Malwares | Top 10 Types of Malwares | Malware Security | How to Secure Computing Devices from Malwares?

Introduction to Malwares

A malware or a malicious software is a software that can harm our computing devices in any way. But question arises here in what ways? The simple and clear answer to that question is that;

     1)      It can steal our information.

     2)      It can lock our files.

     3)      It can give unauthorized access to user or sender of that malware to our device.

     4)      It can blast our devices also.


Some Famous Malwares of History

  1. ILOVEYOU (2000): It was an Email Worm that infected 10 million computers and 10 billion dollars loss was faced by the world due to that worm.
  2. Mydoom (2004): It was a fastest spreading Email worm that launched lot of DDoS attacks.
  3. Conficker (2008): It was a Network worm that compromised lot of windows systems and created a large botnet.
  4. Stuxnet (2010): That was a Worm/Cyberweapon that infected industrial systems.
  5. Zeus (2007): It was a Banking Trojan that stole lot of banking credentials and caused a big financial loss worldwide.
  6. CryptoLocker (2013): It was a Ransomware that encrypted files and damaged lot of Bitcoin Payments.
  7. WannaCry (2017): It was a Ransomware Worm that exploited SMB vulnerability and infected 150 countries.
  8. NotPetya (2017): It was a Wiper Malware caused over $10 billion worldwide, by wiping data.
  9. Mirai (2016): It was a IoT Botnet Malware that infected IoT devices to launch DDoS attacks to break the records.
  10. Emotet (2014): It was also a Banking Trojan that distributed other malwares.

Types of Malwares

Malware will infect our computing devices in what way depends on type of malware. There exist almost 25+ well known types of malwares and their number is increasing day by day. A malware can be a composition of two or more types. Some famous Types of malwares are discussed below.

1) Virus

It is a very dangerous type of malware that attaches itself to a real or normal user file or program and spreads when the muted file is executed. To perform malicious activity it requires human action.
Examples: Melissa, CIH

2) Worm

A self-replicating malware that performs malicious activity by spreading very fast across networks without user action. It is designed to exploits system vulnerabilities and infects other machines in network.
Examples: ILOVEYOU, Conficker

3) Trojan Horse

Malware that acts as normal software enforcing users to install it. It is not self-replicating but creates backdoors or steals data or information of user.
Examples: Zeus, Emotet

4) Rootkit

It is an information stealing malware designed to hide its presence and give attackers root access. It changes system processes to avoid detection.
Examples: Sony BMG rootkit, TDSS

5) Ransomware

Malware that harms the systems by locking victim’s files or systems and demands payment for recovery or decryption key. Main cause of its spread are phishing emails or network exploits.
Examples: WannaCry, CryptoLocker

6) Spyware

It is a malware that secretly monitors user activity and steals sensitive data like passwords, banking details etc.                                                                                                                        Examples: Pegasus, FinFisher

7) Adware

It is a type of malware that automatically displays as unwanted advertisement on a user’s device. It monitors browsing behavior to display ads in which we are interested and may slow down system performance.
Examples: Fireball, Gator

8) Keylogger

It is a malware that records every keystroke secretly, a user types on its keyboard. It is mostly used to steal passwords, credit card numbers, and other sensitive information.
Examples: Agent Tesla and Ardamax Keylogger are famous examples.

9) Polymorphic Malware

Malware that constantly changes its malicious code or signature to be not detected by antivirus. Strong encryption algorithms or code mutation techniques help it to keep itself to be undetectable by Antimalware.
Examples: Storm Worm, Virut

10) Fileless Malware

Malware that executes in memory without creating any type of files in disk space. It PowerShell to prevent itself from detection by Antivirus.
Examples: Poweliks, Astaroth

There exist other types of malwares also but these are top 10 that are discussed and faced normally in real world Cyber Attacks.

In Which Programming Languages Malwares are Written?

Most malwares are written in C++, Rust, Nim and Go programming languages, although any programming language can be used, however, this is the most popular as they generate fast binary code directly accessing the low-level systems and with minimal dependencies. They provide us with convenient access to control of memory, cross-platforms and more convenient disguise of code. Compiled code is also less susceptible to analysis compared to the scripts written in simple language and increases stealing and prevention of antivirus detection.

Malware Security

As I have discussed before the number of malwares is increasing day by day which means we will face more malware attacks in future. To, prevent the whole world from these attacks malware security and malware awareness is very necessary.

Malware Analysis

Malware Analysis is a separate sub-field of cyber security in which malware analysts test the malwares, understand their behavior and also analyze their codes. Then they design the security measures to prevent users from this malware.


Malware Analyst

Malware analyst is specialized person in malware analysis that analyzes the behavior and code of malware and designs and security measure to prevent people from that type of malwares. He/she develops secure code (antimalware) and prevention techniques. It is a future demanding career.

Difference Between Antivirus and Antimalware

Antivirus: Antivirus is a software or application that prevents our computing devices from viruses (virus is a sub type of malware). For example, Norton Antivirus, Bitdefender Antivirus etc. In most cases Antivirus is necessary for a device because it is self-replicating and more dangerous. Try to use paid Antivirus because it will give you more security.

Antimalware: It prevents our computing devices from all types of malwares. For example, Malwarebytes. Antimalware is harder to develop.

How Can We Secure Our Computing Devices from Malwares?

Top 10 security tips are given below that you can follow in your daily life to keep yourself secure from malwares.

  1. Put up the latest security patches on your software and operating system.
  2. Install reliable antimalware/antivirus software and make sure that it is up to date.
  3. Do not open suspicious links, email attachments, or emails that have been sent by an unknown person.
  4. Create powerful and exceptional passwords and enable two-factor authentication.
  5. Automatically save valuable information to external disks or the cloud.
  6. Turn off macros and scripts in documents, which are of unauthorized origin.
  7. One should not download any software on unchecked or pirated sites.
  8. A firewall will be used to monitor and block unauthorized network access.
  9. It is essential to keep browsers and plugins maintained and security settings should be enabled.
  10. Use VPN while using public WiFi.

Post a Comment

Previous Post Next Post