BotNet News

Your source for Online Security News

Malware

When it comes to malware, it takes a lot more than just the bad software itself to make an attack succeed. There’s also you, the gullible user who opens that email attachment that looks suspicious or clicks to install something that doesn’t quite seem right. Those missteps may bring with them extra software, such as adware or potentially unwanted programs (PUPs), that’s bundled together with the original piece of malware without your consent or awareness.

The exact method of infection depends on the particular strain and the attacker’s motives. A worm, for example, typically exploits security vulnerabilities and spreads via the internet using techniques like email attachments or drive-by downloads. Once installed, the worm can steal data and do other damage to systems and networks. A ransomware infection can encrypt files and devices and demand payment for the decryption key. Other malware is built for industrial espionage and cyberwarfare.

As a whole, mobile devices represent the biggest target for threat actors. Smartphones carry private data about financial accounts, travel plans, GPS locations, shopping and other information that is valuable to an attacker. In addition, mobile phones are constantly connected to Wi-Fi and cellular data and have a greater attack surface than desktop computers. The wide range of mobile operating systems and a large number of third-party applications present many opportunities for hackers to inject malicious code.