Resources

Blog

What are the various types of malware and where are they located?

malware

Oct 28, 2021

Malicious software—or malware—is used by threat actors to access and infect a computer or network while avoiding being detected. Certain terms such as viruses, adware, spyware, ransomware, worms or Trojan horses; are all different types of malware that can cause severe damage your computers. Cybersecurity vendors are constantly on the lookout to locate these dangerous codes and put an end to them before they cause significant damage.

All forms of malware are extremely treacherous once they infiltrate a device, but the way malware functions differ is dependent on the type of malware. As you look to better safeguard your most critical business assets, we have provided a list of several types of malware and short definitions for how they work that will help inform your planning for stronger defense-in-depth. Of course, Cyber1 Security is happy to further discuss your specific security needs and explore services that will help best protect your business. Let’s review:

Viruses:
Function — Software that replicates itself over and over again once it is activated
Threat — Viruses will corrupt or delete data
Location — Comes in emails

Adware:
Function — Software that throws advertisements up on your screen (pop-ups)
Threat — Can also corrupt your server and disable you from getting online
Location — Found on the web; can appear through potential unwanted programs

Spyware:
Function — Software that sneakily clings to your computer’s Operating System
Threat — Collects all kinds of information
Location — Can come in through terms and conditions you agree to

Ransomware:
Function — Software from crypto-virology that will lock you out of your own files
Threat — They will block you from your own files until you pay a ransom
Location — Usually carried in through a download or an attachment in an email

Extra — Outlaws

Worms:
Function — Software that relies on vulnerabilities in a computer and spreads like a virus
Threat — They replicate to a point that your network is damaged and bandwidth consumed
Location — Found in vulnerable code

Trojans:
Function — Software that looks legitimate but is activated once its program is clicked
Threat — Designed to damage your computer in any way — disrupt, steal, infect, etc.
Location — They appear in what looks like normal social media ads or other normal links

The above descriptions summarize some of the key components of what these malicious software programs can do, but they all carry an equal amount of concern if your computer is affected. In addition, there are a few other types of malware that we haven’t discussed—Botnet, Rootkit, Spam, etc.

When malware was first created, it was used as pranks and experiments, but now they’re always destructive. If your network or computer is infected by some kind of malware, you should contact a cybersecurity service provider immediately.

To preempt and harden your environment to cyber threats, Cyber1 Security welcomes the opportunity to discuss our cybersecurity offerings, including the value of an initial security assessment, to determine your current level of risk exposure and appropriate steps to remediate security blind spots. Contact us today, we’re here to help!

Downloadables

resource-15ways
15 Ways to Protect Your Business From a Cyberattackdownload
resource-essentialsSMB Cybersecurity Essentials – 30 items to cover with your teamdownload
resource-essentialsTipsheet - 5 Critical Features to Combat Business Email Compromisedownload
resource-managedIs Managed Security Right For Your Business?download