Thursday, March 5, 2020

Malware Attacks: A kind of Cyber Attacks


Malware Attacks

Malware is a code that is made to stealthily affect a compromised computer system without the consent of the user. This broad definition includes many particular types of malevolent software (malware) such as spyware, ransomware, command, and control.
Many well-known businesses, states and criminal actors have been implicated of and discovered deploying malware.
Malware differs from other software in that it can spread across a network, cause changes and damage, remain undetectable, and be persistent in the infected system. It can destroy a network and bring a machine’s performance to its knees.

Ransomware

Ransomware blocks access to a victims data, typically threating delete it if a ransom is paid. There is no guarantee that paying a ransom will regain access to the data. Ransomware is often carried out via a Trojan delivering a payload disguised as a legitimate file.

Drive-by Attack

A drive-by attack is a common method of distributing malware.
A cyber attacker looks for an insecure website and plants a malicious script into PHP or HTTP in one of the pages. This script can install malware into the computer that visits this website or become an IFRAME that redirects the victim’s browser into a site controlled by the attacker. In most cases, these scripts are obfuscated, and this makes the code to be complicated to analyze by security researchers. These attacks are known as drive-by because they don’t require any action on the victim’s part except visiting the compromised website. When they visit the compromised site, they automatically and silently become infected if their computer is vulnerable to malware, especially if they have not applied security updates to their applications.

Trojan Horses

A Trojan is a malicious software program that misrepresents itself to appear useful. They spread by looking like routine software and persuading a victim to install. Trojans are considered among the most dangerous type of all malware, as they are often designed to steal financial information. For more about cyber attacks

2 comments:

  1. The information is so much useful and knowledgeable. WordPress web design company Thanks for sharing it with us. your post are so amazing. keep it up.

    ReplyDelete
  2. This comment has been removed by the author.

    ReplyDelete

Threat Intelligence Lifecycle

The intelligence lifecycle is a process to transform raw information into finished intelligence for decision making and action. You will ...