Cybersecurity — P5: Malware

Know the enemy within

Malware is a type of malicious software that can infect your computer and infiltrate all of your data. It’s often used to steal personal information or spread other types of malware. The best way to protect yourself from malware is to keep up-to-date with security patches and always use antivirus software on your device.

It’s estimated that the total cost of malware related cybercrime is at $6 trillion. Yes, trillion with a T. Read More.

What is Malware?

Malware is a type of software that can be used to damage or disable computers and computer systems. Malware can be used by hackers to steal your personal information, or it can be used by criminals to steal your money.

Malware (short for “malicious code”) has been around since the 1980s, but it wasn’t until recently that people started using the term ‘malware’ in reference to this type of malicious code. Before then, malware was often just called viruses or worms — but those terms didn’t really encompass all that much information about what they actually were.

How does malware get into my computer?

Malware can be downloaded from the Internet, installed by a hacker and/or virus, or even installed by a worm.

A malicious program may be installed on your computer without your knowledge through means such as phishing scams where someone sends you an email asking for bank account information in order to verify their identity with, for example, PayPal.

What kinds of malware are there?

Malware is a broad term that can refer to any type of software that can do damage.

Ransomware

An attacker encrypts files on your computer by using malware, then demands payment from you in exchange for unlocking them. This is how it used to be. Now, and increasingly more frequently, the attacker actually takes the data off of your computer and if no payment is received, threatens to release or delete your information. If you know how to write code, writing ransomware is surprisingly easy, and effective, so it’s used quite frequently.

Viruses

An application that replicates itself on your computer. Think of the way that a regular human virus works. It needs a host to replicate. Viruses then spread automatically from computer to computer and try to infiltrate as many devices as possible. They primarily corrupt files and are easily detected for that reason by antivirus programs.

Spyware

Malicious software that gathers data from your device. Once on your computer, it can communicate your data back to the hacker. Spyware can manipulate your search results and direct you to malicious websites, that can in turn download other forms of malware.

Keyloggers

A type of malware that logs your, you guessed it, keystrokes. It doesn’t necessarily just have to log your keystrokes. It can take screenshots of your device, record your mouse clicks, you name it. The data is packaged up into a log file and sent off to the cyber criminal.

Trojans

Malicious code hidden inside an otherwise benign file or program. The malicious code can execute any code that the attacker wants. Trojans can give backdoors to the device, record keystrokes through the use of key-loggers, install ransomware, etc.

Adware

Ads placed on websites, often in exchange for money. You might have seen it before. You see a pop-up and can’t close it, or when you close it another one pops up. You’re most likely infected with adware. Adware can even hijack your browser and redirect you to malicious websites that can then download other malware.

Worms

A worm is a type of virus that can self-replicate. It doesn’t need you to do anything and can quickly spread through the network.

Malvertising

Malware can be downloaded from websites that host it; this is called “malvertising”. For example, if you’re browsing the web and click on an ad that appears on another website, it could contain malware that infects your machine when it loads in the background. You could just be looking at the site in order to be infected.

How to protect yourself from malware?

You can protect yourself from malware by:

  • Making sure that your computer is up to date as well as your browser. Cyber criminals will use exploits to install malware on your devices. You don’t want to fall victim to a ransomware attack.
  • Using an antivirus/anti-malware program with real-time protection mode enabled, meaning that it scans files before they are downloaded.
  • Use a firewall. Sometimes easier said that done, especially for home use.
  • Don’t click on suspicious links within emails.
  • If your company offers it, make sure to complete your Security Awareness Training. This will teach you what to look out for, such as making sure to hover over links to see the underlying URL.

Threat to Your Computer and Data

Malware is a threat to your computer, and can be introduced through email attachments or files on websites. It can also be downloaded by visiting sites where you’re likely to get infected with malware.

Malware will try to gain access to your system through any means possible. In order for malware to do this successfully, it needs three things:

  • A way into your machine
  • The ability acquire information about you
  • The ability execute whatever function(s) are desired

Conclusion

Malware is a threat to your computer and your data. Be aware of how it can get into your machine. Whenever you download something from the internet, always check for malware. Stay safe.

 Cybersecurity Series

Continue your Cybersecurity Learning.

Cybersecurity — P4: Phishing

Don’t take the bait—spot phishing fast.

Cybersecurity — P4: Phishing

Part four of our cybersecurity foundations series dives into phishing—the social-engineering scam that lures users into surrendering credentials, cash, or malware. Explore common bait tactics, real inbox examples, and layered defenses that keep your team off the hook.

Cybersecurity — P5: Malware

Know the enemy within

Cybersecurity — P5: Malware

Part five of our cybersecurity foundations series unpacks malware—viruses, worms, ransomware, and spyware—and how they invade systems. Learn infection vectors, real incidents, and defense layers to block, detect, and recover.

Cybersecurity — P6: Cross Site Scripting (XSS)

Stop script injections cold

Cybersecurity — P6: Cross Site Scripting (XSS)

Part six of our cybersecurity foundations series exposes Cross-Site Scripting (XSS), where attackers inject malicious scripts that hijack sessions, deface pages, and steal data. Explore reflected, stored, and DOM XSS—and the sanitization, encoding, and CSP defenses that shut them down.

Leave a Reply