What are the most common types of malware?
In order to combat malware, it’s critical that you recognize the different types of malware to avoid any financial and reputation repercussions. Here’s our list of the most significant and common malware types.
Adware, short for advertising-supported software, is a type of malware that delivers unwanted advertisements such as pop-up ads. Often, free versions of software will be inundated with adware which can not only be intrusive but can also often be infected with other viruses such as spyware, which tracks user activity and steals information.
Adware is normally approved by software technicians and advertisers, and typically isn’t malicious, but when bundled with spyware it can be very dangerous. A report from Kaspersky shows it’s particularly problematic on mobile devices, making up almost one in five malware cases on these platforms.
Bots are popular software programs created to perform specific operations. Bots can be used for non-malicious purposes and aren’t uncommon, however they can often be used by third parties to perform DDoS attacks, render advertisements on websites, collect server data and distribute malware through platforms like downloading websites. According to one report, as many as one in five website requests were generated by bad bots in 2018.
A rootkit is a type of software that hides the actuality that a computer has been compromised by replacing vital system functions, which oftentimes means that they are overlooked by your antivirus software by ‘hiding in plain sight’. The rootkit itself isn’t harmful, but it is the malicious software that it hides – malware, bots and worms – that is harmful to a computer.
A 2016 report from McAfee shows that the number of new rootkit malware samples dropped sharply, continuing a long-term downward trend in this type of attack. However, rootkits should not be ignored, as when the rootkit has infiltrated the operating system it automatically activates before boot up and therefore makes it extremely difficult to detect. This therefore presents a dynamic way for the targeted computer to be accessed without the users notice, and the very nature of the rootkit makes them notoriously difficult to remove, but many anti-virus programs such as Kasperky have tools that can be used to remove them.
4. Computer viruses
Computer viruses are the most commonly known form of malware, with around 57% of computers with malware being those infected with viruses. The terms 'malware' and 'virus' are often used interchangeably, but in fact, a computer virus is a specific type of malware that, like a real virus, is capable of duplicating itself and spreading to other devices, attaching itself to various programs and executing code when a user launches an infected program.
Damage from viruses can be very severe as they can spread through script files, documents and cross-site scripting vulnerabilities in web apps. Typically, they:
- Steal data
- Attack host computers and networks
- Create botnets
- Steal money
- Render advertisements
As businesses fight various types of malware in an increasingly digital world, computer viruses have become rare, comprising less than 10% of all malware. But nevertheless, a strong and up to date antivirus program is the best way to protect a device against viruses; examples include Norton and Avast.
Worms are another common form of malware. Typically, they spread over computer networks by exploiting vulnerabilities in operating systems. They cause harm to host networks by consuming bandwidth and overloading web servers. They can also deliver “payloads” – pieces of code written to perform specific actions on infected computers that can be damaging. Like viruses, they are designed to steal data, delete files and create botnets. Unlike viruses however, worms can spread without the aid of human intervention, for example by creating mass emails with infected attachments to email lists.
A Trojan is a type of malware that sneaks onto your device by disguising itself as a regular file or piece of software and duping users into downloading or installing it. It can give third party access to your device, giving the hacker the ability to steal sensitive data and information, install more malware, modify files, monitor user activity, create botnets and anonymize internet activity by the attacker.
The use of Trojans is, however, on the decline. Malwarebytes' 2020 State of Malware report found, for example, that in 2019, the volume of these attacks fell by 7% from 2018.
Spyware is a form of malware that obtains covert information from an infected computer without the user’s permission or knowledge. These activities can include activity monitoring, collecting keystrokes and data harvesting to name a few. Spyware can be used to capture incredibly sensitive information and is one of the worst forms of malware on this list as it can have a long list of additional capabilities, ranging from modifying security settings of software or browsers to interfering with network connections.
Spyware spreads by exploiting software vulnerabilities, bundling itself with legitimate software, or attaching itself via Trojans. With government research into cyber-security showing that nearly 7 out of 10 attacks on all firms involved spyware and viruses, it is imperative to ensure that you have company-wide antivirus software in place.
Being aware of the kinds of malware that could infect your network is essential. There are many families of malicious software to be aware of and taking the time to familiarize yourself and your employees with them and their symptoms can not only be greatly beneficial to your company’s security, but to your personal online security too.
Keystroke loggers, or keyloggers, are an emerging class of malware that aims to steal a user's information by creating a record of every entry made on a device's keyboard, and are often deployed as part of a Trojan attack. While there are legitimate uses for this type of software, this also makes them very hard for many antimalware programs to detect. Hackers can use them to gather information such as passwords, bank details or other confidential details.
Another type of malware that's growing in popularity, ransomware works by encrypting critical files on a system, then demanding payment in exchange for the decryption key. This type of malware attack can be especially crippling to many businesses, as it can leave them without access to essential files and applications.
On average, hackers charge around $13,000 to recover files, but for larger, targeted attacks the cost of retrieving files can be hundreds of thousands of dollars, with no guarantee the criminals will keep their word if paid. The 2017 WannaCry attack is perhaps the best-known ransomware attack. So what can you do if you fall victim to this malicious software? Check out our step-by-step guide to learn how to deal with this type of malware.
10. Spear phishing
Spear phishing isn't a type of malware in itself, but rather a common delivery method that it's important for business users to be aware of. It works by sending targeted emails to individuals encouraging them to open an attachment or click on a web link, from which malware can be downloaded or details harvested.
For example, it could purport to come from an individual or organization you have an existing relationship with, which makes it more likely for the recipient to trust what it says and follow the instructions. Teaching employees how to recognize and respond to these attacks is one of the best things any business can do to reduce its risk of falling victim to this type of malware.
Like spear phishing, scareware uses social engineering to try and trick people into downloading more dangerous malware, or paying for unnecessary software. A typical piece of scareware may work by creating a popup on a user's machine warning them their device has been infected by malware, then directing them to a bogus website where they’re encouraged to download a fake antivirus program, which might do nothing or may even actively infect a PC with other malware.
- 4 Social Engineering Tactics Hackers Are Using to Fool Your Staff
- The 2021 Ransomware Survey Report
- How to Create a Successful Cybersecurity Plan
Access the latest business knowledge in IT
Join the conversation...