top of page
theblackthreat
Malware (Malicious Software)
 

The term malware is a contraction of malicious software. Put simply, malware is any piece of software that was written with the intent of damaging devices, stealing data, and generally causing a mess. Viruses, Trojans, spyware, and ransomware are among the different kinds of malware.

Malware is often created by teams of hackers: usually, they’re just looking to make money, either by spreading the malware themselves or selling it to the highest bidder on the Dark Web. However, there can be other reasons for creating malware too — it can be used as a tool for protest, a way to test security, or even as weapons of war between governments.

But no matter why or how malware comes to be, it’s always bad news when it winds up on your PC.


Virus
 

A virus is a self-replicating program that produces its own copy by attaching itself to another program, computer boot sector or document.

  • It infects other programs, 

  • Alters Data

  • Transforms itself

  • Encrypts Itself

  • Corrupt files and Programs

  • Self Propagates


Worms
 

The worm is a standalone malicious program which spreads from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on the system, which is what allows it to travel unaided. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it.

Difference between Worms and Viruses

Virus:

  • A virus is a program that replicates, i.e. it spreads from file to file on your system 

  • It may be programmed to erase or damage data.

  • A virus is a set of code which adds itself to existing files.

 
Trojans
 

A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system. These actions can include:

  • Deleting data

  • Blocking data

  • Modifying data

  • Copying data

  • Disrupting the performance of computers or computer networks

 
Spyware
 

Spyware. Although it sounds like a James Bond gadget, it’s actually a type of malware that infects your PC or mobile device and gathers information about you, including the sites you visit, the things you download, your usernames and passwords, payment information, and the emails you send and receive.

 

"Spyware runs quietly in the background, collecting information."

​

No big surprise—spyware is sneaky. It finds its way on to your computer without your knowledge or permission, attaching itself to your operating system. You might even inadvertently permit spyware to install itself when you agree to the terms and conditions of a seemingly legitimate program without reading the fine print.

Whatever way spyware manages to get on your PC, the method of operation is generally the same—it runs quietly in the background, maintaining a secret presence, collecting information or monitoring your activities in order to trigger malicious activities related to your computer and how you use it. And even if you discover its unwelcome presence on your system, Spyware does not come with an easy uninstall feature.

 
  Adware
 

Adware is the name given to programs that are designed to display advertisements on your computer, redirect your search requests to advertising websites and collect marketing-type data about you – for example, the types of websites that you visit – so that customised adverts can be displayed.

​

Adware – that collects data with your consent – should not be confused with Trojan spyware programs that collect information, without your permission. If Adware does not notify you that it is gathering information, it is regarded as malicious – for example, malware that uses Trojan-Spy behaviour.

 
 Ransomware
 

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

​

Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.

 
 Rootkits
 

Ransomware is a form of malware that encrypts a victim's files. The attacker then demands a ransom from the victim to restore access to the data upon payment. 

Users are shown instructions for how to pay a fee to get the decryption key. The costs can range from a few hundred dollars to thousands, payable to cybercriminals in Bitcoin.

 
RAT
​

A Remote Access Trojan (RAT) is a type of malware that allows covert surveillance, a backdoor for administrative control and unfettered and unauthorized remote access to a victim’s machine. The RAT is very dangerous because it enables intruders to get remote control of the compromised computer. Attackers can use the exploited machines to perform various malicious activities such as installing and removing programs, manipulating files, hijacking the webcam, reading data from the keyboard, harvesting login credentials and monitoring the clipboard.

The malicious actors can also use your internet address as a front for malicious purposes. For example, viruses downloaded through a RAT have the ability to compromise other computers by impersonating you.

In this article, we will explore the difference between RATs and keyloggers. We’ll also look at RAT types and the way RAT installs on computer, as well as the workings, detection and avoidance of a RAT.

©2022 www.theblackthreat.in All right reserved.
bottom of page