What is malware?
‘Malware’ or malicious software is a term that describes any program designed using a variety of hostile, intrusive code aiming to harm or disrupt systems. Often, malware is made to disable or take control over the victim’s system. This allows hackers to steal and sell on your sensitive data for a high price. Installed malware can also delete all your data without your consent and lock your system in exchange for a ransom (ransomware).
For businesses, malware attacks can be devastating as hackers may target not only business data, but stored customer information. This can lead to major privacy infringements and hefty fines, compromising your reputation, as well as your IT systems.
In the UK, unauthorised access to or modification of data without permission is illegal under the Computer Misuse Act. Installing malware onto someone’s device is then just one of many examples of a cybercrime which can incur several years imprisonment.
Topics covered in this article
- 10 types of malware
- How does malicious software appear?
- How to recognise a malicious website
- How to recognise if my device has been infected
- How to protect against malicious software
10 types of malware
Adware
This type of malicious software appears as unwanted online advertisements. This could be in the form of persistent pop-up banners, expandable banner adverts, floating adverts, or in text ads. Typically, adware seeks to collect your data and sell it on to third parties to inject more targeted ads onto your device.
Often, adware can expose your device to more malicious forms of malware and viruses without your knowledge. If you click on adware, it can redirect you to infected sites, steal sensitive data, and even render your device non-functional. For your business, adware can mean long-term monitoring and sharing of your data without consent, in addition to data leaks and fines.
Spyware
Spyware, if downloaded, will monitor the details of your device usage and website activity. This type of malware makes any information available without the victim’s knowledge. Hackers may target passwords, financial information and email addresses to send to other spyware controllers or third parties.
Malicious actors may search for and exploit your business’ intellectual property and monitor confidential conversations hosted on online platforms. There is also the risk of a decline in employee productivity, as spyware can drain your bandwidth and resources.
Worm
A worm is a self-replicating malicious software which aims to modify and destroy data on your computer. Often worms can simply overload your IT system by taking up mass amounts of space and bandwidth. They can be transmitted via software weaknesses or can also arrive as attachments in spam emails or instant messages.
Worryingly, this kind of malware can travel from device to device. However, unlike a virus, worms don’t need any human action to travel, as they benefit from travel features on the computer system. Worms can therefore cause widespread damage to your business-critical systems, eradicating important files and crashing work devices. If you do not have a data backup system in place, the impact of worms can be irreversible.
Trojan
A trojan disguises itself as a legitimate program or attachment, which instead houses malicious code. There are a range of possible trojans functions, from taking control over your device to simply stealing sensitive data.
Common trojans aim to steal financial information, enabling hackers to commit fraudulent transactions and steal funds. As a result, your business may face legal and regulatory consequences, especially if customer data is stolen and exploited.
Rootkit
Rootkits are an extremely malicious type of malware which gain access to and reside in your operating system. They are designed to take full control of your operating system, allowing hackers to manipulate or modify any file, and prove difficult to remove.
Many experts recognise rootkits as one of the hardest malwares to detect as they can hide from common antivirus programs. Even after an initial incident, rootkits may also cause long-term security vulnerabilities to your system. So, if your business experiences a rootkit, your IT team may recommend reinstalling everything from scratch.
Backdoors
Backdoors are a hidden route of bypassing normal authentication in your network. Often, backdoors exist as a legitimate way of allowing IT administrators or teams remote access to your system. However, malicious actors may create their own backdoors to exploit your network connection and gain remote access to your infrastructure.
Like trojans and worms, backdoors enable unauthorised access to your business-critical systems. They can lead to significant operational disruption, loss of data and further malware downloads, meaning hackers may return to further exploit your system.
Keyloggers
Keyloggers are a type of surveillance software designed to record everything you type on your computer. The hacker can spy on your movements and steal logins, passwords or other sensitive information. But unlike other malicious software, hackers don’t own or take control the device they infect, instead using keyloggers to feed through sensitive information.
Surprisingly, the use of keyloggers is not always illegal as corporations commonly employ this software to monitor employee productivity. This also means the potential of malicious keyloggers can be hard to identify and mitigate before data is breached.
Rogue security software
This malicious program, also known as scareware, tricks you into installing a fake anti-virus software to “fix” your computer. Hackers will charge a fee, promising it will remove intentionally placed adware and pop ups, but their main aim is to make money.
It is important that you don’t download any scareware or suddenly advertised antivirus programs as these will result in more malware or system compromise. However, rogue security software can operate aggressively, threatening fabricated viruses to drive you to act. If downloaded, your system could be fully in the hands of the hacker, and important data stolen.
Ransomware
Ransomware remains one of the biggest cyberthreats to businesses, as this type of malware blocks access to your business files. Typically, attackers will display a warning and demand a ransom to restore access, sent via cryptocurrency or credit card.
You must note that paying the ransom won’t ensure that access will be restored or that your system is permanently out of the hands of hackers. In the worst case, paying a ransom would mean losing finances and your critical infrastructure, resulting in other damages.
How does malicious software appear?
Malicious software will commonly infect your device though emails and on the internet. Employees may expose your system to threats by clicking on hacked websites, downloading infected files, installing new programs, opening files from unknown sources, and more.
It is important that your employees know never to click on email spam as these are rife with malicious code and links to dodgy sites. Equally, when replying to emails, check the legitimacy of the sender by hovering over the domain. If in doubt about an email you’ve received, always check with the sender before downloading attachments.
Also, it’s vital that you ensure any website you’re accessing is legitimate. Google is straightforward for safe browsing practices, allowing you to certify websites.
How to recognise a malicious website
Spotting a malicious website isn’t always easy. If hackers have done a good job, they may be able to trick the ad networks. However, there are some common safe web practices your business can implement:
- Check your online banking address when you’re about log into an online bank account, always make sure you’re not clicking on a link in an email. The real address always will start with “https://”.
- Confirm the domain name is right when you browse on the internet. There are usually only small changes in a fake address, e.g. the real Microsoft home page is “www.microsoft.com” not www.microsoft.mc.
- Video scams are also popular. Make sure you are watching videos from sites like Vimeo or YouTube.
It may be an attack or scam if:
- A website requests you to download a program, do a survey, or automatically launches a download window.
- Websites display “you have won” pop ups. As you click on a suspicious website, pop ups appear in a new window saying ‘‘Congratulations, you’ve won a voucher” or something similar.
How to recognise if my device has been infected
- Show popups both online and/or offline.
- Spam
- Have programs that do not open
- Have browser(s) that do not display some or any website at all.
- Present problems when trying to recognise external hardware.
- Computer showing a blue screen with the error code.
How to protect against malicious software
Below we uncover the key ways to protect your business from malicious software and what you may be missing in your cybersecurity strategy.
Anti-virus and anti-malware software
All organisations by now will understand that anti-virus and anti-malware software are a first in cybersecurity measures. Many packages offer key barrier protections against most, if not all the malicious programs we’ve listed.
Moreover, seeking business anti-virus solutions may include advanced security features like firewalls, real-time device monitoring and cleanup. These features oftentimes add necessary layers of protection to prevent malicious actors from bypassing traditional modes of anti-virus operation.
Regular hardware and software updates
To keep your computers safe, it’s critical to conduct hardware and software updates as soon as they’re available. Routine updates help fix existing security vulnerabilities which hackers may seek to exploit. More importantly, having automated updates on ensures you don’t have to worry about your devices ever being behind on the latest patches.
Ensuring OS updates will not only introduce new interface features but contribute to the security and performance of your business devices. The same goes for software updates. Developers are constantly working to improve the stability of their apps and tools as well as enhance their purpose. Leaving your software outdated or dormant may expose your device to bugs and lead to a higher risk of cyberattack.
Conduct IT compliance and training sessions
If you want to keep your organisation safe, it’s necessary to train your employees by hosting regular cyber safety and awareness courses. These sessions can help introduce safe browsing habits and teach your employees to recognise suspicious behaviours.
Understanding the basics of security best practices isn’t very technical and can be integrated across your organisation-wide IT policy. Most data breaches and cyber incidents are caused by human error, therefore educating your staff will reduce threats and keep your devices safe.
About totality services
totality services was founded in 2008 to provide IT Support to London’s small & medium sized businesses. Focusing on end-to-end IT services, we deliver everything from purchasing and installing hardware to providing Mac & Windows support, cloud solutions, and data backup. We support our clients using proven, high-quality systems and security practices that blue-chip companies take for granted.
Thanks to a process-driven approach, concise documentation and our team of friendly and highly trained London-based engineers, we consistently achieve excellent client satisfaction. We currently hold the highest Feefo service rating in London’s IT support sector and have won the Platinum Award three years running.