BotNet News

Your source for Online Security News

A malware threat is any software or device that, when covertly inserted into a system, can compromise the confidentiality, integrity, or availability of data or applications. Examples include computer viruses, worms, Trojan horses, spyware, adware, and more.

The vast majority of modern malware threats leverage multiple techniques to gain a foothold in the endpoint. Once in, hackers can exploit the opportunity to steal account credentials, sell access to computing resources, collect personal information, extort money, or any combination of these.

Viruses, worms, and trojan horses all spread by some form of social engineering (often an email attachment disguised to look like a routine form or file), then make unauthorized changes on the system; these can include monitoring user behavior, displaying pop-ups, modifying search engine results, displaying product discounts in a browser, or adding icons to the desktop. Once deployed, they can also serve up advertisements or download one of the other types of malware discussed below.

Adware masquerades as useful type of software and serves up ads in order to generate revenue for its author. Spyware hides, like a spy, in the background of a device, collecting information without the user’s knowledge; often sensitive information such as credit card details or passwords. Ransomware is the most feared form of malware. It locks down a device or an entire network and won’t unlock until the victim pays a ransom.

Billion of consumer-owned devices that connect to the Internet create a huge attack surface for malware, from adware and ad bots to keyloggers and cryptojacking. Cryptojacking is the act of using a device to mine for cryptocurrency, requiring the computing power of a machine to solve complex equations for a digital currency that can then be sold or used as a form of payment.