The Top 5 Malware Attack Types

Malware, which is a word meaning ‘Malicious Software’ and it refers to any malicious coding that can invade and infect a computer system in many ways. Therefore, there are many different types of malware and the number is increasing.
 
Some recent analysis by Kroll found that of the 292 cyber-attack cases reported to the Information Commissioner in the last year, 53 were malware-related, which is over 18% and the number is increasing. 
 
To reduce your risks, you should increase your computer security, and use more care when opening emails, as there is now an increasing number of Malware types of attack software being employed. 
 
Here we review the top 5 Types:
 
1. Trojans Horses
Trojan Horses, pretend to be a harmless software program. The name of course comes from Homer who used it to describe the Trojan Horse in the attack and invasion of Troy.
Once activated, Trojans Horses can slow the computer that they invade and then it can delete, copy and change data. 
Trojans are often used to steal money from on-line baking accounts.
 
2. Viruses
Viruses are malicious codes or an entire program attached to files and this affected file can duplicate itself, similar to the way a physical virus duplicates itself inside a living cell.
The virus begins its attack as the file or program is opened and begins working. The virus then duplicates itself and can go on to computers on the same network system with often sever effects.
This includes passwords theft and email spam sent out to friends and business colleagues without the user’s knowledge.
 
3. Malvertising
Malvertising is malware that has been stored inside online advertisements. 
Often this means that advertising that suggests you have won a prize once opened allows the malware to invade. 
A year ago in January 2018, malvertising known as ‘AdultSwine’ caused the Google Play Store to be invaded with porn advertisements which were focused on children. 
 
4. Worms
Worms are a particular type of malware virus that can duplicate without the user knowing or having done anything wrong. Worms can then spread through emails and instant messages, without the user knowing. And this often causes the network to malfunction.
Worms are a type of malware that uses weaknesses within network procedures. Worms can be delivered using a USB drive in order to take control of a network.
Worm was first used in this way in John Brunner’s novel The Shockwave Rider in 1975.
 
5. Ransomware
Ransomware is used by criminal attackers and can be sent via emails, infiltrated apps and websites.
The criminal then demands money, usually crypto-currency, and says once paid they with un-lock the systems and data that they have frozen.
 
The ransomware attackers send messages threatening to destroy data unless victims pay them money and examples of this type of Ransomware are WannaCry, which started in May 2017 and lasted till March 2018 and this also affected Boeing. 
This strain of malware managed to affect the networks of Britain’s NHS, FedEx and Hitachi, among many other organisations. 
The attack has been attributed to the Lazarus group, who are said to be pirated by the North Korean Government.
 
News By CSI:          Image: Nick Youngson
 
You Might Also Read:
 
Cybercrime Is The Biggest Evolving Source Of Crime In The UK:
 
« Five Arrested In UK Cybercrime Raids
Wicked Dark Web Wish List »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Maureen Data Systems (MDS)

Maureen Data Systems (MDS)

Our mission at Maureen Data Systems is to digitally transform business environments with the use of cloud infrastructure, security and privacy controls, data analytics, and managed services.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

Usenix

Usenix

Usenix brings together the community of engineers, system administrators, scientists, and technicians working on the cutting edge of computing.

Veritas Technologies

Veritas Technologies

Veritas provide industry-leading solutions that cover all platforms with backup and recovery, business continuity, software-defined storage and information governance.

Department of Justice & Equality - Cybercrime Division - Ireland

Department of Justice & Equality - Cybercrime Division - Ireland

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

Allthenticate

Allthenticate

Allthenticate Single Device Authentication (SDA), enables seamless authentication in both the physical and digital words while unifying management in one easy-to-use interface.

Cyphra

Cyphra

Cyphra’s team provide cyber security consulting, technical and managed services expertise and experience to support your organisation.

TAV Technologies

TAV Technologies

TAV Technologies is a provider of technology services to the aviation industry in areas including airport infrastructure systems, digital transformation and cybersecurity.

McCrary Institute - Auburn University

McCrary Institute - Auburn University

The McCrary Institute seeks practical solutions to real-world problems in the areas of cyber and critical infrastructure security.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Ruptura InfoSecurity

Ruptura InfoSecurity

Ruptura InfoSecurity provide CREST Accredited Penetration Testing & Offensive Security Services. We secure your critical assets through targeted and research driven penetration testing.

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

Dropzone AI

Dropzone AI

Dropzone AI are creating a generational leap in SecOps by using AI to automate cyber expertise and tooling.

GISEC Global

GISEC Global

GISEC Global provides vendors and companies from around the world with access to lucrative opportunity to capitalize on what's set to become one of the world's booming markets.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

Cybermate

Cybermate

Cybermate is the first affordable, gamified ‘Psybersecurity’ awareness training platform that reduces behavioural risk and achieves compliance with Australian cybersecurity standards.

BeckTek

BeckTek

BeckTek specialize in IT Cyber Security & Support, helping clients run their businesses faster, easier and more profitably.