MALWARE |
WHAT IT IS |
WHAT IT DOES |
Virus |
- A type of malware that self-replicates by inserting a code into the computer programs. It attaches to legitimate files and programs and can be distributed via infected websites, flash drives, and others.
|
- Can delete files, disable computer system/functions, or modify applications.
|
Adware |
- Software that downloads or displays persistent ads. It may also redirect you to advertising websites.
- This is usually installed with the user’s knowledge and consent. Hidden in “Terms of Service” to which users then “Agree” to.
|
- Tracks user location and browser history.
- Redirects search results.
- May display pop-ups that cannot be closed.
- May have surreptitious links that direct to more nefarious types of malware such as Spywares.
|
Ransomware |
- This malware encrypts files locking them from the victims, and may decrypt said files once a ransom is paid.
- Note that cybercriminals may not always keep their end of the bargain, even after the victim pays the ransom.
- It can extend and exploit system and network vulnerabilities.
- Usually distributed using email campaigns or through targeted attacks.
|
- Encrypts Personal Identifiable Information (PII).
- Other ransomware locks out access to the infected computer.
- Blackmails recipient.
- Usually demands “ransom” payment by way of cryptocurrency.
|
Trojan |
- Programs that hide in plain sight posing as legitimate software. Once downloaded, it enables computer access to cybercriminals who then carry out malicious activities.
|
- Gives remote access to hackers, enabling them to steal data, and spy on users.
|
Worms |
- Infect systems by weaving their way from one infected machine and continue to other subsequent machines through a network.
|
- Steals and/or deletes files
|
Rootkits |
- Referred to as the most dangerous among malware types.
- A collection of computer software that enables remote access to the user’s computer.
- It usually contains several types of malware in itself such as password stealers, antivirus disablers, bots, keyloggers, and others.
|
- Can be both difficult to find/identify, and difficult to remove in an infected device.
- Can give complete computer access to cybercriminals.
- Hackers can disable security software on infected devices.
|
Spyware |
- Unscrupulously hides in the background of a computer and "spies" on what a user is doing. It collects information without the user knowing. Information includes bank accounts, credit card details, login credentials, etc.
|
- Can modify your computer’s security settings with the user’s knowledge.
- Collects your data and sells it to cybercriminals.
|
Keyloggers |
- As the name implies this hardware/software keeps a record of every key pressed. Other keylogger tools are meant for legitimate purposes such as providing feedback for software development. However, cybercriminals may misuse this tool for their unlawful activities.
|
- Can create records of whatever information a user types on the keyboard of a computer or mobile device.
- It may also record other information such as text messages, calls, GPS data, audio and video files.
|
Bots |
- Programs that carry out specific commands or operations on a user’s computer without the latter’s consent or knowledge.
|
- Gives remote access to hackers, enabling them to steal data, spy on users, distribute spam, and/or attack computer networks.
|
Scareware |
- Generates pop-ups that pretend to come from anti-virus software, firewall applications, or registry cleaners. The pop-ups message usually shows numerous problems that have been found in the user's computer.
|
- Users are tricked into purchasing "software" to fix a variety of computer issues. The "software" may in actuality be "malware."
|