May 23, 2016
Joe Franscella

The Truth About the Dangers of Malware

<p>What is malware? Much like adware or spyware, the term refers to a class of insidious computer applications. It is a particular type of virus which is used as a tool to gain access to a computer and force it to perform an unauthorized function.</p><p>Guarding against malware attacks is becoming an increasingly <a href="">complex process</a>. In the 90’s, an experienced user could find and follow instructions for scrubbing away viruses and deleting bots from sub-folders. Today, malware is advanced past those measures a hundred times over. Malicious programs are harder to detect than ever. These applications are better hidden in insidious hidden directory folders. Using Trojan horse methodologies, they immediately create their own web portals and ravage your PC or cloud data for means for reproducing.</p><p>Some viruses operate using a combination of these methods.</p><ul><li><strong>Viruses</strong> are designed to spread. Computer viruses automatically run through instructions which allow it to find other computers via a network or by attaching to a shared file. Once infected, the computers files may be erased or corrupted. Some can feed on a computer’s processing capabilities like a parasite.</li><li><strong>Browser hijacking software</strong> affects the programs we use to access web pages. Some sites perform low-stakes changes like creating a bookmark or saving the page to a favorites list. More insidious examples of browser hijacking malware force or trick users into downloading programs.</li><li><strong>Spyware</strong> is used to monitor and track computer user activity. Scammers can sell batches of collected browser histories or IP address traffic. Your files, images, and even webcams can be compromised.</li><li><strong>Adware</strong> forces a web browser to show advertisements not posted by the website host. Users of infected computers may experience pop-up ads or see text advertisements interspersed into the page they are reading. Is looking at an ad as horrible as being spied upon? No, but adware is still unethical.</li></ul><p>It is easier and easier than ever to make a misstep and allow a virus to infect a terminal or penetrate your network security. Social engineering is an insidious cyber-crime tactic which produces corrupt files which appear legit. Although we instantly disregard unsolicited mail, we are somewhat likely to open a hand-addressed envelope even from an unknown source. Cyber-criminals exploit this tendency creating pages and emails containing threats which look less and less like junk every day. Malicious files are named conventional names like “ContactList.txt” and emails are given emotional subject lines like, “Are you mad at me?” Scripts can cull familiar buzzwords from your files and web traffic.</p><p>Sometimes things get personal. When your login credentials are part of cookies stored by a website, spyware can capture the password and username. Hackers can then access your account. Some may attempt to use your same login credentials on other accounts, as many people use the same username/password combination for multiple accounts. If your username happens to be an email account, that address may be added to marketing lists.</p><p>Most attacks are perpetrated by a person or group who has something to gain. Criminals are able to steal personal data and hijack computers. It is possible for email spammers to use the processors on your computer to send more spam. Financial gain is a motivation of many; however, some people choose to invade others’ privacy for the <a href="" target="_blank">most horrifying reasons</a>.</p><p>Are you a medium sized business that needs help providing the value of threat intelligence and a SIEM? Try out 'Anomali Reports' for FREE and see just how much we can help!</p><p><span class="hs-cta-wrapper" id="hs-cta-wrapper-8e532ae2-b46c-496f-8b93-b40288d6d535"><span class="hs-cta-node hs-cta-8e532ae2-b46c-496f-8b93-b40288d6d535" data-hs-drop="true" id="hs-cta-8e532ae2-b46c-496f-8b93-b40288d6d535" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="" href=";placement_guid=8e532ae2-b46c-496f-8b93-b40288d6d535&amp;portal_id=458120&amp;redirect_url=APefjpGc9a_44uJ4TP2cCkLWY5zd18y1mepRhfGrqBrz4AUDgCxbP2NgRLB__R5ZfH6r6NALVdOnCJsHxZLx6ds_PirOFOfncnVy2qwGB8OLM6NKux9KVx7g5s21ymC0TBoze6zwBUd_RDMgfJXZR1uKFaaXZ7oK-3DfThdUQj6FaWYr3gZYgYELJJwhz_qILGrGANCAn5QnFgRxkgoJGRnysc5l61S9jbtCbU-QugPYsSoL_1nyB-EAi9eKn7RCjy6N_NQCl3L8aItThyH1YlOa-0XjjMsaaw&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;;;pageId=4152163956&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478831861868.1478887113345.180&amp;__hssc=41179005.24.1478887113345&amp;__hsfp=1335165674" id="cta_button_458120_bd4955b6-8d4f-4526-80d8-8654c8ad6404" style="margin: 20px auto;" target="_blank" title="Free Trial">Free Trial </a> </span> <script charset="utf-8" src=""></script> <script type="text/javascript">hbspt.cta.load(458120, '8e532ae2-b46c-496f-8b93-b40288d6d535', {});</script> </span></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.