What is a Malware Attack?

Page 1

What is a Malware Attack?

A malware attack is a cyber-attack that is carried out by a malicious program or code, or malware. Malware can be used to steal information, modify and delete data, monitor computer activity and cause damage to computer systems. Often malware uses freeware to infiltrate computers. Freeware is downloadable software that comes with no strings attached. Malware is any software program created to damage, disrupt or gain access to information systems and can take many different forms. The purpose of a malware attack is to damage, disrupt or gain access to a computer or network and the information stored on them. Malware can be introduced either through an email link or a downloaded file from the Internet. A malware attack will often result in loss of data, financial loss, or both. A malware attack typically includes an email or website carrying malicious code that can infect the computer of a user who downloads and opens the email or visits the website. The malware could then spread to other computers on the network, enter personal or classified information and send spam emails.


What does malware do?

Malware (short for malicious software) can infect networks and devices in order to harm those devices, networks and/or their users in some way. Malware is designed to trick people into installing it on their computers or other devices, often masquerading as useful software like a game or video or music player. Once installed, malware can slow down your computer, collect information about you without your knowledge, commit identity theft by stealing passwords for banking or e-commerce sites, use your computer as part of a network that is involved in the distribution of spam email, install other kinds of malware on your computer and steal personal data and Malware can infect computers, networks, and mobile devices in order to steal data important to the user, lock out access and prevent the use of those devices by their owners. Depending on the exact type of malware and its intended purpose, its effects can be quite varied.


How do malware infections happen?

As malware authors gain access to new methods of infecting systems, it is important that your team stays aware of the most common attack techniques. We've given you an overview of the most common attack vectors in order to help you preempt threats. Some of the most common methods of infection involve email attachments with malicious code or links that direct users to phishing sites where they enter their user credentials, infecting their systems and spreading malware among their network. Command & Control servers are also commonly used to communicate with affected machines, resulting in the spread of malware. To better understand how malware infections occur, let's look at some realworld examples of the three most common types of malware delivery: phishing attacks, drive-by downloads, and email attachments.


Malware infections happen when cyberthreat actors deliver malware by disguising malicious files and links in legitimate email communications. In addition, malware can be hidden inside software vulnerabilities embedded within outdated or vulnerable software applications. Once the malware is installed, a cyberattacker can anonymously access the compromised system or server remotely. These findings can be used by you to help implement your organization's security defenses against these attacks.


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.