What Is Malware?
Few things can happens to a PC that are worst than becoming infected with malware. As a consequence, your PC might fail to start, you may lose you connection to the internet, or a hardware component in the PC might fail, but all of this pales into insignificance when compared to the threat of infection.
Why this? While troubleshooting problems on a PCs commonly leads us to discover that the problem is isolated to just the machine in question, malware infection immediately threatens not just every other PC on you network but your servers, storage (both local and cloud), clients, partners, employees, and much more besides.
Deffirent Types Of Malware:
* Viruses and Worms
Viruses and Worms are the best-known types of malware, and they’re named, not for the actions the perform, but for the way they propagate. A “virus” for example, will spread from one machine to another through a medium comparable to that of a virus that you might catch in your own body, such physical contact or sharing. A “worm”, however, burrohw from one machine to another via a network.
Privacy is one of the buzzwords of modern computing, as social networks and major corporations collecte data and information about our activities online, where we go(both physical and online), what we look at, what we buy, who our friends are, and what the like, etc.
Spyware is malware that performs these task independently of a connection to a specific social network or website. Spyware will gether informations about what you do offline and online on your PC and send that informations , which can include recording keystrokes you type when you sing into websites, online shops and banks, using keylogger, back to its creators.
Adware is the most innocuous type of malware, being something that is intended to display ads to you on you PC. These will commonly come in the form of pop-up windows in a browser or separately.There is no real thread from adware, unless it also carries an additional payload, such us a keylogger.
A Trojan, also known as Trojan Horse, is a package that is intended to appear completely innocuous and harmless but contains a hidden payload. It is named for the wooden horse the Greeks gave as a gift to the citizens of the city of troy about the 12th century B.C. that contained soldiers who opened the city gates at night, allowing an invading Greek army to overpower the local inhabitants. So, technically, it was a Greek horse, and not a Trojan horse, but we’ll skip lightly over that bit.
Trojan will typically as audio or video codecs (plugins required to play a music or video file or view a video online), a web browser plugin, a game or something otherwise amusing or useful, or pirated app, an ISO disk image installer for an operating system, or a document.
Bots are usually for sale, if you hunt around a little on the dark web ( which i dont really recommended), then among the drugs, weapons, and other illegal goods that are sold there, you’ll probably find something called a “botnet”. Botnet are networks of machines that are infected by bots.
Typically, a bot will use internet connection of the infected machine to lunch a prolonged DDoS attack on a company or website. All the end user will notice is a slowdown in his/her internet speed, but with thousands, perhaps tens or hundreds of thousands, of bots available and online at any one time, botnets can be an effective way for criminals to extort money from companies, or for political groups to attack a country’s infrastructure.
Backdoors are commonly part of the payload of a bot or other malware type. Backdoors permit remote access to, and sometimes remote control of, an infected PC. This will give criminals file, folder, and document access to a PC and any file shares and other PCs and servers on the network(s) to which it is connected.
By far the most unpleasant malware is ransomware, this malware will encrypt your files and documents (sometimes even more then these), and demand that you pay a ransom, usually in the online currency “Bitcoin”, for the decryption key.
Ransomware is not only able to encrypt file backups, but can also spread to other on the network and employ the user to access permissions on those PCs to access yet more storage areas and more PCs. Some ransomware will even encrypt an entire disk in a PC, or the master file table (MFT) on the disk that contents the directory of what files are to be found where on the disk.
It is well known that hundreds of universities, hospitals, companies, and even governments around the world pay ransom every year, so as to avoid the costly downtime required to rebuild the infected systems and losing critical files and data.
It is also well known that the decryption key, should you pay to ransom, will it self contain an additional malware payload. The criminals behind ransomware, however, are clever enough not to price their ransoms too high, as the financial benefit of an individual, business, or organization not being able to afford the ransom will not bring in revenue to the criminals. This, sadly, then creates an incentive for people to pay the ransom when they become infected.
* Spam and Phishing E-mails
Spam (unsolicited) and phishing emails (e.g, purporting from your bank or a shopping site), an example which is seen in figure [1-1], aren’t malware , but im including them here, as they can commonly lead to a malware download. Spam is named after the proceeded meat (pork shoulder meat and ham) that was an common foodstuff in the United States and United Kingdom during and after the second World War, when food rationing was in place. It was disliked and derided (perhaps most famously in the Spam song by Monty Python), and was, therefore, a good choice of name for unwanted emails that began to appear in peoples inboxes.