Types of Malware. (3rd-degree torture for computers)

Some known but mostly unknown malware a social media & internet user should know.

Surya Govind
Jan 29, 2020 · 5 min read
Photo by Michael Geiger on Unsplash

Do you love your privacy? I know you do. Go through these malware types and save your buddy ( Computer ) from these aliens.

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network (by contrast, software that causes unintentional harm due to some deficiency is typically described as a software bug). A wide variety of types of malware exist, that you know as you proceed.

Programs are also considered malware if they secretly act against the interests of the computer user. For example, at one point Sony music Compact discs silently installed a rootkit on purchasers’ computers intending to prevent illicit copying, but which also reported on users’ listening habits, and unintentionally created extra security vulnerabilities.

A virus is a malicious executable code attached to another executable file. The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify, delete data. Opening a file can Trigger a virus, once a program virus is active, It will infect other programs on the computer.

Worms replicate themselves on the system attaching themselves to different files and looking for Pathways between computers such as computer network that shares common file storage areas usually slow down networks. A virus needs a host program to run but worms can run by themselves after a worm affects a host, It can spread very quickly over the network.

Its purpose is to steal private information from a computer system for the third party. Spyware collects information and sends it to the hacker. Spyware is used for many purposes. Usually, it aims to track and sell your internet usage data, capture your credit card or bank account information, or steal your identity. How? Spyware monitors your internet activity, tracking your login and password information, and spying on your sensitive information.

Some types of spyware can install additional software and change the settings on your device, so it’s important to use secure passwords and keep your devices updated.

A Trojan Horse is Malware that carries out malicious operations under the appearance of a desired operation such as playing an online game. A trojan horse varies from a virus because the Trojan binds itself to non-executable files, such as image files, audio files.

A Trojan acts as a bona fide application or file to trick you. It seeks to deceive you into loading and executing the malware on your device. Once installed, a Trojan can perform the action it was designed for.

A Trojan is sometimes called a Trojan virus or a Trojan horse virus, but that’s a misnomer. Viruses can execute and replicate themselves. A Trojan cannot. A user has to execute Trojans. Even so, Trojan malware and Trojan virus are often used interchangeably.

A Logic bomb is a malicious program that uses a trigger to activate the malicious code. The logic bomb remains non-functional until that trigger event happens. Once triggered, a logic bomb implements a malicious code that causes harm to a computer. Cybersecurity specialists recently discovered logic bombs that attack and destroy the hardware components in a workstation or server including the cooling fans, hard drives, and power supplies. The logic bomb overdrives these devices until they overheat or fail.

Ransomware grasps a computer system or the data it contains until the victim makes payment. Ransomware encrypts data in the computer with the key which is unknown to the user. The user has to pay the ransom (price) to the criminals to retrieve data. Once the amount is paid the victim can resume using his or her system.

There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or malspam, which is an unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites.

Backdoor bypasses the usual authentication used to access the system. The purpose of the backdoor is to grant the cybercriminals future access to the system even if the organization fixes the original vulnerability used to attack the system. As a threat, backdoors aren’t going away anytime soon. According to the Malwarebytes Labs State of Malware report, backdoors were the fourth most common threat detection in 2018 for both consumers and businesses — respective increases of 34 and 173 percent over the previous year.

Rootkit modifies the OS to make a backdoor. Attackers then use the backdoor to access the computer distantly. Most rootkits take advantage of software vulnerabilities to modify system files.

It is difficult to detect rootkits. There are no commercial products available that can find and remove all known and unknown rootkits. There are various ways to look for a rootkit on an infected machine. Detection methods include behavioral-based methods (e.g., looking for strange behavior on a computer system), signature scanning and memory dump analysis. Often, the only option to remove a rootkit is to completely rebuild the compromised system.

Keylogger records everything the user type on his or her computer system to obtain passwords and other sensitive information and send them to the source of the keylogging program.

Criminals can exploit information by accessing your accounts before you even know that your sensitive data has been compromised. Keylogger malware may reside in the computer operating system, at the keyboard API level, in memory or at the kernel level itself. Keylogging can be hard to detect because it doesn’t always cause noticeable computer problems, like slow processes or glitches. It can be hard to detect even by some antivirus programs because spyware is good at hiding itself — it often appears as normal files or traffic, and can also potentially reinstall itself.

I hope you got some idea about malware! for more details about malware, you can prefer to read this.

The Startup

Get smarter at building your thing. Join The Startup’s +800K followers.

Surya Govind

Written by

Affinity for Technology (Data Science|| Machine Learning|| AI ), Health & Nutrition. https://www.linkedin.com/in/surya-govind-a46645ba/

The Startup

Get smarter at building your thing. Follow to join The Startup’s +8 million monthly readers & +800K followers.

Surya Govind

Written by

Affinity for Technology (Data Science|| Machine Learning|| AI ), Health & Nutrition. https://www.linkedin.com/in/surya-govind-a46645ba/

The Startup

Get smarter at building your thing. Follow to join The Startup’s +8 million monthly readers & +800K followers.

Medium is an open platform where 170 million readers come to find insightful and dynamic thinking. Here, expert and undiscovered voices alike dive into the heart of any topic and bring new ideas to the surface. Learn more

Follow the writers, publications, and topics that matter to you, and you’ll see them on your homepage and in your inbox. Explore

If you have a story to tell, knowledge to share, or a perspective to offer — welcome home. It’s easy and free to post your thinking on any topic. Write on Medium

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store