Blog Details

+1
0
+1
0
+1
0
+1
0
+1
0

What are Malware, Trojans, backdoors, and other Virus types? 

Adware 

Adwares are mainly designed to show advertisements on your screen without your permission.  This can be categorized into PUP ( potentially unwanted program). Adwares are harmless but can be really annoying.

Examples of ADWARE

  • Fireball
  • Appearch
  • Dollar Revenue
  • DeskAd
  • PBot
  • Kuik

How is it deliverd?

  • You download a program or executable files and virus install itself without your permission.
  • Use the vulnerability of software on your computer to install directly without your permission
  • Email , usb ,shady softwares..etc

Impacts

  • System gets slow
  • unwanted pop ups
  • install other malware
  • Replicate themselves
  • Spams
  • etc…

How you can avoid it.

  • Avoid visiting sketchy sites and downloading untrusted software
  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  

Virus 

A malicious code initiated by user interaction and executes its own code without a user concent . The virus can be designed with replicating mechanisms. The word ‘virus’ comes from Latin which means poison.

Examples of Virus

  • Fireball
  • Stuxnet
  • Conficker
  • Shlayer
  • and the recent one COVID19 (LOL)

How is it deliverd?

  • You download a program or executable files and virus install itself without your permission.
  • Use the vulnerability of software on your computer to install directly without your permission
  • Email , usb ,shady softwares..etc

Impacts

  •  Backdoor access to your systems
  • DNS highjacking
  • Kernal level access to your system
  • Slow your computer

How you can avoid it.

  • Avoid visiting sketchy sites and downloading untrusted software
  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  
  • Sys admins can Configure External Email Warning message.
  • Understand what SCAREWARE is.

Worm 

A malicious code that replicates itself and spread across other computers. Worms can cause major disruption in the network by causing unwanted traffic. Worms are more infectious than viruses they not only compromise the targeted computer but also spread t other computer in the network and infect them too.

Examples of Worm

  • ILOVEYOU
  • WANK
  • W32/Bolgimo.worm
  • Voyager

How is it deliverd?

  • You download a program or executable files and virus install itself without your permission.
  • Use the vulnerability of software on your computer to install directly without your permission
  • Email , usb ,shady softwares..etc

Impacts

  • Delete files
  • install aditional malwares
  • Replicates itself
  • Reduce network speed
  • Slow your computer
  • Do some specific task configured by the attacker.

How you can avoid it.

  • Configure ACL in routers and switches
  • Avoid visiting sketchy sites and downloading untrusted software
  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  
  • Don’t fall for SPAM mails

Trojan Horse

A malicious code injected into an OS with the help of an application without user consent (backdoor). It will take full control of your system. Open up service from the system, for example, listen to specific port 443- HTTPS. Can be designed to avoid detection by antivirus. Once the code installed on your computer it can damage, disrupt steal, and infect your computer. Most of the backdoors are delivered through Trojan. 

” A trojan can be a Swiss Army knife of hacking” Malwarebytes

 

Examples of Trojan 

  • Rootkit
  • Trojan-DDOS
  • Trojan-Banker
  • FAKEAV

How is it deliverd?

  • You download a program or executable files and virus install itself without your permission.
  • Use the vulnerability of software on your computer to install directly without your permission
  • Email , usb ,shady softwares..etc

Impacts

  • Full access to your computer
  • install other Softwares (PUP) without user consent
  • installs Keylogger and steals your credentials

How you can avoid it.

  • Avoid visiting sketchy sites and downloading untrusted software
  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  
  • Don’t fall for SPAM mails

Ransomeware

A malicious code injected to the System without user consent. This can restrict access to your system, files, or any other services in your computer and demands a ransom payment to get back your access.

Most of the Ransome payments are requested via cryptocurrencies. Once you make the payment we cannot trace the transaction thus the attacker can keep their anonymity.

Examples of Ransomeware

  • Wannacry
  • CryptoLocker
  • Bad Rabbit
  • Petya
  • Jigsaw

How is it deliverd?

  • You download a program or executable files and virus install itself without your permission.
  • Use the vulnerability of software on your computer to install directly without your permission
  • Email , usb ,shady softwares..etc

Impacts

  • Restrict access to your computer and personal files
  • Ransome payment request
  • No guarantee they will give back your full access

How you can avoid it.

  • Avoid visiting sketchy sites and downloading untrusted software
  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  
  • Don’t fall for SPAM mails
  • Understand what SCAREWARE is.

Phishing 

Phishing is the most common, simple, and most effective way of hacking. The users can be tricked into a page that looks legitimate and steals your user credentials, banking details, or any information which can be useful for the attacker. 

Examples of Phishing

  • Spam Email
  • SMS Phishing 
  • Social Engineering

How is it deliverd?

  • Email ,SMS,  usb ,shady Websites ..etc 

Impacts

  • Steals your user credentials
  • steals banking details 

How you can avoid it.

  • Use Antivirus & Anti-malware
  • Cybersecurity awareness programs  
  • Don’t fall for SPAM mails

Honorable mentions

Polymorphic Malware – A type of malware that changes itself to avoid detection. Any above types of malware can be polymorphic.

Armed Virus – Programmed to avoid detection and do specific damage to computers mainly used in cyber warfare.

Logic Bombs – As the name says it will execute a malicious program when certain logic is met.

 

Have you noticed something common to all malware, yes you can avoid a big junk of such malicious malware simply by getting basic security training or by self-educating.

When your company provides a cyber security awareness program make sure you do not miss it . . . 

Prevention is better than cure!

[newsletter_form]

Share on