Information Security

⌘K
  1. Home
  2. Docs
  3. Information Security
  4. Malicious Software
  5. Introduction to Malicious Software

Introduction to Malicious Software

Malicious software, commonly known as malware, is any software intentionally designed to cause damage to a computer, server, client, or computer network.

Malware operates against the interests of the user and can be used to steal data, monitor user activity, corrupt files, or gain unauthorized access to systems

  • It can steal data, disrupt operations, gain unauthorized access, or damage systems.
  • It can spread via email attachments, infected websites, software downloads, or removable media.
Types of Malicious Software

A virus is a type of malicious software (malware) that attaches itself to a legitimate program or file and spreads from one host to another when the infected program is executed.

  • Viruses require human action to spread, such as opening a file, clicking a link, or running a program.
  • Once activated, a virus can corrupt, delete, or steal data; damage software and systems; or even render a computer inoperable.

Types of Viruses:

  • File Infector Virus – Attaches to executable files and spreads when the file is run.
  • Macro Virus – Infects documents like Word or Excel by embedding malicious code in macros.
  • Boot Sector Virus – Infects the master boot record (MBR) of storage devices.
  • Polymorphic Virus – Changes its code to avoid detection by antivirus software.
  • Resident Virus – Installs itself in memory and infects files without being re-run.

Preventive Measures:

  • Use updated antivirus software.
  • Avoid opening email attachments from unknown sources.
  • Keep operating systems and applications updated.
  • Perform regular system scans.
  • Do not download software from untrusted websites.

A worm is a self-replicating malware that spreads independently over networks by exploiting security vulnerabilities, without requiring user action.

  • Unlike viruses, worms do not need to attach to existing files or programs to spread. They consume system resources, slow down networks, and can install backdoors for further attacks.
  • Worms often spread via email, network shares, or the internet.

Types of Worms:

  • Email Worms – Spread via infected email attachments or links.
  • Internet Worms – Spread by exploiting vulnerabilities in network services.
  • File-Sharing Worms – Spread through peer-to-peer file sharing networks.
  • Instant Messaging Worms – Spread via messaging apps and contacts.

Preventive Measures:

  • Use strong firewalls and intrusion detection/prevention systems (IDS/IPS).
  • Regularly patch and update software and systems.
  • Disable autorun/autoplay features on external drives.
  • Avoid clicking suspicious links in emails or chats.
  • Use network segmentation to isolate critical systems.

A Trojan horse, or Trojan, is a type of malware that disguises itself as a legitimate or useful program to trick users into downloading and executing it.

  • Unlike viruses and worms, Trojans do not replicate themselves. Once installed, they can create backdoors, steal data, spy on user activities, or install additional malware.
  • Users are often fooled into installing Trojans by fake software, ads, or infected email attachments.

Types of Trojans:

  • Backdoor Trojan – Opens unauthorized access to a hacker.
  • Downloader Trojan – Downloads other malware onto the infected system.
  • Banking Trojan – Steals banking credentials and financial information.
  • Remote Access Trojan (RAT) – Gives attackers remote control of a system.
  • Spy Trojan – Monitors user behavior and collects sensitive data.

Preventive Measures:

  • Do not install software from untrusted or unknown sources.
  • Avoid clicking suspicious links or pop-up ads.
  • Use real-time antivirus and antimalware tools.
  • Enable firewalls and monitor outbound connections.
  • Educate users on phishing and social engineering risks.

Spyware is a type of malware designed to secretly monitor and collect information about users and their online or offline activities without their knowledge or consent.

Spyware can track keystrokes (keyloggers), browsing habits, search history, login credentials, and financial details. It may also alter system settings, redirect web browsers, or degrade system performance. It is often bundled with freeware or downloaded through malicious websites.

Types of Spyware:

  • Keyloggers – Record everything a user types on their keyboard.
  • Adware – Displays unwanted advertisements and may track browsing behavior.
  • Tracking Cookies – Monitor user behavior across websites.
  • System Monitors – Capture all system activity and send it to a remote server.

Preventive Measures:

  • Install and update antispyware and antivirus software.
  • Avoid installing unknown browser extensions or add-ons.
  • Use pop-up blockers and ad blockers.
  • Regularly clear cookies and browsing data.
  • Review and control app permissions on devices.

A Keylogger is a type of spyware or monitoring software that secretly records every keystroke made on a keyboard.

Keyloggers are used to capture sensitive information such as usernames, passwords, credit card details, and personal messages. They can be installed through malicious downloads, email attachments, or physical access to a device. Keyloggers can be either software-based or hardware-based.

Types of Keyloggers:

  • Software Keylogger – Installed on the device to log keystrokes silently.
  • Hardware Keylogger – A physical device connected between the keyboard and computer to record keystrokes.

Preventive Measures:

  • Use antivirus and anti-spyware software.
  • Avoid downloading software from untrusted websites.
  • Regularly update your operating system and security tools.
  • Enable on-screen keyboard for sensitive logins.
  • Check for unusual hardware devices or USBs attached.

A Rootkit is a collection of malicious tools that enable unauthorized users to gain and maintain privileged access to a system while actively hiding its presence.

  • Rootkits operate at the system or kernel level and are designed to conceal their presence and the presence of other malware.
  • They are often used to hide keyloggers, backdoors, or Trojans, making them difficult to detect. Once installed, rootkits can disable security software and manipulate system functions.

Types of Rootkits:

  • User-mode Rootkits – Operate at the application level.
  • Kernel-mode Rootkits – Operate at the operating system kernel level and are harder to detect.
  • Firmware Rootkits – Infect firmware such as BIOS or routers.
  • Bootkits – Target the bootloader to execute before the OS.

Preventive Measures:

  • Use up-to-date antivirus and anti-rootkit tools.
  • Avoid running untrusted software or opening suspicious attachments.
  • Enable secure boot settings in BIOS/UEFI.
  • Perform regular system scans in safe mode.
  • If infected, sometimes only a full OS reinstall can remove it.

A Backdoor is a hidden method of bypassing normal authentication or security mechanisms to gain unauthorized access to a computer or network.

  • Backdoors are often installed by attackers after exploiting a vulnerability or by malicious insiders.
  • Once installed, attackers can remotely control the system, install malware, steal data, or use the system for launching further attacks.

Types of Backdoors:

  • Application-level Backdoors – Hidden access built into software.
  • System Backdoors – Exploit system vulnerabilities to gain access.
  • Remote Access Trojans (RATs) – Malware that acts as a backdoor allowing remote control.

Preventive Measures:

  • Keep software and systems updated with patches.
  • Use firewalls to block unauthorized access.
  • Monitor network traffic for unusual behavior.
  • Conduct regular vulnerability assessments.
  • Use security solutions that detect abnormal activity.

A Zombie is a computer that has been compromised by malware and is controlled remotely by an attacker, typically without the user’s knowledge.

  • Zombies are usually part of a botnet — a network of infected devices — and are used for malicious purposes such as sending spam emails, launching Distributed Denial-of-Service (DDoS) attacks, or spreading malware.
  • Since the original user has no control, the system appears normal while performing harmful activities in the background.

Preventive Measures:

  • Install and maintain updated antivirus software.
  • Use firewalls and intrusion detection systems.
  • Avoid clicking on suspicious links or downloading unknown files.
  • Monitor system performance for unexpected slowdowns.
  • Disconnect infected machines from the internet and perform a full malware cleanup.

A Bot (short for “robot”) is a type of software application or malware that performs automated tasks, often under the control of a remote attacker.

Bots can be used for legitimate tasks like indexing websites (by search engines), but in a malicious context, bots are typically installed on compromised devices and become part of a botnet — a network of infected computers.

  • These bots can be remotely controlled to send spam, perform DDoS attacks, steal data, or spread other malware.

Preventive Measures:

  • Keep antivirus and anti-malware software up to date.
  • Avoid clicking suspicious links or downloading unknown files.
  • Use firewalls to monitor and control traffic.
  • Regularly update operating systems and software patches.
  • Monitor system behavior for abnormal activity.

Phishing is a cyberattack technique in which attackers impersonate legitimate entities to trick users into revealing sensitive information such as login credentials, credit card numbers, or personal data.

  • Phishing is often carried out via email, text messages (SMS phishing or “smishing”), or fake websites.
  • Attackers create messages that appear to come from trusted sources like banks, government agencies, or colleagues, urging victims to click on malicious links or download attachments.

Types of Phishing:

  • Email Phishing: Generic emails targeting many users.
  • Spear Phishing: Targeted phishing toward a specific individual or organization.
  • Whaling: Aimed at high-profile targets like executives or government officials.
  • Smishing: Phishing via SMS.
  • Vishing: Phishing via voice calls.

Preventive Measures:

  • Do not click on suspicious links or open unknown attachments.
  • Verify the source of messages claiming to be from trusted institutions.
  • Use email filters and spam detection tools.
  • Educate users about phishing tactics.
  • Enable multi-factor authentication (MFA) for critical accounts.

Spam email refers to unsolicited, irrelevant, or inappropriate messages sent over the internet, typically to a large number of users for advertising, phishing, or spreading malware.

  • Spam emails are commonly used to deliver advertisements or malicious links and attachments.
  • They can lead to identity theft, malware infections, and phishing attacks if users interact with the content.

Preventive Measures:

  • Use spam filters in your email client.
  • Avoid giving out your email address to untrusted websites.
  • Never respond to spam messages.
  • Regularly update your email security settings.
  • Mark unwanted messages as spam to improve filtering.

System corruption refers to the damage or disruption of system files, settings, or resources that affects the normal operation of a computer or network system.

  • System corruption can result from malware, power failures, hardware issues, or accidental user actions.
  • It can cause programs to crash, data loss, system instability, or complete failure to boot the operating system.

Preventive Measures:

  • Use antivirus and anti-malware tools.
  • Regularly back up important data.
  • Avoid force-shutting down the system or interrupting updates.
  • Use reliable power sources and surge protectors.
  • Install only trusted software and drivers.

An Advanced Persistent Threat (APT) is a prolonged and targeted cyberattack in which an intruder gains unauthorized access to a network and remains undetected for an extended period.

  • APT attackers are highly skilled and often state-sponsored or organized criminal groups. They aim to steal data, monitor communications, or disrupt operations.
  • The attack is “advanced” due to the sophisticated techniques used and “persistent” because of the long-term stealthy presence in the network.

Stages of an APT:

  • Initial Access – Exploiting a vulnerability or using phishing.
  • Establish Foothold – Installing backdoors or malware.
  • Escalate Privileges – Gaining higher system access.
  • Internal Reconnaissance – Mapping the internal network.
  • Data Exfiltration – Stealing sensitive data.
  • Maintain Presence – Avoiding detection for long-term access.

Preventive Measures:

  • Employ network segmentation and strong access controls.
  • Use advanced intrusion detection/prevention systems (IDS/IPS).
  • Monitor logs and traffic patterns for anomalies.
  • Apply security patches promptly.
  • Educate employees on phishing and social engineering threats.

How can we help?

Leave a Reply

Your email address will not be published. Required fields are marked *