Malware Classification, Spreading and Preventions

Malware or malicious software refers to the software that have malicious purpose i.e., it is intended to make harms on the computer system in some or other way. Malware is the combined term used for almost every type of mal codes(The bad software or block of code that want to damage your system). These includes Viruses, Worms, Trojans, Spyware, Botnets, etc.

Image Source: AVG

It is a general confusion with many people that virus and malware are same. They are the two different words for the same thing. Every sort of malicious program is referred to as virus for those who aren't aware of the malware categorization, but it is not like that, virus is the category of malware.

The main purpose of malware is to either harm the computer system or to steal information. Every type of malware is made to do the thing in different ways so that it become hard for the antivirus programs to detect them.

There is no particular path of the spreading of malware. Those can be have many sources to spread. Internet is the major source of malware spreading. Downloading infected files, visiting malicious websites, clicking on pop-ups and scareware, etc. Is one the major reason of malware spreading. Other than this, malware can spread through e-mails via infected attachments, pen drives, etc.

Malware can be classified in several ways, which make it easy to understand their working, how they infect system, their threat level and how to protect.

The malware's can be categorized as:

1. Virus: Virus is the basic sort of malicious code which needs human intervention to execute and infect the PC. These may and may not cause harm to system but are definitely dangerous. These may delete or corrupt the files and cam also format the hard drive. Some virus are made such that it does not cause any harm to the system but may irritate the user by displaying some sort of message or error again and again.

Ex: ILOVEYOU, etc.

2. Worms: This is somewhat self-dependent type of malware which do not need human intervention to attack on the system. It is self replicating and once it is executed, it eats up the space on the hard drive and it slower down the processing speed of computer system.

Ex: MyDoom, etc.

3. Trojan Horse: It is one of the most harmful type of malware. It attacks behind from the some sort of useful application. It pretend to be very useful software and it hidden in it and once the software is installed or executed, it start its processing. It may manipulate the data and can create a backdoor for the hacker to gain remote access over the system.

Ex: DARKCOMET, Back Orifice, Blackhole Exploit Kit, etc.

4. Adware: This type of malware are intended to show the pop-up ads that are definitely not useful and not genuine. All these pop-ups are made to trap the user by showing some sort of advantage like providing something free or some other offers that may force user to fall onto trap. These pop-ups when clicked then redirect user to any malicious site that will further try to collect user information. These keep track of activities and what product user is looking and show personalised ads to attract user.

Ex: CoolWebSearch, Altnet, etc.

5. Spyware: It is another most harmful malware that is installed with some infected software. Once installed in the computer device, it collects browser history, cookies, user's personal details like bank details, passwords and many more. These can also act as keylogger which keep track of what user is typing. It also do not make any harm to device, it silently collect details and send to hacker.

Ex: Hot as Hell, Transponder, etc.

6. Browser Hijacking Software: Hijacking refers to taking control over forcefully. These type of malware generally change the browser settings and every detail regarding the browser search is sent to the hacker. Once hijacked, hacker can easily redirect user to any malicious site or may download malware on victims PC.

Ex: Snap.do,etc.

Scareware

7. Scareware: It take advantage of the fear of humans. While browsing online, you must have seen a pop-up claiming "Your device is infected" or "Your device is outdated. Update Now --- Click here" or "Your device will be shutdown in 30 seconds". All these scareware as name says scares(frighten) the user and force him/her to click on the link provided or to download the software. If user click on such scareware, the malware is downloaded on user's PC and it gets infected.

8. Rootkit: This malware attacks the Master Boot Record of the computer system. It is executed when the computer system boots. These may change the boot settings, corrupt the boot loader, or format the drive.

Ex: FU, Knark, Adore, etc.

9. Botnet: This is a very dangerous malware. It converts the internet connected device into a bot. These bots infects the other devices on the networks and convert them to bots as well. These are awakened when the hacker want to perform the Distributed Denial-of-Service attack(DDoS), steal data, send spam, and allow hacker to access and control device.

Ex: Zeus, Mariposa, Waledac, etc.

10. Ransomware: The most advanced and most dangerous malware. It encrypt the system data and demand ransom for decrypting it. In May 2017, a ransomware called 'wannacry' targeted computer running on Microsoft Windows OS by encrypting data and demanded ransom payment in Bitcoin cryptocurrency. It affected nearly 200,000 victims and more than 300,000 devices were infected.

Ex: Cryptolocker, Petya, etc.


Make note that all these malware’s are related to one other itself and many of them are has working similar and can be categorised in multiple categories. To remain protected from the malware attacks:

* Use a genuine latest version antivirus software and keep it updated.

* Apply regular patches and update packages on the Operating System.

* Avoid visiting malware sites.

* Use AdBlocker extension on browser.

* Use updated browser.

* Beware of scareware. Never click on such scareware and pop-ups while surfing.

* Never download software or click on link shared via mail from any unknown source.

* If device is on network, maintain network security.

* Do not use any roadside pen drive. That can not only infect your device but also can damage it physically(via. USB Kill).

What make the malware to attack is the lack of knowledge and security. Keeping proper security tools and following proper techniques can prevent malware infection. Protection is the basic need and remaining protected is the sole duty of every individual.

So, remain informed and remain protected.

Comments

Sahid khan said…
Thanks abhay for giving us such kind of knowledge . I really appreciate your workπŸ”₯
Rachna said…
Appreciable πŸ’«πŸ‘
Kushal said…
Very Informative ;)