Types of Internet Malware & Solutions by Antivirus Software
The eleven types of Internet malware are viruses, worms, Trojans, backdoors, and keyloggers. And secondly, root-kits, spyware, rogues, diallers, ransomware, and hijackers.
What is malicious software (malware)?
What is a malware or harmful program or malware?
The eleven types of malware. There are eleven major types of malware as of the publication date of this article.
Computer virus
A computer virus reproduces itself from file to file on the same computer. It is the oldest and most prevalent type of Internet malware.
Computer worm (worm)
A computer worm does not reproduce itself from one file to another but from one computer to another, via a local network or the Internet. This is a category of malware that is often confused with the previous one.
And if you want to know more about the 6 types of computer viruses, follow this link.
Trojan horse (Trojan)
A Trojan horse hides malicious software, called a payload, in another perfectly healthy program. Often a Trojan horse installs a backdoor or a keylogger on a victim computer. You will see these two categories described below.
It is a very discreet category of malware. Thus the victim user will never notice anything without good protection software.
Backdoor
A backdoor is a means of hidden access to a computer, remotely and discreetly, to perform all kinds of harmful actions provided by this program. In other words, a backdoor allows access to a remote computer without its user noticing.
As a harmful action, it is possible to read files from a remote computer, modify them, delete them. And install any malicious program.
One example of this type of Internet malware is a spam server. Or a website saturation program. The infected computer becomes harmful without the knowledge of its user: this is called a zombie.
Keylogger
A keylogger records all keystrokes on the infected computer. And sends them to the hacker over the Internet (eg by email).
Often its purpose is to intercept the victim's pseudonyms and passwords on websites. Thus the hacker can usurp his “virtual identity”, or even steal his money on financial sites (bank, online auctions, etc.).
Rootkit (invisible program)
A rootkit is a program that hides another from the eyes of the computer user. While not as harmful as such, it is often used for malicious purposes.
In addition, this category of malware is embedded deep into the operating system and protection software often has trouble detecting it.
Spyware
Spyware, or spyware, records the browsing habits of Web users, possibly with contact information, and sends them to a recipient disrespectful of privacy of Internet users. Here too everything happens without the knowledge of the Internet user.
Rogue (fake antivirus or fake anti-spyware)
A rogue is a bogus antivirus or anti-spyware, which manifests itself in the form of a pop-up advertisement. Indeed it opens continuously, warning of a so-called infection, and offers the user to download a paid program to "disinfect" the computer. Thus the advertising window opens regularly until the victim buys the fake antivirus. In conclusion, a rogue is a big scam.
Dialler (phone number dialler)
A dialler tries to dial a premium rate telephone number on your telephone modem.
And the pirate is remunerated by a commission on the price of the surcharged call. Diallers only work on PSTN modems, using the good old classic PSTN signal from the telephone line.
But this category of malware is of course obsolete today, in the age of ADSL or fiber internet boxes and speeds of 300 Mbps. It was however a threat at the date of the first publication of this article and speeds in 56 kpbs, in 2002.
Ransomware: ransomware or ransomware
However, this category of malware is much more recent. Ransomware or ransomware is ransomware that encrypts certain files on the victim's computer. Then the randomiser offers the decryption key for money, in other words, to recover the files you have to pay a ransom. Lorobot and Gpcode can be cited as specimens.
Browser Hijacker
A browser hijacker is a malicious program that hijacks your browser. And this type of malware has evolved into more dangerous forms over time.
In early forms, a browser hijacker changed a browser setting, such as the start page, bookmarks, or search page. It seemed easy to fix, but the program would block or undo the fix. For example by re-modifying the parameter when restarting the operating system.
Today a browser hijacker hijacks the intended use of Chrome, Edge, or Safari for several possible reasons:
- This may include inserting intrusive ads into the web pages you visit.
- Or take you to one or more specific websites.
- Or spy on you or steal your confidential information.
- Even introduce a virus or other malicious software,
- or even steal your money thanks to the confidential information stolen.
And to install it you are prompted to download an application or an extension for your browser.
How to protect yourself from it?
By taking manual precautions when connecting to the Internet, by setting up your mailbox, and by equipping yourself with security software. In addition to your antivirus software, you should regularly run a scan with one of the online antiviruses on this page.
Other Internet nuisances
This inventory does not show all the nuisances on the Internet, but those that require a program to be executed on the victim's computer to be carried out.
Form-jacking steals your money without installing anything on your PC, Mac, mobile, or tablet! This is 1 of 5 Internet malware categories presented in a 2nd list with crypto-jacking, PUPs, zero-day exploits, and malicious websites.
Other Internet nuisances include phishing, 419 fraud, OEM software scams, spam, social engineering, etc.
No comments:
Post a Comment