The Top 5 Malware Attack Types

Malware, which is a word meaning ‘Malicious Software’ and it refers to any malicious coding that can invade and infect a computer system in many ways. Therefore, there are many different types of malware and the number is increasing.
 
Some recent analysis by Kroll found that of the 292 cyber-attack cases reported to the Information Commissioner in the last year, 53 were malware-related, which is over 18% and the number is increasing. 
 
To reduce your risks, you should increase your computer security, and use more care when opening emails, as there is now an increasing number of Malware types of attack software being employed. 
 
Here we review the top 5 Types:
 
1. Trojans Horses
Trojan Horses, pretend to be a harmless software program. The name of course comes from Homer who used it to describe the Trojan Horse in the attack and invasion of Troy.
Once activated, Trojans Horses can slow the computer that they invade and then it can delete, copy and change data. 
Trojans are often used to steal money from on-line baking accounts.
 
2. Viruses
Viruses are malicious codes or an entire program attached to files and this affected file can duplicate itself, similar to the way a physical virus duplicates itself inside a living cell.
The virus begins its attack as the file or program is opened and begins working. The virus then duplicates itself and can go on to computers on the same network system with often sever effects.
This includes passwords theft and email spam sent out to friends and business colleagues without the user’s knowledge.
 
3. Malvertising
Malvertising is malware that has been stored inside online advertisements. 
Often this means that advertising that suggests you have won a prize once opened allows the malware to invade. 
A year ago in January 2018, malvertising known as ‘AdultSwine’ caused the Google Play Store to be invaded with porn advertisements which were focused on children. 
 
4. Worms
Worms are a particular type of malware virus that can duplicate without the user knowing or having done anything wrong. Worms can then spread through emails and instant messages, without the user knowing. And this often causes the network to malfunction.
Worms are a type of malware that uses weaknesses within network procedures. Worms can be delivered using a USB drive in order to take control of a network.
Worm was first used in this way in John Brunner’s novel The Shockwave Rider in 1975.
 
5. Ransomware
Ransomware is used by criminal attackers and can be sent via emails, infiltrated apps and websites.
The criminal then demands money, usually crypto-currency, and says once paid they with un-lock the systems and data that they have frozen.
 
The ransomware attackers send messages threatening to destroy data unless victims pay them money and examples of this type of Ransomware are WannaCry, which started in May 2017 and lasted till March 2018 and this also affected Boeing. 
This strain of malware managed to affect the networks of Britain’s NHS, FedEx and Hitachi, among many other organisations. 
The attack has been attributed to the Lazarus group, who are said to be pirated by the North Korean Government.
 
News By CSI:          Image: Nick Youngson
 
You Might Also Read:
 
Cybercrime Is The Biggest Evolving Source Of Crime In The UK:
 
« Five Arrested In UK Cybercrime Raids
Wicked Dark Web Wish List »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Homeland Security Advanced Research Projects Agency (HSARPA)

Homeland Security Advanced Research Projects Agency (HSARPA)

HSARPA's Cyber Security Division (CSD) was set up to address DHS cyber operational and critical infrastructure protection requirements.

SecWest

SecWest

SecWest is the organizer of CanSecWest, PACSEC, originator of PWN2OWN, security auditing, and virtual engagement/training.

IntaForensics

IntaForensics

IntaForensics offer a full range of digital investigation services and are able to adapt to the individual needs of solicitors, private clients, Law Enforcement Agencies and commercial businesses.

Apomatix

Apomatix

Apomatix is a platform that simplifies the complexity of cyber risk audit and management.

Cyber Execs

Cyber Execs

Cyber Execs is a Cyber Security Consultancy & Executive Recruitment firm.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

GraVoc

GraVoc

GraVoc is a technology-consulting firm committed to solving business problems for customers through the development, implementation, & support of technology-based solutions.

AVeS Cyber Security

AVeS Cyber Security

AVeS combines expert knowledge and services with leading technology products to provide comprehensive Information Security and Advanced IT Infrastructure solutions.

National Cyber Security Agency (NACSA) - Malaysia

National Cyber Security Agency (NACSA) - Malaysia

NACSA is the leading government agency in Malaysia responsible for the development and implementation of national cyber security management policie and strategies.

Kippeo Technologies

Kippeo Technologies

Kippeo is a security systems integrator providing innovative solutions that look at all the parameters and connect all the dots.

Conviso

Conviso

Conviso is a consulting company specialized in Application Security and Security Research.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

CYGNVS

CYGNVS

CYGNVS is a guided cyber crisis response platform providing anytime, anyplace access. A SaaS platform for cyber crisis management – a safe way to connect and control your response.

Sandfly Security

Sandfly Security

Sandfly focuses on Linux security that is high performance, high stability, high compatibility, and low risk.