Skip to content
May 25, 2023
6 min read time

Malware 101

Malware is short for “malicious software” - It is any program designed specifically to either make money illegally by stealing sensitive and confidential information or harm your device and data.

Malware is short for “malicious software” - It is any program designed specifically to either make money illegally by stealing sensitive and confidential information or harm your device and data. 

 

Many millions of people will fall victim to some type of malware attack in any given year and it’s not a matter of if an attack will happen, but when. Few people know exactly what malware is or what happens or what to do when an attack happens. Can malware get my private information? Can it delete my programs and files? How does it really affect me or my business?

 

Malware works in mysterious ways, and different types have different capabilities. We’re here to guide you through the symptoms of malware, how malware affects your computer, and how you can keep you and your business safe from a malware infection.

 

Here are just some of the many types of Malware

 

Adware - Adware may try to deliver malicious advertisements to your site's visitors, steal money from legitimate advertisers, or manipulate search engines into promoting other sites. Anti-virus programs, search engines, and advertising networks are constantly on the lookout for this bad behavior and may blacklist your site if discovered.


Backdoor - A backdoor refers to any method by which authorized and unauthorized users can get around normal security measures and gain high level user access (aka: root access) on a computer system, network or software application.


Botnet – Also called a “Zombie Army” A botnet is a collection of Internet-connected user computers (bots) infected by malicious software (malware) that allows the computers to be controlled remotely by an operator (bot herder) through a Command-and-Control (C&C) server to perform automated tasks, such as stealing information or launching attacks on other computers. Botnet malware is designed to give its operators control of many user computers at once. This enables botnet operators to use computing and bandwidth resources across many different networks for malicious activities.


Mailer - A mailer sends spam emails in mass campaigns, which will often result in abuse reports and blacklisting of your site's legitimate emails. Mailers can also be used to send stolen sensitive data back to attackers.


Phishing - Phishing sites try to fool unsuspecting visitors into thinking they're some other legitimate and trusted website. They are used to steal passwords, credit cards, and other sensitive information. Attackers may hide a phishing site in your hosting account, but you and your site's legitimate visitors may never see it. Instead, users are generally sent directly to phishing sites by links in malicious emails or from other infected websites. But these sites wreak havoc on the internet, and cybersecurity solutions are constantly on the lookout for them. Once discovered, your entire site may be blacklisted.


Polymorphic - Polymorphic malware is a type of malware that constantly changes its identifiable features in order to evade detection. Many of the common forms of malware can be polymorphic, including viruses, worms, bots, trojans, or keyloggers.


SEO Spam - Also known as spamdexing, is an attempt to use your website to rank content that won’t rank otherwise. This is a “black hat SEO” technique. Hackers use it to generate revenue but in the process, they spam & destroy your website.


Uploader - An uploader is designed to allow an attacker to put arbitrary files on your site. They are used to install other malware files.


Web Shell - A web shell is a secret "backdoor" that an attacker uses to access and control your site. It can be used to install and manage all of the other kinds of malware listed here. Web shells are present in the vast majority of attacks, but can be difficult to detect and remove. But if not removed, a site is almost certain to be re-infected soon after any attempted cleaning.

 

What Can Malware Do?

In short, malware can absolutely wreak havoc on a computer and its network. Hackers use it to steal passwords, delete files and render computers inoperable. A malware infection can cause many problems that affect daily operation and the long-term security of your company. Here are some of the many things malware can do

1. Steal Your Sensitive Information

Information theft is one of the most serious, costly, and violating results of malware. When pieces of malware such as spyware and trojans get installed on your device, this allows hackers to gather your personal and company information to sell to third-party sources. This information can include browsing history, passwords, client profiles and other sensitive data.

2. Blacklist Your Website

When a website is on a blacklist, it has been deemed insecure or dangerous by a search engine, hosting provider, or antivirus program provider. Then search engines (like Google) will expel and exclude that site from its list. When a website is blacklisted, it loses almost 95% of its organic traffic, which can rapidly affect revenue. Yikes!

3. Slow Your Computer

Once a piece of malware is activated, it begins to consume a substantial portion of your computer’s memory. Many types of malware also replicate themselves like a dirty gremlin and fill your hard drive, so there is less room for legitimate programs. This loss of space can lead to a sluggish computer, which makes it difficult to carry on with business as usual.

3. Restrict Access to Your Files

Certain types of malware can damage or delete files and programs on your computer. Unless your data is backed up on another hard drive or cloud server, you will not be able to regain access to many of these files after a cyber-attack.

One type of malware known as ransomware holds the files on your computer hostage. Ransomware hackers threaten to delete all your data unless you give them money. Did I mention that malware is true crime!?

4. Spread Throughout Your Network

Worms are an especially nasty type of malware for businesses. Much like a pandemic, once this malware infects a computer, it replicates itself and spreads throughout the entire network. Most companies operate all their devices on a single network — which means that a worm could damage not just one employee’s computer, but the entire organization.

5. Disrupt Daily Operations

Nearly every type of malware will affect normal business operations in some form or another. Adware is especially disruptive and irritating for business productivity. When installed onto a computer, it enables constant popups and can even redirect your search results to advertisers’ sites — making it hard for anyone to enjoy the normal function of their device.


Here's how you can help minimize and prevent malware threats and infections:

 

Install anti-malware software! Anti-virus software and other anti-malware programs are great at identifying and removing many types of malware. It is important to perform regular checks with these programs to maintain a clean system.


Perform regular employee security training: One of the biggest threats and vulnerabilities to your cybersecurity is your own staff! Around 70 percent of business owners who reported data breaches said that they were caused by internal employees. Improve your security by implementing regular network safety trainings with your staff.


Resist and avoid clicking unknown links and pop-ups: As tempting and enticing as those pop-ups might be, they usually carry malware that gets into your system. Only open expected files from trusted sources and double-check the URL before clicking any links.


Keep your system up to date: Nearly a million new malware threats are created every day, so it is critical that you keep your system as updated as possible. Regularly check your operating system and anti-virus software for latest updates and install them as soon as you can.


Implement network security: Regular management of your IT systems is essential for guarding your data from hackers. This management can be performed in-house or through a partner service.