Malware attack

10. Malware attack

Malicious software can be described as unwanted software that is installed in your system without your consent. It can attach itself to legitimate code and propagate; it can lurk in useful applications or replicate itself across the Internet.

Here are some of the most common types of malware:

Macro viruses — These infections contaminate applications like Microsoft Word or Excel. Macro viruses are attached to an application's initialization sequence. At the point when the application is opened, the virus executes directions prior to moving control to the application. The virus imitates itself and appends to other code in the computer system.

File infectors — File infector viruses typically append themselves to executable code, for example, .exe files. The infection is introduced when the code is stacked. Another variant of a File infectors partners itself with a document by making an infection document with a similar name, yet a .exe expansion. Hence, when the document is opened, the infection code will execute.

System or boot-record infectors — A boot-record virus connects to the expert boot record on hard plates. At the point when the system is started, it will take a look at the boot sector and load the virus into memory, where it can spread to different plates and PCs.

Polymorphic viruses — These infections disguise themselves through shifting patterns of encryption and decryption. The encrypted virus and a related mutation engine are at first decrypted by a decryption program. The virus continues to contaminate a space of code. The mutation engine then, at that point develops another decryption standard and the virus encrypts the mutation engine and a duplicate of the infection with a calculation comparing to the new decryption routine. The encrypted package of mutation engine and virus is joined to the new code, and the cycle rehashes. Such infections are hard to identify however have an undeniable degree of entropy on account of the numerous alterations of their source code. Against infection programming or free instruments like Process Hacker can utilize this component to identify them.

Stealth viruses — Stealth viruses take over system functions to conceal themselves. They do this by compromising malware detection software so that the software will report an infected area as being uninfected. These viruses conceal any increase in the size of an infected file or changes to the file’s date and time of the last modification.

Trojans — A Trojan or a Trojan horse is a program that hides in a useful program and usually has a malicious function. A major difference between viruses and Trojans is that Trojans do not self-replicate. In addition to launching attacks on a system, a Trojan can establish a back door that can be exploited by attackers. For example, a Trojan can be programmed to open a high-numbered port so the hacker can use it to listen and then perform an attack.

Logic bombs — A logic bomb is a type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time.

Worms — Worms differ from viruses in that they do not attach to a host file, but are self-contained programs that propagate across networks and computers. Worms are commonly spread through email attachments; opening the attachment activates the worm program. A typical worm exploit involves the worm sending a copy of itself to every contact in an infected computer’s email address In addition to conducting malicious activities, a worm spreading across the internet and overloading email servers can result in denial-of-service attacks against nodes on the network.

Droppers — A dropper is a program used to install viruses on computers. In many instances, the dropper is not infected with malicious code and, therefore might not be detected by virus-scanning software. A dropper can also connect to the internet and download updates to virus software that is resident on a compromised system.

Ransomware — Ransomware is a type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid. While some simple computer ransomware can lock the system in a way that is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called cryptoviral extortion, which encrypts the victim’s files in a way that makes them nearly impossible to recover without the decryption key.

Adware — Adware is a software application used by companies for marketing purposes; advertising banners are displayed while any program is running. Adware can be automatically downloaded to your system while browsing any website and can be viewed through pop-up windows or through a bar that appears on the computer screen automatically.

Spyware — Spyware is a type of program that is installed to collect information about users, their computers, or their browsing habits. It tracks everything you do without your knowledge and sends the data to a remote user. It also can download and install other malicious programs from the internet. Spyware works like adware but is usually a separate program that is installed unknowingly when you install another freeware application.

If you like the please do share it and if you have any suggestion or queries regarding the post comment below.