How Malware Infects Devices
Malware is software designed to infiltrate and damage devices. Hackers use malware to steal or encrypt data, disrupt operations, spy on users and organizations, gain access to systems, or hold information hostage until payment is made (ransomware). Malware can also infect a device by being inserted into a USB flash drive, peer-to-peer file-sharing services, free program download bundles, and text messages.
In the early days of PCs, hackers used phishing and other social engineering tricks to spread infected links and files. As technology evolved, attackers began using exploitable software vulnerabilities and rogue programs to infect devices. Attackers developed worms that replicated from one file or computer to another and infected networks of computers. They started to embed malicious code in popular software like Microsoft Word and used instant messaging services to infect mobile devices.
When malware infiltrates a device, it can make unauthorized changes to the system: it might display advertisements, hijack search results, modify browser settings, add new toolbars and extensions, or reroute users to fraudulent websites or phishing pages. It can also hide from other security software, gain administrator privileges to the device, or stay undetected by the operating system.
When you suspect malware, take prompt action: shut down the device and isolate affected systems from the network; perform a full scan with antivirus products; and keep operating system tools disabled. You might also want to consider contacting your local FBI field office or Cybersecurity and Infrastructure Security Agency and following your organization’s incident response guidelines.