What is malware?
Malware is a various type of malicious software, developed
by the cybercriminals (called hackers) to allow them steal sensitive data,
damage or destroy computers and computer systems. The common malware that the
hackers usually hack into computers are viruses, worms, Trojan viruses,
rootkits, spyware, and ransomware.
The malware can install to your device either by downloaded
infected file or installed infected software or download link in an email which
automatically installs malicious software onto your device called Phishing and
Spear-phishing.
The example of malware intentionally:
-๐๐ฎ๐๐ต๐ฒ๐ฟ๐ถ๐ป๐ด ๐ถ๐ป๐๐ฒ๐น๐น๐ถ๐ด๐ฒ๐ป๐ฐ๐ฒ ๐ฎ๐ป๐ฑ ๐ถ๐ป๐ณ๐ถ๐น๐๐ฟ๐ฎ๐๐ถ๐ป๐ด
Unauthorized extraction of data, including emails, plans, and particularly confidential details like passwords.
-๐๐ฎ๐๐๐ถ๐ป๐ด ๐ฐ๐ต๐ฎ๐ผ๐ ๐ฎ๐ป๐ฑ ๐ฑ๐ฒ๐บ๐ฎ๐ป๐ฑ๐ถ๐ป๐ด ๐ฝ๐ฎ๐๐บ๐ฒ๐ป๐
By encrypting networks and PCs, rendering them inoperable. When this is done with the intention of financial extortion, it’s termed ransomware.
-๐ฆ๐ฎ๐ฏ๐ผ๐๐ฎ๐ด๐ฒ ๐ผ๐ฟ ๐บ๐ฎ๐น๐ถ๐ฐ๐ถ๐ผ๐๐ ๐ฑ๐ฒ๐ณ๐ฎ๐ฐ๐ฒ๐บ๐ฒ๐ป๐
Deliberately ruining computer systems to harm your network infrastructure.
-๐ ๐ถ๐๐ฎ๐ฝ๐ฝ๐ฟ๐ผ๐ฝ๐ฟ๐ถ๐ฎ๐๐ถ๐ป๐ด ๐ฐ๐ผ๐บ๐ฝ๐๐๐ถ๐ป๐ด ๐ฟ๐ฒ๐๐ผ๐๐ฟ๐ฐ๐ฒ๐
Utilizing your computational power for activities such as running botnets, engaging in crypto mining, or sending spam emails.
-๐๐ถ๐ป๐ฎ๐ป๐ฐ๐ถ๐ฎ๐น ๐ฝ๐ฟ๐ผ๐ณ๐ถ๐
Selling your organization’s intellectual information on the dark web.
Types of malwares
-๐ฉ๐ถ๐ฟ๐๐: It’s a harmful program that has been linked to a file or document. Once the file is downloaded, opened, and activated, it can propagate from one device to another. Viruses have the potential to cause disruptions to the operating system, leading to issues like data loss.
-๐ช๐ผ๐ฟ๐บ๐: It spreads through a network by replicating itself at an exponential rate once the file is downloaded or connected to the network. The effect of worms can cause the data loss and operational disruption on a device like viruses.
-๐ง๐ฟ๐ผ๐ท๐ฎ๐ป ๐๐ถ๐ฟ๐๐: It designed to gain access to sensitive data and then modify, block, or delete data once the user downloads file or software.
-๐ฅ๐ผ๐ผ๐๐ธ๐ถ๐๐: It is a malware that designed to grant the hacker administrative rights to a targeted computer. It is difficult to detect or remove because it is installed manually outside of the typical layer of user applications.
-๐ฆ๐ฝ๐๐๐ฎ๐ฟ๐ฒ: It is a software that designed to track the userโs internet activities and application used activities, collect the credentials data such as financial data, credit card information, username, and password. Then send the data to the hacker without userโs permission. This malware is mostly used to steal financial information and personal information. The keylogger is mostly used to steal username and password information.
-๐ฅ๐ฎ๐ป๐๐ผ๐บ๐๐ฎ๐ฟ๐ฒ: It is a type of malware that the hacker uses to block users access to a system or credential information by encrypted it and threat them to pay money to decrypted and release accessibility to the users. There are two different types of ransomware, one is called crypto ransomware which targets to encrypt files on a userโs device, another is locker ransomware which targets to lock the users out of their device.