Problem solving

Malicious Software and How it Affects Your Computer II

Written by Abiodun OLUWASIKU · 2 min read >

Malware is malicious software intentionally designed and spread to infect computer systems, networks, information, and data thereby causing a denial of service, stealing sensitive data, encrypting data, or disrupting the users. The focus of this blog is to examine the following malwares: trojan horse, adware, scareware, androgue security software.

Trojan Horse

Programmes that are disguised as useful codes such as OS patches, software packages, software updates, or games. Trojan horse is a malicious code hidden within legitimate software to gain users’ system access with their software, spy on users’ online activity, or steal sensitive data. Once downloaded and executed, Trojans perform actions that the user did not intend, such as opening certain ports for subsequent access by the intruder.

Adware

Advertising-supported software, adware for short, is unwanted software designed to throw advertisements up on your screen, most especially within a web browser. Typically, it uses an underhanded method to either disguise itself as legitimate, or piggyback on another program to trick you into installing it on your PC, tablet, or mobile device. Adware generates revenue for its developer by automatically displaying online advertisements in the user interface of the software or on a screen that pops up in the user’s face during the installation process.

Ransomware

Consider a financial institution, a hospital, or a telecommunications company, which cannot access the database because they have been encrypted. Ransomware is malicious code designed to deny a user or organization access to files on their computer. By encrypting these files and demanding a ransom payment for the decryption key, the attackers place victim organizations in a position where paying the ransom is the easiest and cheapest way to regain access to their files. The WannaCry outbreak of 2017 is the beginning of modern ransomware. This large-scale and highly-publicized attack demonstrated that ransomware attacks were possible and potentially profitable. Since then, dozens of ransomware variants have been developed and used in a variety of attacks. Ransomware follows three basic procedures: infection and distribution vectors, data encryption, and ransom demand.

Wiper malware

wiper is a malware that is intended to erase or wipe the hard disk of the computer it infects thereby maliciously deleting data and programs. “Wiper” was said to have been used to attack Iranian oil companies. In the ongoing Russia-Ukraine conflict in 2022, wiper malware emerged as a popular cyber weapon of choice for threat actors. wiper malware can be defined as malicious software that tries to destroy data.

Scareware

Scareware is malware that uses social engineering to trick users into believing they need to download or buy malicious, sometimes useless, software. Scareware manipulates, coaxes, and compels users to install fake anti-virus software. The essence of scareware includes selling useless, fake tools, and installation of malware that can damage data.

Rogue security software 

A form of malware that misleads users into believing there is a virus on their computer and convinces them to pay for a fake antivirus that installs malicious code on their computers.  Rogue software is designed to manipulate and trick potential victims into thinking their computer is infected with a virus. The objective may only be to scare users.

Conclusion

Computer users must remain vigilant to avoid being victims of malicious codes. It is advisable to adopt preventive measures such as firewalls, regular patching, software updates, being careful with the use of vectors such as USB,

You must stick with tested, trusted, and up-to-date software products. You must resist the click reflex. It could be a scam if you receive a warning about a new virus or an invitation to download free software. You must be sure before you click and download.

Leave a Reply