BotNet News

Your source for Online Security News

Whether stealing passwords, encrypting data, sabotaging systems or hijacking devices to form botnets, malware attacks can have devastating effects. They can corrupt or delete critical system files, change core computer functions, spy on your activity or display unauthorized advertisements. They can also tamper with or damage physical hardware and can steal confidential information.

Cybercriminals deploy malware to sabotage devices and systems for their own financial or political gain. For example, ransomware holds personal or business data hostage by encrypting the device or file and demands payment to regain access to the information. Even after paying a ransom, companies that fall victim to this type of malware are often unable to get the information back, destroying their reputation and competitive advantage.

Malware can be delivered in a variety of ways, from floppy disks to USB drives to instant messaging networks. A cybercriminal can even remotely control an infected system to download and install additional malicious software. Trojan horses masquerade as harmless programs and, when activated, damage the host system. Computer worms replicate themselves to spread from file to file across a network. Logic bombs hidden in programs lie dormant until they’re triggered by a certain condition, or released at a predetermined time.

Viruses, worms, Trojans, rogue software, spyware, cryptojackers, adware and bots all belong to the family of malware. Each attack is based on some form of social engineering or trickery, with a cybercriminal trying to coerce you into inadvertently installing and running the malware. Examples of this include a pop-up that warns you have a virus and asks you to download a program to clean it; a fake “security” program that installs on your device; or an app that infects your computer with other types of malware.