The Top 5 Malware Attack Types

Malware, which is a word meaning ‘Malicious Software’ and it refers to any malicious coding that can invade and infect a computer system in many ways. Therefore, there are many different types of malware and the number is increasing.
 
Some recent analysis by Kroll found that of the 292 cyber-attack cases reported to the Information Commissioner in the last year, 53 were malware-related, which is over 18% and the number is increasing. 
 
To reduce your risks, you should increase your computer security, and use more care when opening emails, as there is now an increasing number of Malware types of attack software being employed. 
 
Here we review the top 5 Types:
 
1. Trojans Horses
Trojan Horses, pretend to be a harmless software program. The name of course comes from Homer who used it to describe the Trojan Horse in the attack and invasion of Troy.
Once activated, Trojans Horses can slow the computer that they invade and then it can delete, copy and change data. 
Trojans are often used to steal money from on-line baking accounts.
 
2. Viruses
Viruses are malicious codes or an entire program attached to files and this affected file can duplicate itself, similar to the way a physical virus duplicates itself inside a living cell.
The virus begins its attack as the file or program is opened and begins working. The virus then duplicates itself and can go on to computers on the same network system with often sever effects.
This includes passwords theft and email spam sent out to friends and business colleagues without the user’s knowledge.
 
3. Malvertising
Malvertising is malware that has been stored inside online advertisements. 
Often this means that advertising that suggests you have won a prize once opened allows the malware to invade. 
A year ago in January 2018, malvertising known as ‘AdultSwine’ caused the Google Play Store to be invaded with porn advertisements which were focused on children. 
 
4. Worms
Worms are a particular type of malware virus that can duplicate without the user knowing or having done anything wrong. Worms can then spread through emails and instant messages, without the user knowing. And this often causes the network to malfunction.
Worms are a type of malware that uses weaknesses within network procedures. Worms can be delivered using a USB drive in order to take control of a network.
Worm was first used in this way in John Brunner’s novel The Shockwave Rider in 1975.
 
5. Ransomware
Ransomware is used by criminal attackers and can be sent via emails, infiltrated apps and websites.
The criminal then demands money, usually crypto-currency, and says once paid they with un-lock the systems and data that they have frozen.
 
The ransomware attackers send messages threatening to destroy data unless victims pay them money and examples of this type of Ransomware are WannaCry, which started in May 2017 and lasted till March 2018 and this also affected Boeing. 
This strain of malware managed to affect the networks of Britain’s NHS, FedEx and Hitachi, among many other organisations. 
The attack has been attributed to the Lazarus group, who are said to be pirated by the North Korean Government.
 
News By CSI:          Image: Nick Youngson
 
You Might Also Read:
 
Cybercrime Is The Biggest Evolving Source Of Crime In The UK:
 
« Five Arrested In UK Cybercrime Raids
Wicked Dark Web Wish List »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

BSI Group

BSI Group

BSI is the business standards company that equips businesses with the necessary solutions to turn standards of best practice into habits of excellence

Palo Alto Networks

Palo Alto Networks

Palo Alto Networks, the global cybersecurity leader, is shaping the cloud-centric future with technology that is transforming the way people and organizations operate.

CyberDefcon

CyberDefcon

CyberDefcon is an independent organization dedicated to the pursuit of making the internet a safer place.

IT Association of Slovakia (ITAS)

IT Association of Slovakia (ITAS)

ITAS is a professional association of domestic and foreign companies operating in the field of information and communication technologies

Cyber Security Challenge UK

Cyber Security Challenge UK

Cyber Security Challenge UK is a series of national competitions, learning programmes, and networking initiatives designed to identify, inspire and enable more people to become cybersec professionals.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

Tech Nation

Tech Nation

Tech Nation is the UK’s first national scaleup programme for the cyber security sector, aimed at ambitious tech companies ready for growth, at home and abroad.

972VC

972VC

972VC was created to help entrepreneurs find potential funding for their startups. Your guide to the Israeli startup funding ecosystem.

Gordian Networks

Gordian Networks

Gordian Networks offers complete managed IT services and IT support for small to large businesses.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

Venari Security

Venari Security

Venari is an award-winning cybersecurity SaaS provider that has developed an ETA (Encrypted Traffic Analysis) platform which fundamentally changes the way encrypted traffic is analysed.

SoftwareONE

SoftwareONE

SoftwareONE is a leading global provider of end-to-end software and cloud technology solutions.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

CyberloQ Technologies

CyberloQ Technologies

CyberloQ Secure is a cybersecurity solution that enables clients to implement highly robust Multi-Factor Authentication (MFA) that includes client-defined location-based geofencing constraints.

Cyber Guards

Cyber Guards

Cyber Guards provide comprehensive, turn-key cyber security programs for small and mid-size business for about the cost of one full-time cybersecurity hire.