top of page
MALWARE

Is your computer behaving strangely? Will it not boot up? If so, it may have been infected by malware.

To my mind, the phrase 'malware' signifies any malicious software that gets installed on your machine performing unwanted tasks with or without your consent, usually for some third parties’ benefit or just to cause for mayhem, and is often divided into some of the following categories:

Viruses: Software that can replicate itself and spread to other computers or are programmed to damage a computer by deleting files, reformatting the hard disk, or using up computer memory. It is contagious and often spreads through software shared between computers. They can be subdivided into; file viruses, script viruses, macro viruses and boot sector viruses.

​

Spyware: Software that secretly gathers private information about the user's behaviours and transmits it to interested parties. With the use of keyloggers, they can steal passwords by detecting keyboard inputs, which is why banks often use dropdown boxes for inputting sensitive data. Other types of information that is gathered includes the Web sites visited, browser and system information. It's nearly all done for illegitimate financial gain.

​

Adware: Software that is financially supported (or financially supports another program) by displaying ads when you're connected to the Internet and open your browser. Not all Adware is malicious or illegal, but either way, it slows down your computer, can be extremely annoying, and should be removed.

​

Worms: Unlike viruses, worms are malicious programs in them selves and can propagate on there own without a host program. Once a worm has found it's way into the system, it can replicate it's self many times and spread through whole networks, in some cases, causing serious damage. The financial implications can be catastrophic. Worms often enter a computer via an email attachment, following a link sent in an email or from peer-to-peer file sharing.

​

Bots: Often entering a computer after the user has inadvertently downloaded the infection via email phishing messages that urge the recipient to click on a link or a social media message. The purpose of malware bots is to gain control over a computer and yield specific information like passwords, banking details and other personal data. They are self-propagating and geared to infecting large numbers of computers which then link to the head quarters of the cyber-criminals. The victim's computer can become part of a Botnet, which is a network of infected computers.

​

Trojans: There are many types of trojans out there and they generally enter a system disguised as legitimate software, often because the user has been tricked into installing them. The primary function of a Trojan is to allow cyber-criminals to gain access to the user's operating system in order to steal information and data. These malicious tricks can sometimes involve modifying, copying and deleting data - even blocking data access. Probably the worst type of Trojan is Ransomware - read on..

​

Ransomware: This type of malware is becoming increasingly common and more sophisticated. Basically, once infected, the user's machine is held hostage until a ransom fee is paid to the cyber-criminal. I like to split them into two different categories:

  1. Lockout - this type interrupts the users' computer experience, either by covering their desktop with an image that the user can't remove, or by locking the user out of their system, often by using 'Syskey' (built into Windows) locked with a password only the cyber-criminal knows.

  2. Crypto-ransomware - Once this ransomware has taken hostage of the computer, it will search through hard drives, network drives (including cloud storage folders) and any connected media (such as pen-drives), for files to encrypt. The attackers use a method called asymmetric encryption, which depends on two keys, a private and a public. The data is encrypted using the public key which can only be decrypted with hacker's private key.

Which ever type was used, the attacker will demand payment from the user, in return for putting the system right. Evidence suggests they usually can't be trusted to keep to their side of the bargain, whether by incompetence or malice! If you are further interested, you may want to read here.

​

General

It should be noted that the above is not an exhaustive list as the variety of malware out there is continuously on the increase.

Common Symptoms

A computer infected by Malware may suffer from many symptoms, some that you may not even be aware of due to the stealth like behaviour that many adopt by design, but may include:

  • Computer has slowed down considerably

  • Computer will no longer boot into windows or keeps rebooting without your intervention

  • Files are corrupt, missing or won’t open

  • Mysterious files are created

  • Windows stops functioning and displays the 'Blue Screen of Death' or 'Black Screen of Death'

  • The system locks up entirely and a forced restart is needed

  • Anti-virus/anti-spy program will no longer update

  • Applications keep crashing

  • Pop-up ads keep appearing on your screen

  • Changes to your desktop appearance without your intervention

  • People receive e-mails from you that you haven’t sent

  • Your web-browser homepage has changed for no apparent reason

Best Practice

As we know, prevention is better than cure. It is extremely important these days that you have an Anti-virus program installed on your machine and that it is up to date with the latest virus signature. The best way to do this is by ensuring that the automatic updates function is enabled. It is also becoming increasingly vital to have a proper backup and recovery strategy, especially if your files are important to you and computer down time could cause you major problems.

If you concerned your equipment my be infected or you would like my assistance in prevention strategies, please don't hesitate to contact me.

bottom of page