The Top 5 Malware Attack Types

Malware, which is a word meaning ‘Malicious Software’ and it refers to any malicious coding that can invade and infect a computer system in many ways. Therefore, there are many different types of malware and the number is increasing.
 
Some recent analysis by Kroll found that of the 292 cyber-attack cases reported to the Information Commissioner in the last year, 53 were malware-related, which is over 18% and the number is increasing. 
 
To reduce your risks, you should increase your computer security, and use more care when opening emails, as there is now an increasing number of Malware types of attack software being employed. 
 
Here we review the top 5 Types:
 
1. Trojans Horses
Trojan Horses, pretend to be a harmless software program. The name of course comes from Homer who used it to describe the Trojan Horse in the attack and invasion of Troy.
Once activated, Trojans Horses can slow the computer that they invade and then it can delete, copy and change data. 
Trojans are often used to steal money from on-line baking accounts.
 
2. Viruses
Viruses are malicious codes or an entire program attached to files and this affected file can duplicate itself, similar to the way a physical virus duplicates itself inside a living cell.
The virus begins its attack as the file or program is opened and begins working. The virus then duplicates itself and can go on to computers on the same network system with often sever effects.
This includes passwords theft and email spam sent out to friends and business colleagues without the user’s knowledge.
 
3. Malvertising
Malvertising is malware that has been stored inside online advertisements. 
Often this means that advertising that suggests you have won a prize once opened allows the malware to invade. 
A year ago in January 2018, malvertising known as ‘AdultSwine’ caused the Google Play Store to be invaded with porn advertisements which were focused on children. 
 
4. Worms
Worms are a particular type of malware virus that can duplicate without the user knowing or having done anything wrong. Worms can then spread through emails and instant messages, without the user knowing. And this often causes the network to malfunction.
Worms are a type of malware that uses weaknesses within network procedures. Worms can be delivered using a USB drive in order to take control of a network.
Worm was first used in this way in John Brunner’s novel The Shockwave Rider in 1975.
 
5. Ransomware
Ransomware is used by criminal attackers and can be sent via emails, infiltrated apps and websites.
The criminal then demands money, usually crypto-currency, and says once paid they with un-lock the systems and data that they have frozen.
 
The ransomware attackers send messages threatening to destroy data unless victims pay them money and examples of this type of Ransomware are WannaCry, which started in May 2017 and lasted till March 2018 and this also affected Boeing. 
This strain of malware managed to affect the networks of Britain’s NHS, FedEx and Hitachi, among many other organisations. 
The attack has been attributed to the Lazarus group, who are said to be pirated by the North Korean Government.
 
News By CSI:          Image: Nick Youngson
 
You Might Also Read:
 
Cybercrime Is The Biggest Evolving Source Of Crime In The UK:
 
« Five Arrested In UK Cybercrime Raids
Wicked Dark Web Wish List »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Sapphire

Sapphire

Sapphire deliver flexible and scalable cybersecurity solutions, helping organisations to detect, protect, respond and remediate against cyber threats.

Sophos

Sophos

Sophos is a worldwide leader in next-generation cybersecurity, protecting more than 400,000 organizations of all sizes in more than 150 countries from today’s most advanced cyberthreats.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

RedSeal

RedSeal

RedSeal’s network modeling and risk scoring platform is the foundation for enabling enterprise networks to be resilient to cyber events.

ESNC

ESNC

ESNC’s vulnerability management and real-time SAP security monitoring solutions help largest corporations in the world to effectively prioritize SAP security tasks and secure their business.

Avatao

Avatao

Avatao is an online training platform for building secure software, offering a rich library of hands-on IT security exercises for software engineers to teach secure programming.

Plurilock Security Solutions

Plurilock Security Solutions

Plurilock is a real-time cybersecurity solution that uses artificial intelligence to identify, prevent, and eliminate insider threats.

NetKnights

NetKnights

NetKnights is an independent IT security company which offers services and products for strong authentication, identity management and encryption.

KeepSolid

KeepSolid

KeepSolid is a Virtual Private Network services provider offering secure encrypted access to the internet.

SMiD Cloud

SMiD Cloud

SMiD encryption technology has been developed following the highest security practices to allow the data availability, integrity and confidentiality.

Indeed

Indeed

Indeed is a worldwide employment-related search engine for job listings covering job types in all industries, including cybersecurity.

e-Careers

e-Careers

e-Careers is an edtech institution that provides industry recognised courses and up-skilling solutions to individuals and organisations.

Network Perception

Network Perception

Network Perception proactively and continuously assures the security of critical OT assets with intuitive network segmentation verification and visualization.

Technology Mindz

Technology Mindz

Technology Mindz is a leading provider of cybersecurity services. We offer a wide range of services to help businesses. Our services are Identity and access management, Governance risk and compliance.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

SecureKloud Technologies

SecureKloud Technologies

SecureKloud is a global leader in the Cloud services arena. Our experience in cloud consulting and servicing for highly regulated industries extends more than a decade.