Worms and Emails Worms.

    Rootkits – a common type of Malware that infects a computer mostly without the users knowledge. A Rootkit Malware Attack seeks the ‘root’ access / administrator privileges. There are many types of Rootkit Malware including: Bootloader, Kernel and Memory.

    Cryptomining – occurrences of cryptomining Malware is ever increasing. It is the practice of computer infection with the sole purpose of using the PC to mine bitcoin or other cryptocurrencies. Often computers are infected via a Trojan Horse.

    Trojans – A very dangerous form of attack, it portrays itself as something useful to the user. The user convinced of this installs the software, from there the attacker has total control over the PC. There are many types of Trojans including: Backdoor, Banker, Downloader and many more.

    Botnet – A Botnet is a combination of the words ‘robot’ and ‘network’ referring to the a Malware campaign run by bots. Once a Botnet has infected the device, it often attempts to multiply. Victims often complain of a PC running slow or unexplained emails being sent from their email address. Botnets are often used for Mass Email Campaigns, DDoS attacks and IoT Attacks.

    Fileless – a form of attack that is very difficult to trace and combat. Unlike other forms of Malware, Fileless is not stored on the victims SSD or Hard Drive it exists somewhere within the memory but often not found through traditional Anti-Virus / Anti-malware Software.

    Adware – a form of attack that causes adverts to obscure the users screen many experts believe Adware is a form of PUP. Often downloaded with freeware, Adware can be attached and downloaded with useful software without the user aware.

    Key logger – referred to as a Malware Attack that tracks and records every key pressed on a key board in attempt to steal sensitive data such as passwords and bank details.

    Tecnica offer comprehensive IT Cyber Security that prevents, protects and prepares against both the common types of Malware and the uncommon. With a wealth of over 35 years of experience our Cyber Security experts are the trusted IT Security Partner across Glasgow, Edinburgh, Aberdeen and throughout Scotland. To discover how your organisation could be better protected, contact up today. Or read more at IT Security – Scotland, Fife, Edinburgh, Glasgow, Aberdeen, Perth (tecnica-ltd.co.uk)

    IT Security Aberdeen, IT Security Edinburgh, IT Security Glasgow, Top Articles - November 2022

    Leave a Comment

    Cancel reply

    Your email address will not be published. Required fields are marked *

    NextPrevious

    Useful Links

      • Contact Us
      • News
      • Support
      • GDPR

     

    Services

    • Managed Services
    • Solutions
    • Cloud Services
    • IT Security
    • Professional Services

    News

    • Cyber-attacks hitting small to medium businesses
    • Don’t fall short to the Digital Skills Gap
    • Comprehensive Expert IT Security
    • Partner with Tecnica IT Professionals – we have the answer, why not ask?

    Recent Tweets

    Contact Us

    Head Office
    5 Castle Court, Carnegie Campus,
    Dunfermline, Fife,
    KY11 8PB,
    Registered in Scotland SC250307

    Phone Number
    01383 722757

    Email Adress
    enquiries@tecnica-ltd.co.uk

    Living Wage Employer
    Copyright 2023 Tecnica Ltd | All Rights Reserved
    • Home
    • Managed IT Services
      • IT Support
      • Helpdesk
      • System Monitoring
      • Device Management
        • Microsoft Intune
      • IT Administration
      • IT Strategy
    • Solutions
      • Virtualization
      • Storage Solutions
      • Remote Access
      • VoIP Phone Systems
      • Upgrades and Migration
      • Networking
        • Discover the benefits of SD-WAN
    • Cloud Services
      • Public Cloud
      • Private Cloud
      • Hybrid Cloud
        • Environmental benefits of cloud technology
      • Disaster Recovery & Business Continuity (DRBC)
    • IT Security
      • Cyber Security
        • Cyber Essentials
      • Network Security
      • Endpoint Security
      • Email/Web Filtering
    • Professional Services
      • IT Consultancy
      • Design and Implementation
      • Web and App Development
      • SharePoint Development
      • Digital Marketing
    • About Us
      • Contact Us
      • Our Partners
        • Microsoft Solutions
      • Privacy Policy
      • Careers
    • News
    Tecnica Ltd