Malware and symptoms

Malware is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

Nitish Kumar
4 min readMay 9, 2021

Types of Malware

Short for Malicious Software, malware is any code that can be used to steal data, bypass access controls, or cause harm to, or compromise a system. Below are a few common types of malware:

Spyware — This malware is design to track and spy on the user. Spyware often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings. Spyware often bundles itself with legitimate software or with Trojan horses.

Adware — Advertising supported software is designed to automatically deliver advertisements. Adware is often installed with some versions of software. Some adware is designed to only deliver advertisements but it is also common for adware to come with spyware.

Bot — From the word robot, a bot is malware designed to automatically perform action, usually online. While most bots are harmless, one increasing use of malicious bots are botnets. Several computers are infected with bots which are programmed to quietly wait for commands provided by the attacker.

Ransomware — This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting data in the computer with a key unknown to the user. Some other versions of ransomware can take advantage of specific system vulnerabilities to lock down the system. Ransomware is spread by a downloaded file or some software vulnerability.

Scareware — This is a type of malware designed to persuade the user to take a specific action based on fear. Scareware forges pop-up windows that resemble operating system dialogue windows. These windows convey forged messages stating the system is at risk or needs the execution of a specific program to return to normal operation. In reality, no problems were assessed or detected and if the user agrees and clears the mentioned program to execute, his or her system will be infected with malware.

Rootkit — This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely. Most rootkits take advantage of software vulnerabilities to perform privilege escalation and modify system files. It is also common for rootkits to modify system forensics and monitoring tools, making them very hard to detect. Often, a computer infected by a rootkit must be wiped and reinstalled.

Virus — A virus is malicious executable code that is attached to other executable files, often legitimate programs. Most viruses require end-user activation and can activate at a specific time or date. Viruses can be harmless and simply display a picture or they can be destructive, such as those that modify or delete data. Viruses can also be programmed to mutate to avoid detection. Most viruses are now spread by USB drives, optical disks, network shares, or email.

Trojan horse — A Trojan horse is malware that carries out malicious operations under the guise of a desired operation. This malicious code exploits the privileges of the user that runs it. Often, Trojans are found in image files, audio files or games. A Trojan horse differs from a virus because it binds itself to non-executable files.

Worms — Worms are malicious code that replicate themselves by independently exploiting vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms can run by themselves. Other than the initial infection, they no longer require user participation. After a host is infected, the worm is able to spread very quickly over the network. Worms share similar patterns. They all have an enabling vulnerability, a way to propagate themselves, and they all contain a payload.

On July 19, 2001, more than 359,000 computers were infected with the Code-Red worm in less than 14 hours. To help get a feel for the global impact, Jeff Brown, animated the geographic spread of the worm in five minute intervals between midnight July 19 and midnight July 20, based on analysis of UCSD Network Telescope data by David Moore. Infected hosts were mapped to latitude and longitude values using Ixia’s IxMapping. The size of each circle relates to the infected hosts mapped to the center of the circle

Man-In-The-Middle (MitM) — MitM attack is a type of attack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other.

Man-In-The-Mobile (MitMo) — A variation of man-in-middle, MitMo is a type of attack used to take control over a mobile device. When infected, the mobile device can be instructed to exfiltrate user-sensitive information and send it to the attackers. ZeuS, an example of an exploit with MitMo capabilities, allows attackers quietly to capture 2-step verification SMS messages sent to users.

Symptoms of Malware

Regardless of the type of malware a system has been infected with, these are common malware symptoms:

  • There is an increase in CPU usage.
  • There is a decrease in computer speed.
  • The computer freezes or crashes often.
  • There is a decrease in Web browsing speed.
  • There are unexplainable problems with network connections.
  • Files are modified.
  • Files are deleted.
  • There is a presence of unknown files, programs, or desktop icons.
  • There are unknown processes running.
  • Programs are turning off or reconfiguring themselves.
  • Email is being sent without the user’s knowledge or consent.

Source :- https://en.wikipedia.org/wiki/Malware

Thanks!! Hope this will help you to learn. Please take a minute to review.

--

--

Nitish Kumar
Nitish Kumar

Written by Nitish Kumar

I developed and maintain applications aimed at a range of iOS devices including mobile phones and tablet computers.

No responses yet