Home Tech Editorials GUIDE: What is malware and what can they do?

GUIDE: What is malware and what can they do?

malware
malware

The terms malicious software or malware include all types of computer programs that were developed with the aim of spying out data, allowing third parties unauthorized access to IT systems or infecting third-party systems via a wide variety of channels.

They are usually spread via links or file attachments in e-mails, manipulated websites, mobile data carriers and networks. With a healthy distrust of external links and files, current virus protection programs and software or system updates, you can increase your protection.

malware_paubox
photo credits: paubox
What are malwares and what can they do

The term malware includes all types of computer programs that were developed with the aim of attacking external IT systems via a wide variety of channels. One also speaks of infecting. Possible goals of the attacks include: spying out data, allowing third parties unauthorized access to computers, smartphones or other networked devices or generally damaging them.

Malware is the generic term for a variety of threats that can be divided into different categories according to the damage caused.

Ransomware

Data is encrypted to blackmail users. Access to the data is no longer possible. A ransom is then demanded for the decryption. In addition, the companies concerned are often threatened with the publication of the data.

Data theft

Keystrokes, such as passwords, are recorded. The computer or mobile device is searched for sensitive personal data such as passwords and access data or transfer data is intercepted, access to microphones and cameras is possible (spyware). The stolen data can be used to take over accounts, steal identities in social networks and misuse bank data.

Adware

Adware refers to programs that finance themselves through advertising. To do this, adware programs change the browser settings, for example, so that suddenly more pop-up windows with unwanted advertising open when surfing or the start page changes when the browser is opened. In addition, personal data can also be spied out.

Integration with botnet

One speaks of botnets when several infected systems are linked together by remote control and misused for certain actions. Remote control of Internet-enabled devices allows attackers to stealthily exploit the system they have taken over for their own purposes. For example, they can use it to paralyze websites, send spam, commit online banking fraud or mine cryptocurrencies such as bitcoins.

Scareware

The term comes from the English verb to scare, or to frighten someone. For example, it claims that the device is infected with malware. This is intended to unsettle users and tempt them to download a program that supposedly fixes the damage. However, this program only contains the actual malware.

In addition, malicious programs can be specifically hidden on the victim’s system. There are cases of ransomware attacks in which the perpetrators decrypted the victim’s system after paying the ransom, but left behind hidden malware. This was later used for re-encryption and a repetition of the blackmail. Therefore, once a system has been infected with malware, it is difficult to say with certainty that everything could be removed. It is safer to restore the system from scratch using a backup. It is therefore important to create regular data backups.

Malwares are often multifunctional and able to download additional malicious programs that cause further damage. They are constantly developing better and more intelligent methods and attack vectors, from which you should protect yourself as best you can.

 

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.