Malware, Adware, Keyloggers and Other Threats
Malware is malicious software that can infect a device, steal data or cause damage. It can be spread through links, files or infected websites. Cybercriminals use social engineering tricks to frighten users and encourage them to install malware. For example, fake pop-ups may warn users their systems are infected with a virus and recommend they download a fake “security” program. Adware can also track a user’s online activity to deliver ads and generate revenue for the attackers. Keyloggers, which secretly record everything a user types on their keyboard, can harvest sensitive information like passwords and account details.
Many malware infections start with a vulnerability, bug or flaw that allows it to be downloaded by an attacker. Backdoor viruses, RATs, bots and spyware exploit these vulnerabilities to gain unauthorized access and carry out their attacks. Exploits can target a wide variety of devices and operating systems. Some exploits are known and patched, while others are a threat because they expose unknown or zero-day vulnerabilities.
The threat landscape for malware is constantly evolving. Attackers can create and deploy new variants of adware, scareware, ransomware and other threats quickly. The proliferation of connected home, office and business systems — including smart TVs, refrigerators and cars — offer an ever-expanding attack surface for worms, Trojans, cryptominers and other threats. Attackers can even use drones and airborne threats to spy on and infect machines from the sky or through a building’s ventilation system.