{"id":1898,"date":"2020-07-06T12:50:10","date_gmt":"2020-07-06T12:50:10","guid":{"rendered":"http:\/\/blog.einnosec.com\/?p=1898"},"modified":"2022-02-28T09:36:20","modified_gmt":"2022-02-28T09:36:20","slug":"malware-ransomware-different-types-of-malware-part-ii","status":"publish","type":"post","link":"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/06\/malware-ransomware-different-types-of-malware-part-ii\/","title":{"rendered":"Malware\/Ransomware &#8211; Different Types of Malware Part II"},"content":{"rendered":"\n<p style=\"font-size:18px\">The e-InnoSec team recently completed a 6-part series to guide organizations with leveraging GDPR preparation for CCPA. The Malware\/Ransomware 4-part series is focused on helping every organization on how to protect from Malware\/Ransomware.<\/p>\n\n\n\n<ul><li><strong>Part I &#8211; How do I get malware?<\/strong><\/li><li><strong><a href=\"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/06\/malware-ransomware-how-to-protect-against-malware-part-iv\/\">Part II &#8211; Different types of malware<\/a><\/strong><\/li><li><strong><a href=\"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/05\/securing-cloud-data-cloud-encryption-considerations-part-iii\/\">Part III &#8211; How can I tell if I have a malware infection?<\/a><\/strong><\/li><li><strong><a href=\"https:\/\/blog.einnosec.com\/index.php\/2020\/07\/06\/malware-ransomware-how-can-i-tell-if-i-have-a-malware-infection-part-iii\/\">Part IV &#8211; How to protect against malware?<\/a><\/strong><\/li><\/ul>\n\n\n\n<p style=\"font-size:18px\">Malware, or \u201cmalicious software,\u201d is an umbrella term that describes any malicious program or code or any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess.<\/p>\n\n\n\n<p style=\"font-size:18px\">The Part I was focused on \u201cHow do I get malware?\u201d and the Part II discusses \u201cDifferent types of Malware\u201d. Here is brief about different types of Malware:<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Virus<\/strong> <\/span>&#8211; A Virus is a malicious executable code attached to another executable file.<\/p>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Trojan <\/span><\/strong><span class=\"has-inline-color has-black-color\">&#8211; <\/span>A Trojan horse is malware that carries out malicious operations under the appearance of a desired operation such as playing an online game.<\/p>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Spywar<\/span><\/strong><span class=\"has-inline-color has-black-color\"><strong>e <\/strong>&#8211;<\/span> Spyware collects information and sends it to the hacker. It is malware designed to spy on you.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Adware<\/strong> &#8211; The aggressive advertising software can undermine your security just to serve you ads.<\/span><\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Worms<\/strong> &#8211; <\/span>Worms are a type of malware similar to viruses, self-replicating in order to spread to other computers over a network, usually causing harm by destroying data and files.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Botnets<\/strong> &#8211; <\/span>Botnets are networks of infected computers that are made to work together under the control of an attacker.<\/p>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Rootkit &#8211; <\/span><\/strong><span class=\"has-inline-color has-black-color\">A rootkit is <\/span>malicious software that allows an unauthorized user to have privileged access to a computer and to restricted areas of its software.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Malicious Crypto mining &#8211; Crypto mining and crypto-jacking<\/strong> are associated with extremely high processor activity that has noticeable side-effects.<\/span><\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Keylogger<\/strong> &#8211; <\/span>A keylogger is a type of spyware that secretly logs your keystrokes so thieves can get your account information, banking and credit card data, user names, passwords, and other personal information.<\/p>\n\n\n\n<p style=\"font-size:18px\"><strong><span class=\"has-inline-color has-black-color\">Backdoors <\/span><\/strong><span class=\"has-inline-color has-black-color\">&#8211; <\/span>A backdoor refers to any method by which authorized and unauthorized users are able to get around normal security measures and gain high-level user access (aka root access) on a computer system, network, or software application.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Exploits<\/strong> &#8211; <\/span>Exploits are a type of malware that takes advantage of bugs and vulnerabilities in a system in order to allow the exploit\u2019s creator to take control.<\/p>\n\n\n\n<p style=\"font-size:18px\"><span class=\"has-inline-color has-black-color\"><strong>Ransomware<\/strong> &#8211; <\/span>Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to an individual or an organization. This kind of malware typically locks down your computer and your files and threatens to erase everything unless you pay a ransom.<\/p>\n\n\n\n<p style=\"font-size:18px\">There are different ways to spread malware. Email, instant messaging, removable media, or websites are just a few options leveraged to infect systems. One challenge when performing an examination is determining how the malware ended up on the system which is also referred to as identifying the malware\u2019s initial infection vector (IIV). Below are a few examples:<\/p>\n\n\n\n<ul><li><strong><span class=\"has-inline-color has-black-color\">Dropped \u2013 <\/span>Malware delivered by other malware already on the system, an exploit kit, infected third-party software, or manually by a cyber threat actor.<\/strong><\/li><li><strong><span class=\"has-inline-color has-black-color\">Multiple \u2013 <\/span>Refers to malware that currently favors at least two vectors.<\/strong><\/li><li><strong><span class=\"has-inline-color has-black-color\">Malspam \u2013 <\/span>Unsolicited emails, which either direct users to download malware from malicious websites or trick the user into opening malware through an attachment.<\/strong><\/li><li><strong><span class=\"has-inline-color has-black-color\">Network \u2013 <\/span>Malware introduced through the abuse of legitimate network protocols or tools, such as SMB or remote PowerShell.<\/strong><\/li><li><strong><span class=\"has-inline-color has-black-color\">Malvertisem<\/span>ent&nbsp;\u2013 Malware introduced through malicious advertisements. Slayer, a macOS trojan, is the first malware since May 2018 to rely on this vector within the Top 10 Malware list.<\/strong><\/li><\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The e-InnoSec team recently completed a 6-part series to guide organizations with leveraging GDPR preparation for CCPA. The Malware\/Ransomware 4-part series is focused on helping&#8230;<\/p>\n","protected":false},"author":1,"featured_media":2729,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[71,117],"tags":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1898"}],"collection":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/comments?post=1898"}],"version-history":[{"count":5,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1898\/revisions"}],"predecessor-version":[{"id":2370,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/posts\/1898\/revisions\/2370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media\/2729"}],"wp:attachment":[{"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/media?parent=1898"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/categories?post=1898"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.einnosec.com\/index.php\/wp-json\/wp\/v2\/tags?post=1898"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}