What is Malware in Cyber Security

What is Malware in Cyber Security? | Types | Examples n Mitigation

Cyber Security
Spread the love

What is Malware in Cyber Security?, Computer

It is Malicious or bad code, which is design to do wrong activity

Design to damage a system, steal information

Examples of Malware

  • It can add, modify, delete the data.
  • It  collects sensitive data
  • It can stop running services
  • It can shut down the system

How to prevent Malware?

Mitigate:

  • Install AV with latest up-to-date signatures (hash values)
  • Use Ad blockers
  • Educate the users

Types of Malware

What is Virus?

  • It effects clean files
  • Usually .exe files
  • Requires user action to spread.

What is Worm?

  • Effects other systems
  • Multiple copies
  • Shared folders, open ports, networks (Printers)
  • User action not needed to spread

What is Trojan?

It looks like legitimate software but internally collects all information.

How Virus is made?

Attackers develop the code and injects in the machines.

What is Spyware?

It can be by software you installed captures

Key strokes

And provide information to attackers

What is Ransomware?

Encryption of files.

In-return attackers ask money. Usually in Crypto Currency.

How you can prevent your organization from ransomware attacks?

By Network Segregation:

It involves separation of critical networks from
Internet
Less sensitive internal networks

By Network Segmentation:

It involves splitting, division of large networks into smaller ones

What is Adware?

website open, Popup ads,

Annoying user experience

By Ad Blockers you can control

What is Botnets?

Perform automated tasks

Network of infected computers work under the control of hackers.

What is RAT?

RAT: Remote access trojans

Attackers gains un authorized access to remote machines

Trick user to perform certain action.

Email a worm can automatically send copy of itself to all the users in your address book

What are Drive by download?

Unintentionally they download of malicious code

Example: Simply visiting a website can activate the download

By outdated apps, browsers, OS

Mitigation:

  • Keep software up to date
  • Install web filtering software
  • Adds-on on browsers
  • Not to visit untrusted websites

What are Fileless Malware?

It Hides in Memory un-detected

Mitigation:

  • Use EDR tools to monitor and detect suspicious activities
  • Disable shell scripting, power-shell command line where ever not required

To Know more details about Cyber Security please check here

Leave a Reply

Your email address will not be published. Required fields are marked *