Most internet users have heard of the term Malware, but what is it? What does it do? How can I protect myself and my organisation?
I urge all readers to forward this article to their staff and friends.
What is Malware?
Malware is a blanket term for any application that, by design, is malicious in intent; usually without the users knowledge.
But isn’t that a virus? – Yes. In fact, a virus is a type of Malware. Traditionally, all Malware was commonly referred to as a virus, but that is not technically correct, as viruses are only one type of Malware, which is designed to replicate itself, much like a biological virus infects living cells.
Malware has been around since the introduction of the Personal Computer The very first example was called “Creeper” and was an experiment derived from University lectures made in the 1940’s.
The first virus for the Personal Computer was actually written targeted Apple DOS 3.3. It was called “Elk Cloner”.
These early examples of Malware were harmless in comparison with today’s Malware.
Why is there Malware?
There a several reasons as to why there is Malware.
- Money: Many forms of Malware are designed to either steal information from users for financial gain or to extort money from users to remove said Malware
- Thrill: As with the case of Arson and Vandalism, some individuals gain pleasure from the damage and chaos caused by Malware infections
- Status: Some individuals who can create such software believe this will give them a reputation among their peers.
How do I get infected by Malware?
There are three primary “Vectors” of infection:
- Email: Infected emails usually contain attachments which the email attempts to persuade the user to open.
- Websites: Websites that have security issues may be hacked and loaded with Malware that will be deployed to visitors of the infected website.Recent browser security changes have made this method less effective, but it’s still possible if you are not careful about what you click on.
- Social Media: Websites like Twitter and Facebook may contain posts that try to get you to visit websites that have been infected or to download Malware claiming it’s legitimate software.
What will the Malware do on my computer?
This will depend on the type of Malware on your computer, however it will generally be one of the following:
- The Malware may steal your personal and or financial details facilitating Indentity Theft.
- The Malware may render your computer unusable demanding payment to remove the Malware.
- The Malware may use your computer as a ‘Bot Net’, which is essentially a member of a large group of computers committed to performing the same task, which in many cases, sends out large amounts of SPAM email.
What else might happen?
Certain types of Malware exhibit certain detectable characteristics. This commonly involves ‘Phoning Home’ to a server for further instructions or to deliver the captured personal data. There are organisations that utilise ‘Sinkholes’ that pretend to be one of these servers and ‘Blacklist’ any IP address that attempts to contact these servers.Once you are put on one of these Blacklists, YOUR ENTIRE ORGANISATION may be banned from sending email. This is an attempt to reduce the amount of SPAM generated by Malware. Removal from these Blacklists can be a slow and difficult process.
How can I avoid getting infected?
To prevent infection, the number one rule is “If in Doubt – Don’t!”.
However, most users have not been trained to doubt what they are downloading.
This post aims to raise awareness regarding avoiding Malware.
Look for the following signs that may tell you that you are about to be a victim of Malware.
For Emails:
- If the email is from a contact that you know, check the email address. This is commonly visible next to the sender’s name. This is not a foolproof method however as the sender’s email address can be faked.
- If the subject or content of email is confusing, or if it doesn’t seem to apply to you, it should be treated as fraudulent until proven otherwise. i.e. An email from a bank that you do not bank with, or an email advertising you’ve won a competition that you know you didn’t enter.
- If the email has attachments, do not open them if you are not waiting for said attachments. Many Malware bearing emails try and tell you this is a file or report that you requested when in fact you did not.
- Look at any hyperlinks provided within the email. What it says and where it goes are often completely different. Hover your mouse over the link without clicking to see where it really goes. If it’s different, it should be immediately suspect.
For Websites:
- If it’s a website you visit frequently, take note of anything that seems out of place.
- Advertisements on websites should be treated with caution. Do not trust what you read. This is usually true with most forms of advertising, but you won’t get Malware from a newspaper.
- Bright or Flashing links should be avoided, plus they’re annoying.
- Beware of any pop-up windows, especially if they appear without you clicking on a link first.
- Do not blindly click on links on web pages. As with links in emails, hovering your mouse over these links will usually reveal where they are really going. In Web browsers like Google Chrome and Firefox, the real link commonly shows up on the lower left corner of the screen. In Internet Explorer, you will need to enable the ‘Status Bar’ to see the real link addresses.
- When downloading files from the Internet, some browsers give you the option to ‘Run’ or ‘Save’. NEVER click ‘Run’. This takes away the ability for you to review the file you have downloaded before opening it.
How do I know if my computer is infected?
Malware typically runs in the background, doing its evil deeds without attracting attention. Although these can be almost undetectable to the user, the following symptoms may be a sign that you’re infected:
- Computer performance seems to degrade noticeably for no apparent reason.
- Your computer may tell you that your Antivirus is presently turned off.
- You notice that unusual programs have been suddenly installed on your computer.
Some types of Malware are designed to be highly visible and make no secret of the fact that you are infected. These ones usually demand payment of some form.
What can I do if I’m infected or suspect that I’m infected?
The best thing you can do is to contact your Manager and/or IT department and inform them that you think you may be infected. Your IT staff can review the file and the system to determine if you are infected and to remove any infection. If you suspect a Malware infection, try to avoid using the computer until you are given the all-clear.