Malware - #CyberSecurity
The Image was Design by Ichsan Budiman Putra

Malware - #CyberSecurity

Hello guys, in this article I want to talk about Malware and how to protect our system especially our self from Malware.

---before I continue I want to thank first for anyone who has subscribed to my newsletter,?I will try to provide the best material and presentation for cybersecurity learning in my newsletter I hope you guys can enjoy it---

Tidak ada teks alternatif tersedia untuk gambar ini
The Image was Design by Ichsan Budiman Putra

In an increasingly advanced digital age, security and privacy are becoming increasingly important. One of the threats that can compromise our security and privacy is malware. Malware stands for malicious software, which is designed to damage, disrupt, or steal data from a computer system or other device. Malware can get inside your system without your knowledge through a variety of ways, such as downloading files from unsafe sites, opening suspicious email attachments, or even simply clicking on links that point to websites that have been hacked.

Although often considered a threat to computer or laptop devices, malware can attack other devices such as smartphones, tablets, or even Internet of Things (IoT) connected to the internet. The types of malware that exist are very diverse and can spread through various media such as email, insecure websites or networks connected to the internet.

For this reason, knowledge about malware and ways to avoid such attacks is very important. On this occasion, we will discuss in detail about the types of malware that exist, the symptoms caused when a device is infected with malware, as well as ways to avoid these malware threats.

The most common types of malware are viruses, worms, Trojans, spyware, adware, and ransomware. Here are explanations and examples of each type of malware:?

  1. Viruses: viruses are programs that attach to files or other programs and spread through infected files. Viruses can damage or delete data on a computer and can spread to other computers through infected files. For example, the Melissa virus was released in 1999 and spread via email, affecting tens of thousands of users and causing about $1.2 billion in damage. A well-known example of a virus is the ILOVEYOU virus, which spread via email in 2000.
  2. Worms: worms are programs that spread over a network and can infect computers without the help of users. Worms can damage the system and slow down network performance. A well-known example of a worm is the Conficker worm, which spreads over networks and attacks computers running the Windows operating system. Worms are responsible for some of the most devastating attacks on the Internet. As shown in Figure 1, in 2001 the Code Red worm had infected 658 servers. Within 19 hours, the worm had infected more than 300,000 servers, as shown in Figure 2.
  3. Trojan: a Trojan is a program that hides itself inside other programs and can grant access to a computer without the user's knowledge. Trojans can be used to steal information or damage the system. A well-known example of a Trojan is the Back Orifice Trojan, which is designed to grant access to a computer without the user's knowledge.?
  4. Spyware: Spyware is a program designed to steal users ' personal information, such as passwords, credit card numbers, and so on. Spyware can be installed on a computer through downloaded or installed programs. A well-known example of spyware is the keylogger program, which records all the typing on the user's keyboard and sends itto the attacker.
  5. Adware: Adware is a program that displays unwanted advertisements on a user's computer. Adware can be installed on a computer through downloaded or installed programs. A wellknown example of adware is the Gator program, which displays pop-up ads on a user's computer.
  6. Ransomware: Ransomware is a program that encrypts files on a user's computer and requests a ransom to recover them. Ransomware can be installed on a computer through suspicious emails or dubious links. A well-known example of ransomware is the WannaCry program, which attacked thousands of computers in 2017 and demanded ransom in the form of bitcoins.
  7. Scareware: Scareware is a type of malware designed to force users to perform certain actions out of fear. Scareware fakes pop-up windows that resemble operating system dialog windows. This window conveys a false message stating that the system is at risk or needs to run certain programs in order to return to normal operation. In reality, no problem is checked or detected and if the user agrees and deletes the mentioned program to run, his system will be infected with malware.?
  8. Rootkit: Rootkit Malware is designed to change the operating system to create a backdoor. The attacker then uses the backdoor to access the computer remotely. Most rootkits exploit software vulnerabilities enhancing privileges and modifying system files. Rootkits also commonly modify system forensics and monitoring tools, making rootkits very difficult to detect. Often, the operating system of a computer infected with a rootkit must be removed and reinstalled.
  9. Bot: Bot from the word robot, bot is malware designed to automatically perform actions, usually online. Although most bots are harmless, what increases the use of malicious bots is botnets. Some computers are infected by bots programmed to silently wait for commands given by attackers.
  10. MitMo (Man-in-the-Mobile) – a variation of man-in-the-middle, MitMo is a type of attack used to control a mobile. When infected, mobile devices can be instructed to disclose sensitive user information and transmit it to the attacker. ZeuS, an example of an exploit with MitMo capabilities, allows attackers to surreptitiously retrieve 2-step verification SMS messages sentto users.

That's all explanation and example of each type of malware. It is important to always run security software and avoid opening email attachments or clicking links from unknown sources to protect yourself from malware.?

When a computer is infected by malware, there are several symptoms that can occur. Here are some common symptoms that can occur on a computerinfected with malware:

  • Slow performance: when a computer is infected with malware, computer performance may slow down or become unresponsive. This can happen because malware uses computer resources that would otherwise be used to run other applications or processes.
  • Pop-up ads: Malware such as adware can display unwanted pop-up ads on a user's computer. These ads may appearrandomly and may interfere with user activity.
  • Unknown programs: when a computer is infected with malware, Unknown or not previously installed programs may appear on the computer. Such programs may be suspicious and may contain malware.
  • Changes to the browser: Malware can change browser settings, such as the start page, default search engine, or add unwanted extensions or toolbars. It may interfere with the user's browsing activity and may be able to triggerthe appearance of pop-up ads.
  • Error messages: Malware can trigger error messages or fake popup messages that appear on a user's computer. The message can trick users into clicking on links or downloading programs that are actually malware.
  • Data loss: Malware such as ransomware can encrypt or delete data on a user's computer. Users may not be able to open encrypted files or experience significant data loss.?

Examples of other symptoms described by www.netacad.com from a computerinfected by malware :?

  • Increased CPU usage.
  • Computer speed decreases.
  • Computers often experience interference or damage.
  • Web browsing speed decreases.
  • An unexplained problem occurred with the network connection.
  • The File has changed.
  • Deleted files.
  • There are unknown files, programs, or desktop icons.
  • The passage of an unknown process.
  • The Program turns off orreconfigures itself.
  • Emails are sent withoutthe user's knowledge or consent.?

Those are some of the symptoms that can occur on a computer infected with malware. If you suspect that your computer has been infected, it is recommended to run security software to detect and remove the malware.?

Here are some ways to avoid malware:

  • Install and Update security software: install and use security software such as antivirus, antispyware, orfirewallto protect your computer or device from malware threats. Also make sure thatthe security software is always updated with the latest version.
  • Don't click suspicious links or attachments: avoid clicking suspicious links or attachments in emails, instant messages, or social media. These links or attachments may contain destructive malware or viruses.
  • Enable security features: enable security features provided by the operating system or application, such as browser security settings orfirewall configuration,to avoid attacks from malware.
  • Do not download orinstall software from unknown sources: avoid downloading orinstalling software from unknown sources or suspicious websites. Make sure thatthe downloaded orinstalled software comes from a trusted source.
  • Update the operating system and apps regularly: make sure that the operating system and apps on your device are up to date with the latest versions. This can help prevent malware threats that exploit security gaps in older versions.
  • Perform regular data backups: perform regular data backups on the device and store them in a safe place. This can help avoid data loss if your device is infected with malware or damaged.
  • Self-Education: Learn aboutthe types of malware that exist and the ways they work, as well as ways to avoid and overcome the threat. This can help increase awareness and the ability to protect devices from malware attacks.

In conclusion, malware is a program designed to disrupt or damage a computer system or other device. The types of malware that exist are very diverse,ranging from viruses, worms,trojans,ransomware,to spyware, adware, and rootkits.

Malware can spread through a variety of media, including email, insecure websites, orthrough networks connected to the internet. When a device is infected with malware, symptoms can vary,ranging from decreased system performance,the appearance of unwanted popups,to data loss or even damage to the device.

To avoid malware threats, itis recommended to install security software, not click on suspicious links or attachments, avoid downloading orinstalling software from unknown sources, as well as perform regular data backups.

In an increasingly technological world, malware is still a significant threatto users of computer and mobile devices. Therefore, itis importantto always raise awareness and knowledge about malware threats and ways to protect devices from such attacks.?

Mini E-book :

  1. Versi Bahasa Indonesia :?Unduh disini
  2. English Version :?Download here

References :

1. International Journal of Information and Computer Security

2. www.cisco.com

3. www.cssia.org

4. www.lms.onnocenter.or.id

5. www.britannica.com

6. www.ncsc.gov.uk

Posted on 2023-03-10

Author : Ichsan Budiman Putra

要查看或添加评论,请登录

社区洞察

其他会员也浏览了