2. Dangerous malware: These are the most common types of malware
Malware takes many forms, attacking computer users in different ways. Moreover, along with technological progress, attack methods also evolve. These are the most common types of malware:
- Ransomware
- Rootkit
- Spyware
- Viruses
- Computer worms
- Exploit
- Rogueware
- Fileless Malware
- Botnets
- Cryptocurrency Miner Malware
Ransomware
Ransomware encrypts important files or entire networks in order to lock out legitimate administrators. The term was composed of the English words "ransom" and "software". Cyber criminals use these malware programs to demand a ransom from the victims.
The victims must pay hundreds or even thousands of euros or dollars within a specified period of time. To obtain the decryption key, they are required to follow specific instructions. Often, a transfer of money in the form of cryptocurrency is necessary. If the money is not paid, the blackmailers destroy, publish or lock the data forever. Read this article to find out which are the five most common gateways into the company network. In the whitepaper, you will also learn how companies can protect themselves against the constant threat of ransomware.
A relatively new variant sucks sensitive data out of attacked systems before holding them digitally hostage. This means that even if victims make backup copies of the files, the blackmailers can simply publish the data after the payment deadline has expired if payment is not made.
Rootkit
Rootkits include tools that give the user access to the administrator level of computers and networks. They hide their existence from legitimate users for a long time. An unauthorised person gains control of the computer, can remotely open files and change system configurations. Programmers of such malware also gain access to a system's log files, tracking every user activity. Rootkits are even able to hijack and infiltrate security systems, making them extremely difficult to detect.
Spyware
Spyware is software that infiltrates a computer system, usually unnoticed. These programmes steal data and forward it to unauthorised third parties. These can be, for example, advertising or data companies or other questionable parties. Theft of identities, bank account or credit card data is within the realm of possibility. The most common variants of this type of malware include:
- Adware: Programmes that spy on the browser history of the infected person after downloading. On this basis, the interests of those affected in products and services are inferred. The adware finally displays similar offers to encourage clicks and purchases. In addition to violating privacy, this type of malware can extremely impair the performance of a computer.
- Trojan: In the style of the famous Trojan horse in Homer's Iliad, this spyware appears as legitimate software. Attack victims therefore download it onto their computer without suspicion. In this way, unauthorised persons gain access to sensitive data and information without legitimate users noticing for a long time.
- System monitor: This spyware often poses as freeware, i.e. free software. It can monitor everything that happens on a computer, from keystrokes to e-mails, chat dialogues and websites visited to all programmes run.
- Keyloggers: This malware watches everything users type on their computer. They accomplish this type of spying by recording keystrokes. This includes passwords and other important information that should not fall into the hands of unauthorised persons.
Viruses
Similar to their biological relatives, computer viruses attach themselves to healthy files or clean code. Often it is an executable EXE file. As soon as the computer owner activates it, the infection begins to spread. It infects other healthy files in order to damage or delete them. This uncontrolled spread can eventually disrupt or damage the core functions of a system if left untreated.
Computer worms
The computer worm does not need to attach itself to clean code or healthy files. Instead, it reproduces itself over and over again without any human help. In this way, spreading quickly takes place on several computers.
Worms also modify or delete files. They can take up so many resources of a computer that system overloads occur. They are also able to steal data or create an entrance to a system for hackers. Thus, these cybercriminals take control of the computer and its system settings.
Exploit
Exploits specifically exploit software vulnerabilities to break into a network. Here they gain more access rights to penetrate deeper into the system. An exploit can be part of a multi-faceted attack strategy and place another malware, e.g. a Trojan.
Rogueware
Rogueware pretends that there is a problem or malware infection on the computer. The problem is usually supposed to be solved by a click or a download of dubious software. The victims are supposed to either spend money on it or install additional malware if they believe in the authenticity of these warnings.
Typically, a warning window appears that looks like a legitimate programme - for example in the form of a malware scanner. The programme then demands the installation of additional software or payment for a full version.
Fileless Malware
The fileless malware, as the name already suggests, does not need any files to spread. It is neither stored in a file nor installed directly on the computer. This species is difficult to detect because it leaves no traces. Instead, it runs software that is already on a computer to cause damage via its scripts.
Botnets
The combination of the words "robot" and "network" describes a network of hijacked computers. An attacking entity, also called a bot-herder, uses such a network for fraudulent activities and cyber attacks. With the help of this majority of bots, a large-scale attack can be carried out that would not be possible with simple malware. Users of such a botnet can even rent out components of the network on the black market to earn money.
Cryptocurrency Miner Malware
A lot of computer power is needed to create cryptocurrency. The corresponding malware uses the resources of other people's smartphones or computers to generate crypto revenue for cybercriminals. Meanwhile, these resources are lacking for the legitimate users of this system.
In addition to these well-known malware programmes, there are many other variations and malware that infect networks or computer systems. This is why great caution and thorough protection are always required when dealing with the Internet.