9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (2024)

24Mar

by Jason Firch, MBA

Reviewed by Josh Allen

in Network Vulnerabilities

Comments

The most common types of malware include viruses, keyloggers, worms, trojans, ransomware / crypto-malware, logic bombs, bots/botnets, adware & spyware, and rootkits. You can mitigate or prevent malware attacks by developing security policies, implementing security awareness training, using app-based multi-factor authentication, installing anti-malware & spam filters, changing default operating system policies, performing routine vulnerability assessments.

It’s important to note that no system is 100% vulnerability free or “hacker-proof.” If a threat actor has enough time, resources, and manpower to launch an attack then chances are they will find a way in.

Article Navigation

  • What Is Malware?
  • How Does Malware Infect A Computer Or Network?
  • Common Types Of Malware
  • How To Prevent Malware Attacks

What Is Malware?

Malware, or malicious software, is any piece of software that was written with the intent of doing harm to data, devices or to people.

Systems infected with malware will present with symptoms such as running slower, sending emails without user action, randomly rebooting, or starting unknown processes.

The use of malware to exploit vulnerabilities continue to rise year over year reaching an all time high of 812.67 million infected devices in 2018.

Read More:

How Does Malware Infect A Computer Or Network?

There are a number of methods threat actors utilize to deploy malware into a network or system including social engineering and exploiting vulnerabilities.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (2)

Social Engineering

Malware is often deployed through phishing, vishing, or smishing, which are all types of social engineering attacks.

In fact, 92% of malware is delivered by email.

In short, threat actors attempt to retrieve sensitive information by manipulating people into clicking links, downloading attachments, or providing access over the phone.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (3)

If successful, the malicious payload is delivered and you can consider yourself breached.

Exploiting Vulnerabilities

One of the easiest ways threat actors break into a system or network is by deploying a series of exploits known to work, such as Kerberoasting.

This is referred to as the “trial and error” approach, however, there is a high degree of technical skill involved in this process.

What does this mean for your business?

You can develop the best policies, scan the network every week, and patch systems daily, but you will never be 100% vulnerability free.

Unless your system is truly stress tested there’s no way for you to determine if the security measures in place are adequate.

Penetration testing is conducted to validate not only the vulnerabilities identified, but to evaluate the implementation of security controls and tools.

Common Types Of Malware

Malware comes in many forms but the most common types are:

  1. Viruses
  2. Keyloggers
  3. Worms
  4. Trojans
  5. Ransomware / Crypto-Malware
  6. Logic Bombs
  7. Bots/Botnets
  8. Adware & Spyware
  9. Rootkits

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (5)

1. Viruses

A virus is the most common type of malware attack. In order for a virus to infect a system it requires a user to click or copy it to media or a host.

Most viruses self-replicate without the knowledge of the user. These viruses can be spread from one system to another via email, instant messaging, website downloads, removable media (USB), and network connections.

Some file types are more susceptible to virus infections – .doc/docx, .exe, .html, .xls/.xlsx, .zip. Viruses typically remain dormant until it has spread on to a network or a number of devices before delivering the payload.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (6)

2. Keyloggers

Keylogging, or keyboard capturing, logs a user’s keystrokes and sends data to the threat actor.

Users are typically unaware that their actions are being monitored.

While there are use cases for employers using keyloggers to track employee activity, they’re mostly used to steal passwords or sensitive data.

Keyloggers can be a physical wire discreetly connected to a peripheral like a keyboard, or installed by a Trojan.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (7)

3. Worms

Similar to a virus, a worm can also self-replicate and spread full copies and segments of itself via network connections, email attachments, and instant messages.

Unlike viruses, however, a worm does not require a host program in order to run, self-replicate, and propagate.

Worms are commonly used against email servers, web servers, and database servers.

Once infected, worms spread quickly over the internet and computer networks.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (8)

4. Trojan Horses

Trojan horse programs are malware that is disguised as legitimate software.

A Trojan horse program will hide on your computer until it’s called upon.

When activated, Trojans can allow threat actors to spy on you, steal your sensitive data, and gain backdoor access to your system.

Trojans are commonly downloaded through email attachments, website downloads, and instant messages.

Social engineering tactics are typically deployed to trick users into loading and executing Trojans on their systems. Unlike computer viruses and worms, Trojans are not able to self-replicate.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (9)

5. Ransomware / Crypto-Malware

Ransomware is a type of malware designed to lock users out of their system or deny access to data until a ransom is paid.

Crypto-Malware is a type of ransomware that encrypts user files and requires payment within a time frame and often through a digital currency like Bitcoin.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (10)

6. Logic Bombs

Logic bombs are a type of malware that will only activate when triggered, such as on a specific date/time or on the 25th logon to an account.

Viruses and worms often contain logic bombs to deliver its payload (malicious code) at a pre-defined time or when another condition is met.

The damage caused by logic bombs vary from changing bytes of data to making hard drives unreadable.

Antivirus software can detect the most common types of logic bombs when they’re executed.

However, until they do, logic bombs can lie dormant on a system for weeks, months, or years.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (11)

7. Bots/Botnets

Botnet, short for roBOTNETwork, is a group of bots, which are any type of computer system attached to a network whose security has been compromised.

They are typically controlled remotely.

TheMirai botnetwas able to gain control of internet of things (IoT) connected devices like your DVR, home printer as well as smart appliances by entering the default username and password that the devices shipped with.

The threat actors deployed a DDoS (distributed denial of service) attack by sending large amounts of data at a website hosting company, causing many popular websites to be taken offline.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (12)

8. Adware & Spyware

Adware and Spyware are both unwanted software.

Adware is designed to serve advertisem*nts on screens within a web browser.

It’s usually quietly installed in the background when downloading a program without your knowledge or permission.

While harmless, adware can be annoying for the user.

Spyware, on the other hand, is a type of malware designed to gain access and damage your computer.

Spyware, on the other hand, collects user’s information such as habits, browsing history, and personal identification information.

Attackers then sell your data to advertisers or data firms, capture your bank account information, or steal your personal identity.

Spyware is often downloaded in a software bundle or from file-sharing-sites.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (13)

9. Rootkits

Rootkits are a back door program that allows a threat actor to maintain command and control over a computer without the user knowing.

This access can potentially result in full control over the targeted system.

The controller can then log files, spy on the owner’s usage, execute files and change system configurations remotely.

While traditionally deployed using Trojan horse attacks, it’s becoming more common in trusted applications.

Some antivirus software can detect rootkits, however, they are difficult to clean from a system.

In most cases, it’s best to remove the rootkit and rebuild the compromised system.

How To Prevent Malware Attacks

While it’s not possible to be completely protected from cybercriminals, there are a number of measures companies can take to mitigate or prevent malware attacks including:

  • Developing Security Policies
  • Implementing Security Awareness Training
  • Using App-Based Multi-Factor Authentication
  • Installing Anti-Malware & Spam Filters
  • Changing Default Operating System Policies
  • Performing Routine Vulnerability Assessments

Developing Security Policies

Security policies provide a road map to employees of what to do and when to do it, and who gets access to systems or information.

Policies are also required for compliance, regulations, or laws.

Examples of security policies that may help to prevent malware attacks include:

  • Social Engineering Awareness Policy –Defines guidelines to provide awareness around the threat of social engineering and defines procedures when dealing with social engineering threats.
  • Server Malware Protection Policy – The purpose of the Server Malware Protection Policy is to outline which server systems are required to have anti-virus and/or anti-spyware applications.
  • Software Installation Policy – The purpose of the Software Installation Policy is to outline the requirements around the installation of software on company computing devices. To minimize the risk of loss of program functionality, the exposure of sensitive information contained within the Company’s computing network, the risk of introducing malware, and the legal exposure of running unlicensed software.
  • Removable Media Policy– The purpose of the Removeable Media Policy is to minimize the risk of loss or exposure of sensitive information maintained by the company and to reduce the risk of acquiring malware infections on computers operated by the company.

Implementing Security Awareness Training

Security awareness training is an investment into the overall security of your organization. This training can save a substantial amount of money that has the potential of getting lost to cyber attacks.

In addition, many compliance frameworks and audits (ISO 27001, SOC 2, CMMC, HIPAA, HITRUST, etc) require periodic security awareness training for employees.

Awareness training involves developing a baseline, training users, setting up phishing campaigns, and reporting results.

  • Baseline Testing – Provide baseline testing to assess the likelihood that a user falls for a phishing attack.
  • Training Users– interactive modules, videos, games, posters, and newsletters designed to educate users on the latest social engineering attacks. This training is often automated with scheduled email reminders.
  • Phishing Campaigns – Perform organization side and fully automated simulated phishing attacks.
  • Reporting Results– Stats and graphs for both training and phishing activities to demonstrate the ROI.

The ideal way to perform security awareness is to include it in the new-hire orientation security training module and make it a mandatory requirement before granting access to critical systems.

The training should be completed at least on an annual basis and train employees not only on identifying attacks, but also to respond appropriately and report to the incident response team for proactive action.

It is all about training employees to have a sense of what is considered unsafe behavior and know when to take action to protect themselves and the organization.

Using App-Based Multi-Factor Authentication

According to Microsoft, 99.9% of automated malware attacks can be prevented against windows systems just by using multi-factor authentication (MFA).

Three 9s of prevention is an impressive figure, however, the keyword here is “automated.” As with all things in security, MFA is simply a single layer of defense.

Sophisticated threat actors deploy a number of methods outside of automated attacks to compromise a network.

It’s also worth mentioning that SMS based MFA can easily be bypassed as the technology sends passcodes in plain text. This allows threat actors to capture the passcode, access your account, and then pass the code off to your phone without you noticing.

Instead, it’s recommended that you use an app-based MFA or hardware MFA such as a YubiKey.

Installing Anti-Malware & Spam Filters

Emails are the primary method for delivering malware and socially engineered attacks.

While employees do have anti-virus andanti-malware softwareinstalled on their workstations, adding them to your mail servers is recommended as part of adefense in depth approach.

Setting up a spam filter is a balancing act. On one hand, the network administrator wants to block all malicious traffic.

On the other hand, if the filters are too aggressive then legitimate traffic gets blocked and end-users start to complain.

After 2-3 weeks of use, a baseline for the network can be established and further adjustments are made.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (15)

Software tools like Mimecastprovide spam filtering and anti-malware capabilities.

Users are given a “digest” of emails that have been sent to their account. Users can then choose to block, confirm, or always allow an individual email or an entire domain.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (16)

Changing Default Operating System Policies

While the default settings are good security precautions to take they can be greatly improved upon.

In this example,Microsoft recommendschanging the password history from 10 to 24 passwords and reducing the maximum password age from 90 days to 42 days.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (17)

It’s ultimately the responsibility of the network administrator to ensure that the domain, workstations, and devices are set up to adhere to security policieswithin the organization.

Perform Routine Vulnerability Assessments

Performing routine network vulnerability scans help to identify known vulnerabilities, lack of security controls, and common misconfigurations.

Scanners like Nessus are used to scan ports, analyze protocols, and map a network.

9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (18)

This provides network administrators with detailed information about which hosts on a network are running what services.

Most scanners will display the information collected in a dashboard listing each vulnerability found and it’s severity.

In addition to providing the raw scan results, most vulnerability scanning services include an assessment report consisting of a remediation plan to resolve at risk systems.

Organizations may also wish to implement a patch management program. The main purpose of patch management is to continuously identify, prioritize, remediate, and report on security vulnerabilities in systems.

Related Articles

  • Vulnerability Scanning VS Penetration Testing: What’s The Main Difference?
  • How To Perform A Successful Network Vulnerability Assessment
  • What Are The Most Common Types Of Network Vulnerabilities?
  • What Is Endpoint Detection And Response (EDR)?
9 Common Types Of Malware (And How To Prevent Them) - PurpleSec (2024)

FAQs

What are the 9 types of malware? ›

The most common types of malware include viruses, keyloggers, worms, trojans, ransomware / crypto-malware, logic bombs, bots/botnets, adware & spyware, and rootkits.

What are the 11 types of malware? ›

Malware is a malicious software which is typically used to infect computers or networks. Common types of malware include viruses, worms, trojans, ransomware, adware, spyware, rootkits, keyloggers, fileless malware, cryptojacking, and hybrid malware.

What is malware and how can you prevent it? ›

Malware is any type of software that causes damage to a system or allows access to unauthorized data from viruses that replicate themselves throughout a system. You can prevent malware with anti-virus software, email security software, and training.

What are the 9 common computer viruses? ›

The nine major categories for viruses on computers are:
  • Boot Sector Virus. ...
  • Web Scripting Virus. ...
  • Browser Hijacker. ...
  • Resident Virus. ...
  • Direct Action Virus. ...
  • Polymorphic Virus. ...
  • File Infector Virus. ...
  • Multipartite Virus.

What is malware class 9? ›

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

How can you detect and prevent malware? ›

Sandboxing – Sandboxing involves running potentially malicious software in an isolated environment to observe its behavior without affecting the actual system. This technique helps identify malware by analyzing its actions and preventing it from causing harm to the system.

How can I protect against malware and viruses? ›

Use an anti-malware app - Installing an anti-malware app and keeping it up to date can help defend your PC against viruses and other malware (malicious software). Microsoft Defender is free anti-malware software included with Windows, and it's kept updated automatically through Windows Update.

How to get rid of malware? ›

Scan your device for malware.

Run a malware or security Delete anything it identifies as a problem. You may have to restart your device for the changes to take effect. Run your scan again to make sure everything is clear. If the scan shows there are no more issues, you've likely removed the malware.

What are the 8 examples of malwares? ›

So what are the main types of malware? There are 8 common types of malware threats that you should be aware of: adware, malvertising, spyware, viruses, worms, trojans, hybrids and ransomware. Each of these malware types are a threat to your personal or business information, as well as your device health.

What is 13 malware? ›

"Your Chrome Is Severely Damaged By 13 Malware!" scam in detail. This page is designed to display a fake virus alert disguised as a Google Security warning claiming that the Chrome browser is severely damaged by thirteen malicious programs designed to display aggressive advertisem*nts.

What is the hardest malware to detect? ›

Rootkits are notoriously difficult to detect, as they can hide their existence by subverting the operating system and other software.

What type of malware was ILOVEYOU? ›

ILOVEYOU, sometimes referred to as the Love Bug or Loveletter, was a computer worm that infected over ten million Windows personal computers on and after 5 May 2000. It started spreading as an email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU. TXT.

Top Articles
Zcash Price Prediction | Is Zcash a Good Investment?
Can You Rely on USPS 2-Day Shipping?
Fernald Gun And Knife Show
Northern Counties Soccer Association Nj
Compare Foods Wilson Nc
Cold Air Intake - High-flow, Roto-mold Tube - TOYOTA TACOMA V6-4.0
Craigslist Niles Ohio
Occupational therapist
1970 Chevrolet Chevelle SS - Skyway Classics
Insidious 5 Showtimes Near Cinemark Tinseltown 290 And Xd
Craigslist Kennewick Pasco Richland
Nm Remote Access
Craigslist Dog Sitter
Produzione mondiale di vino
What Was D-Day Weegy
Turbocharged Cars
Alaska: Lockruf der Wildnis
I Wanna Dance with Somebody : séances à Paris et en Île-de-France - L'Officiel des spectacles
Hoe kom ik bij mijn medische gegevens van de huisarts? - HKN Huisartsen
Kvta Ventura News
9044906381
Chastity Brainwash
Tnt Forum Activeboard
Prestige Home Designs By American Furniture Galleries
Nhl Tankathon Mock Draft
Milanka Kudel Telegram
Tripadvisor Napa Restaurants
European city that's best to visit from the UK by train has amazing beer
Lost Pizza Nutrition
Breckiehill Shower Cucumber
Renfield Showtimes Near Paragon Theaters - Coral Square
Jailfunds Send Message
101 Lewman Way Jeffersonville In
How often should you visit your Barber?
Craigslistodessa
Kelley Fliehler Wikipedia
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
October 19 Sunset
Http://N14.Ultipro.com
Free Robux Without Downloading Apps
Helloid Worthington Login
House Of Budz Michigan
Jewish Federation Of Greater Rochester
Ursula Creed Datasheet
How are you feeling? Vocabulary & expressions to answer this common question!
Craigslist En Brownsville Texas
Uc Davis Tech Management Minor
Interminable Rooms
Canvas Elms Umd
The 13 best home gym equipment and machines of 2023
Ics 400 Test Answers 2022
Nfl Espn Expert Picks 2023
Latest Posts
Article information

Author: Maia Crooks Jr

Last Updated:

Views: 6078

Rating: 4.2 / 5 (43 voted)

Reviews: 82% of readers found this page helpful

Author information

Name: Maia Crooks Jr

Birthday: 1997-09-21

Address: 93119 Joseph Street, Peggyfurt, NC 11582

Phone: +2983088926881

Job: Principal Design Liaison

Hobby: Web surfing, Skiing, role-playing games, Sketching, Polo, Sewing, Genealogy

Introduction: My name is Maia Crooks Jr, I am a homely, joyous, shiny, successful, hilarious, thoughtful, joyous person who loves writing and wants to share my knowledge and understanding with you.