Malware attacks

‘Malware’ or malicious software is a term that describes any malicious program or code referring to a variety of forms of hostile, intrusive software which is harmful to systems, because they damage and disable computers with the purpose of stealing important data, including financial information about your business, passwords and so on, as the actors behind this malicious codes intend make money of you illicitly. I t can also delete all your data without your consent and knowledge

Topics covered in this article

10 Types of Malware:

  1. Adware: This type of software shows advertisements of different sorts, such as pop up banners, expandable banner adverts, floating adverts, in text ads etc. in order to generate revenue by the user clicking on the add and accessing a website or initiating another function.
  2. Spyware: Its function is to monitor details of the computer usage and website activity, making this information available without the user knowledge stealing user identification, passwords, financial information and email addresses with the purpose of sending these details across spyware controllers or third parties.
  3. Virus: This is a program or code that can be loaded onto the computer and it’s able to spread from host to host replicating itself when the user runs an infected program, as this makes the virus code to be executed. They can continue to spread form one device to another using the network, file sharing, sending infected email attachments etc.
  4. Worm: It’s a type of malicious software that replicates itself. It can destroy data and files on the computer. They can be transmitted via software weaknesses or can also arrive as attachments in spam emails or instant messages. Also, this program can travel from device to device, however, unlike a virus, they don’t need any human action to travel, as they benefit from travel features on the computer system.
  5. Trojan: It usually has the appearance of having a useful and legitimate function. This Horse must be sent by someone or carried by another program and may arrive in the form of a joke program or software of some sort. This causes damage and compromises the security of the computer.
  6. Rootkit: This is typically malicious and resides in the operating system. This is the hardest of all Malware types to detect and to remove, as this type of malware may even hide from typical antivirus programs and many experts recommend reinstalling everything from scratch. Rootkits can modify the operating system in order to perform malicious activities. It is designed to take full control of the operating system.
  7. Backdoors: It’s a malicious program similar to Trojans and Worms, however, this type of malware is used to provide the hacker with network connection and remote access to a PC system by exploiting security vulnerabilities.
  8. Keyloggers: This program operates in the context of software. It’s designed to record everything you type on your PC spying logins, password or other sensitive information, however, they are not always illegal to install and use as this as a common tool for corporations to monitor suspicious employee information, hackers can be behind them, and they don’t own the device they infect, so this can be used for criminal purposes.
  9. Rogue security software: This program pretends to remove malware infections for a fee, their purpose is to take your money, they will try to convince you to pay the fee to be successful.
  10. Ransomware: This is one of the biggest malicious threats, as this type of software blocks the user’s access to his/her files, usually showing warning that it’s been locked out of the computer, and to fix this issue, attackers demand a ransom to restore access, they usually order that payment to be sent via cryptocurrency or credit card, however paying the ransom doesn’t ensure access will be restored.

How do I get Malicious Software?

Malicious codes commonly infect your device though emails and the internet when you surf on hacked websites and you download infected files, install a new program, click on any files from unknown sources, etc. It can attack your device by email when you open a mal spam.

As a matter of fact, it’s critical that you ensure the website is legitimate. Google is easy browser you can use to check and determine if you are safe, however, if you are not 100% sure, don’t download any file.

How to recognise a malicious website

Spotting a malicious website isn’t always easy, if hackers have done a good job, they would trick the ad networks, however there’s some common signs you can watch for.

  • When you are about login to your bank account, always make sure you are not clicking on a link in an email. The address always will start with “https://”
  • When you browse on the internet, confirm the domain name is right. e.g. Microsoft home page is “www.microsoft.com” not “www.microsoft.mc”
  • A you enter to the website requests you to download a program or to do a survey or it automatically launches a download window. Any of these can be an attack.
  • As you click on the website, it pops out a window saying ‘‘Congratulations, you’ve won the £1000.00 amazon voucher’ or something similar.
  • Video scams are also popular. Make sure you are watching videos from sites like Vimeo or YouTube.

How to recognise if my device has been infected

  • Show popups both online and/or offline.
  • Spam
  • Have programs that do not open
  • Have browser(s) that do not display some or any website at all.
  • Present problems when trying to recognise external hardware.
  • Computer showing a blue screen with the error code.

How to prevent malicious software?

In order to prevent and keep your computers safe it’s critical to conduct software updates as soon as they’re available, this will make your device more secure as software updates can help protect your data by patching security flows, adding new features removing outdated ones or by removing computers bugs.
If you want to keep your organisation safe, it’s necessary to train your employees by inculcating browsing habits and identifying infected websites or emails. Understanding the basis of unsafe webpages doesn’t require to be very technical and it will help to keep your devices safe.

About totality services

totality services was founded in 2008 to provide IT Support to the London’s small & medium businesses with end-to-end IT services, right from purchasing and installing hardware to providing Mac & Windows support, cloud solutions, and data backup. We support our clients using proven, high-quality systems and security practices that blue-chip companies take for granted.

We consistently achieve excellent client satisfaction thanks to a process-driven approach, concise documentation and our team of friendly and highly trained London based engineers.