Malicious Software and its Types (Part 1)

Malware is a type of malicious software coded for accessing sensitive information to disrupt or disable a computer system's functionality. It works by taking the advantages of technical fault or vulnerabilities located in OS software and hardware. Malware runs its activities anonymously. It comes in many forms. The most common types of malware are viruses, worms, adware, spyware, Trojans, root kids, backdoors, botnets etc. Let's discuss the most common form of malware.




Virus: The Malware 'Virus' works much like the biological virus we see in our daily lives. The virus attaches itself to some sort of executable program. When the program runs, it involves many files, each of which is now susceptible to being infected with the virus. So, the virus replicates itself on these files, performs the malicious work, and repeats this process until it spreads as much as possible.

Worm: Worm works similar to a virus, but unlike a virus, it does not require attaching itself onto a program or file to spread and cause damage. It can spread through a channel or a network like an email.

Adware: Adware is a software that displays advertisements. It is mostly downloaded automatically when a user agrees to terms and conditions at a particular website. But sometimes, it gets downloaded without consent and, the execution of malicious activities take place. In most of the cases, adware is not harmful. But it collects data and sends it to the company for advertising.

Spyware: Spyware is a type of malware that spy on user's activities. This includes monitoring computer screens, key-presses, webcams, gathering personal information and then relaying this private information to another party or external users and other unethical activities.

KeyLogger: Keylogger is an example of spyware. It is used to record the keystrokes entered by the user. It can capture texts typed by the user, including passwords and other confidential data.

Ransomware: Ransomware is a type of malware that holds the user’s data or system hostage, blocking its access and threatens to publish the data unless the victim pays a ransom.  

Trojan: A Trojan is a malware capable of disguising itself as an ordinary software. It is mistakenly downloaded and executed by the user, as no one would willingly download malware on their device. This allows the malware to invade the user’s device and perform malicious activities. It is very similar to how the Greeks gained access to Troy's city by hiding inside a wooden horse. This is where the malware got its name from...



 



Comments