facebook linkedin twitter

Computerware Blog

Your Guide to the Malware You Could Encounter

Your Guide to the Malware You Could Encounter

You’d be hard-pressed to find someone nowadays who hasn’t heard of malware, although they may have difficulty identifying different threats as they encounter them. Does this sound like the people that you work with? We’re here with a simple solution to assist you and your team in spotting the different kinds of threats - a malware guide to distribute among your staff so they can better spot the usual suspects.

Print out this guide and hand it out so your team always has a handy reference to turn to.


A computer virus is perhaps the most recognized term for malware, in that many users will attribute any stunted functionality to one. In actuality, a computer virus is a malicious piece of code that can replicate and disperse without the person responsible for unleashing it remaining involved. This makes them a particularly effective weapon for hackers to use against targets of all sizes, often by attaching it to some file or application that their intended victim is likely to download. 


Worms are another self-replicating pest, predating even viruses. Once a system has been infected (either via an application flaw or a hacker’s social engineering) a worm can truly wreak havoc. Additional malware can be transferred into the system, system memory can be used up to create issues, and communications can be cut back. Email is another effective way that worms have been used against businesses. All it takes for an entire company to be infected is for one employee to open the wrong email attachment.


This variety of malware is useful to a cybercriminal who intends to create even more considerable problems sometime later. This is because it can be used to bypass a system’s security by monitoring a user’s actions, recording credentials and snooping on their behaviors. Keyloggers are a well-known variety of spyware, as they secretly record a user’s keystrokes to steal credentials and other sensitive data. As an added impact, spyware also eats up a system’s CPU resources to increase its vulnerability to further attack.


Adware is intended to fool a user into clicking through a forged advertisement to what appears to be the website described in the ad, but is actually the creation of a cybercriminal. 


Some cybercriminals prefer to camouflage their attacks behind legitimate advertising networks. By paying for ad space and hiding code within the ad, the user could again be brought to a malicious site. Alternatively, the ad may instead install malware onto the user’s system - sometimes without any action needed from the user at all. This includes scripts used to turn a system into a cryptomining puppet for the cybercriminal’s benefit, as well as Trojans and ransomware.

Trojan Horse

Just like the wooden horse strategically used in the Trojan War, Trojans hide their malware attacks in what appear to be legitimate programs. They are particularly common for a few reasons: first, they are relatively easy for even a novice hacker to create, and second, they are very effectively spread through social engineering and deception. Once the user activates the program, the payload is delivered and the Trojan fulfills its goal, whether that’s damaging or stealing data or simply throwing the proverbial wrench into the computer’s operations. 


Ransomware has seen a considerable jump in popularity over the last few years, which makes a lot of sense in a few ways. Not only has it proven to be an effective means of attack, as businesses, healthcare organizations, and even entire cities have been brought to a halt by it, it can be very lucrative for the cybercriminal responsible. Once the ransomware has been executed, it encrypts the infected system and locks the user out. The user is then given a message explaining what happened, with a link to an encrypted cryptocurrency wallet to pay the ransom in exchange for the decryption key. Unfortunately, many victims are never given the key, even if they pay.

Logic Bomb

A logic bomb can, appropriately enough, act as a digital land mine. Lying dormant in a system until it is triggered by some event, a logic bomb will damage a computer - sometimes causing physical damage to its components. For instance, some logic bombs overwork certain pieces of hardware, like hard drives and cooling fans, until these devices fail.


A backdoor is less of an attack itself, and more of an attack vector. It effectively gives a cybercriminal a means of getting into a vulnerable system again later, even if the original vulnerability is resolved. Using this backdoor, the cybercriminal has the opportunity to return again later, when the user has again let their guard down.


A rootkit is what enables a hacker to create a backdoor. By modifying system files by virtue of software vulnerabilities, a hacker is able to leave themselves an opening into their targeted system.


Botnets are made up of bots, or infected programs and systems, that can execute whatever task the cybercriminal wishes in tandem with one another. Essentially, a botnet can consist of hundreds of thousands of devices, such as computers, smartphones, and even IoT devices. With their collected computing power, botnets are formidable threats, which is why they are commonly used to execute Distributed Denial of Service attacks.

Fileless Malware

A more recent development, fileless malware infects a computer and starts to pull the strings from inside the device’s random-access memory, or RAM. Once there, this malware is able to spread using encryption keys and APIs, as well as cause problems by altering user privileges and misusing admin tools.

Being able to recognize threats is a crucial part of stopping them. The other part? Having the right security solutions in place before they strike. Computerware can help on both fronts. Reach out to us at (703) 821-8200 to learn more and ensure your company is better defended.

Tip of the Week: Speed Up Your Computing with Wind...
Should You Consider Microsoft 365?


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, July 12, 2020

Captcha Image

By accepting you will be accessing a service provided by a third-party external to https://www.cwit.com/

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Technology Best Practices Business Computing Privacy Internet Cloud Software Hackers Data Business Management Hardware Microsoft Workplace Tips Network Security Backup Hosted Solutions Managed Service Provider Productivity Business Productivity Email Malware IT Services Saving Money Efficiency Google Computer User Tips Small Business Innovation Collaboration VoIP IT Support Data Backup Quick Tips IT Support Smartphones communications Network Mobile Devices Business Continuity Microsoft Office Gadgets Android Social Media Data Recovery Cybersecurity Disaster Recovery Upgrade Server Communication Mobile Office Virtualization Phishing Smartphone Mobile Device Management Miscellaneous Ransomware Vendor Management Holiday Operating System Managed IT Services Windows Outsourced IT Windows 10 Passwords Apps Tech Term Facebook Remote Monitoring Unified Threat Management Users Internet of Things Mobile Device Automation BDR BYOD Remote Computing Mobile Computing Apple Analytics Managed IT services Data Management Windows 10 WiFi Marketing Cloud Computing The Internet of Things Training History Artificial Intelligence Browser Save Money Firewall Big data App Spam Help Desk Business Technology Alert Encryption Office 365 Two-factor Authentication Information Technology Health Bandwidth IT Consultant Office Budget Maintenance Content Filtering Printer Gmail Going Green Government Hard Drives Access Control Cybercrime Bring Your Own Device Windows 7 Managed IT Antivirus Managed Service Tech Support Best Practice Virus Lithium-ion Battery Hiring/Firing Recovery Employer-Employee Relationship Information Retail Computers Saving Time Healthcare VPN Wireless Technology Cost Management Search Windows 8 Outlook Update Networking Humor iPhone Project Management Customer Service Money Computing IBM Document Management Remote Work Augmented Reality Phone System It Management Data Security Travel Hacking Blockchain Education Data Loss Applications Mobility Risk Management Avoiding Downtime Legal Data Breach Conferencing Regulations Vendor Save Time Downtime Wireless SaaS Storage Website Customer Relationship Management Covid-19 Computer Repair Running Cable Law Enforcement Proactive IT PowerPoint Current Events Compliance Voice over Internet Protocol Solid State Drive Data storage Password Value Administration Intranet Flexibility Patch Management File Sharing Twitter Hard Drive Hacker Business Growth Fax Server Social Engineering User Cooperation Net Neutrality Business Intelligence Digital Virtual Desktop Paperless Office Websites Meetings Social Digital Payment Private Cloud Router Sports Disaster Monitoring Wi-Fi DDoS Excel Hosted Solution End of Support Software as a Service Telephony Comparison Tablet Machine Learning Company Culture Robot Securty Management Telephone Systems Word Social Networking Vulnerabilities Cortana Black Market Cryptocurrency Laptop Scam Google Maps Experience Managed Services Virtual Reality Lifestyle Redundancy Employee/Employer Relationship Politics USB Managed IT Service Distribution Automobile Presentation Monitors Inbound Marketing Emails Cleaning Office Tips Evernote Chromebook Computing Infrastructure Hack Specifications Safety Chrome Virtual Assistant Processor Cost How To YouTube Pain Points Download Documents Unified Communications Start Menu Settings Tech Terms Mobile Technology Entertainment Computer Accessories Teamwork Heating/Cooling Solutions Professional Services Microchip Taxes Trending Uninterrupted Power Supply Distributed Denial of Service Mouse IT service Vulnerability Multi-factor Authentication Gaming Console Telephone Bitcoin Integration Public Cloud Licensing Programming eWaste Statistics Data Protection Co-managed IT Network Congestion Text Messaging User Error Webcam Bluetooth Downloads Managed Services Provider Identity Theft Streaming Media Google Docs How To Processors Smart Devices Memory Product Reviews Google Calendar Processing Screen Reader Customer Resource management In Internet of Things Business Owner IT consulting Smart Phones Tip of the week Health IT Gamification Procurement Wasting Time Smart Tech IP Address Read Touchscreen News Logistics Piracy Virtual Machines Upload Video Conferencing VoIP Scalability Application PCI DSS CIO Adminstration Consultation Pirating Information Fiber-Optic Cyber security Database Motion Sickness Human Resources Best Practives Communitications Advertising Flash Leadership Knowledge Bookmark HTML Staffing Google Wallet Technology Tips Google Play Telephone Service Telephone System Device Management Windows XP Employer/Employee Relationships Mobile Security Messenger Tracking Supply Chain Management Audit Managing Costs Multi-Factor Security Microserver Content Management Displays Fake News Microsoft 365 Software License Trends Rental Service Internet Service Provider Business Managemenet Society Cabling Digital Signature Regulations Compliance Micrsooft Data Warehousing Medical IT Fraud Trend Micro Tactics Web Server IT Assessment Browsers Devices Drones Access Security Cameras Threats Administrator Get More Done online Currency Emergency Hard Drive Disposal User Tip Proactive Maintenance UTM Content Books Workers Remote Working Upselling Computer Care Navigation Virtual Machine Legislation Error Turn Key Microsoft Excel IT Plan Enterprise Resource Planning Supercomputer Printer Server A.I. Worker Financial Data Google Drive Video Surveillance Windows Server 2008 email scam eCommerce Addiction PDF Trojan Electronic Health Records LinkedIn Permissions Language Data Analysis Employees Accountants Organize Spyware Mobile Payment GDPR Managing Risk Memes Saving ZTime SQL Server Reading Samsung Best Available Keyboard Music Electricity Printing Tech Hypervisor Wireless Headphones G Suite Domains Archive switches Writing Migration Connected Devices Employer Employee Relationship Managing IT Services Skype Hybrid Cloud Equifax Fleet Tracking Public Speaking Telework Upgrades Debate Holidays Network Management Hacks Physical Security Surveillance Harddrive Fileless Malware Shortcut Remote Workers Point of Contact GPS cache Television Modem Strategy Banking Botnet IT LiFi Proxy Server Azure Device security MSP Relocation Tablets WannaCry Term Nanotechnology Social Network Sync Troubleshooting External Harddrive Electronic Medical Records Transportation Desktop Finance Entrepreneur Webinar Virtual Private Network Directions Display Startup Asset Tracking HIPAA FinTech Deep Learning Time Management Freedom of Information Recording Business Cards Optimization Service Level Agreement Notifications CCTV Environment Development Corporate Profile Work/Life Balance Competition Data Storage Analytic 3D Assessment Ebay SharePoint SSID Unified Threat Management Backup and Disaster Recovery Business Metrics Computer Malfunction Electronic Payment Recycling Visible Light Communication Thin CLient Dark Web Free Resource Username Reliable Computing CrashOverride 3D Printing Personal Information Managing Stress Capital Financial Regulation Productuvuty Printers