What is Malware? Definition, Types, Prevention - TechTarget (2024)

What is Malware? Definition, Types, Prevention - TechTarget (1)

By

  • Ben Lutkevich,Technical Features Writer

What is malware?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter orhijack core computing functionsand monitor end users' computer activity.

What does malware do?

Malware can infect networks and devices and is designed to harm those devices, networks and/or their users in some way.

Depending on the type of malware and its goal, this harm may present itself differently to the user or endpoint. In some cases, the effect malware has is relatively mild and benign, and in others, it can be disastrous.

No matter the method, all types of malware are designed to exploit devices at the expense of the user and to the benefit of the hacker -- the person who has designed and/or deployed the malware.

How do malware infections happen?

Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks. For example, malicious programs can be delivered to a system with a USB drive, through popular collaboration tools and bydrive-by downloads,which automatically download malicious programs to systems without the user's approval or knowledge.

This article is part of

What is data security? The ultimate guide

  • Which also includes:
  • The importance of data security in the enterprise
  • 5 data security challenges enterprises face today
  • How to create a data security policy, with template

Phishing attacks are another common type of malware delivery where emails disguised as legitimate messages contain malicious links or attachments that deliver the malware executable file to unsuspecting users. Sophisticated malware attacks often feature the use of acommand-and-control serverthat enables threat actors to communicate with the infected systems, exfiltrate sensitive data and even remotely control the compromised device or server.

Emerging strains of malware include new evasion andobfuscationtechniques designed to not only fool users, but also security administrators and antimalware products. Some of these evasion techniques rely on simple tactics, such as using web proxies to hide malicious traffic or source IP addresses. More sophisticated threats includepolymorphic malwarethat can repeatedly change its underlying code to avoid detection from signature-based detection tools; anti-sandboxtechniques that enable malware to detect when it is being analyzed and to delay execution until after it leaves the sandbox; andfileless malware that resides only in the system's RAM to avoid being discovered.

What is Malware? Definition, Types, Prevention - TechTarget (2)

What are the different types of malware?

Different types of malware have unique traits and characteristics. Types of malware include the following:

  • Avirusis the most common type of malware that can execute itself and spread by infecting other programs or files.
  • Awormcan self-replicate without a host program and typically spreads without any interaction from the malware authors.
  • ATrojan horseis designed to appear as a legitimate software program to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
  • Spywarecollects information and data on the device and user, as well as observes the user's activity without their knowledge.
  • Ransomwareinfects a user's system and encrypts its data. Cybercriminals then demand a ransom payment from the victim in exchange for decrypting the system's data.
  • Arootkitobtains administrator-level access to the victim's system. Once installed, the program gives threat actors root or privileged access to the system.
  • Abackdoorvirus or remote access Trojan (RAT) secretly creates a backdoor into an infected computer system that enables threat actors to remotely access it without alerting the user or the system's security programs.
  • Adwaretracks a user's browser and download history with the intent to display pop-up or banner advertisem*nts that lure the user into making a purchase. For example, an advertiser might usecookiesto track the webpages a user visits to better target advertising.
  • Keyloggers, also called system monitors, track nearly everything a user does on their computer. This includes emails, opened webpages, programs and keystrokes.

How to detect malware

Users may be able to detect malware if they observe unusual activity such as a sudden loss of disk space, unusually slow speeds, repeated crashes or freezes, or an increase in unwanted internet activity and pop-up advertisem*nts.

Antivirus and antimalware software may be installed on a device to detect and remove malware. These tools can provide real-time protection or detect and remove malware by executing routine system scans.

Windows Defender, for example, is Microsoft antimalware software included in the Windows 10 operating system (OS) under the Windows Defender Security Center. Windows Defender protects against threats such as spyware, adware and viruses. Users can set automatic "Quick" and "Full" scans, as well as set low, medium, high and severe priority alerts.

What is Malware? Definition, Types, Prevention - TechTarget (3)

How to remove malware

As mentioned, many security software products are designed to detect and prevent malware, as well as remove it from infected systems.

Malwarebytesis an example of an antimalware tool that handles detection and removal of malware. It can remove malware from Windows, macOS, Android and iOS platforms. Malwarebytes can scan a user's registry files, running programs, hard drives and individual files. If detected, malware can then be quarantined and deleted. However, unlike some other tools, users cannot set automatic scanning schedules.

How to prevent malware infections

There are several ways users can prevent malware. In the case of protecting a personal computer, users can install antimalware software.

Users can prevent malware by practicing safe behavior on their computers or other personal devices. This includes not opening attachments from strange email addresses that may contain malware disguised as a legitimate attachment -- such emails may even claim to be from legitimate companies but have unofficial email domains.

Users should update their antimalware software regularly, as hackers continually adapt and develop new techniques to breach security software. Security software vendors respond by releasing updates that patch those vulnerabilities. If users neglect to update their software, they may miss out on a patch that leaves them vulnerable to a preventable exploit.

In enterprise settings, networks are larger than home networks, and there is more at stake financially. There are proactive steps companies should take to enforce malware protection. Outward-facing precautions include the following:

  • Implementing dual approval for business-to-business (B2B) transactions; and
  • Implementing second-channel verification for business-to-consumer (B2C) transactions.

Business-facing, internal precautions include the following:

  • Implementing offline malware and threat detection to catch malicious software before it spreads;
  • Implementing allowlist security policies whenever possible; and
  • Implementing strong web browser-level security.

Does malware affect Macs?

Malware can affect Macs as well as Windows. Historically, Windows devices are considered to be a larger target for malware than Macs, in part because users can download applications for macOS through the App Store.

The company Malwarebytes reported in 2020 that for the first time ever, malware on Macs is outpacing malware on PCs. This is in part due to the popularity of Apple devices, drawing more attention from hackers.

Does malware affect mobile devices?

Malware can be found on mobile phones and can provide access to a device's components such as the camera, microphone, GPS oraccelerometer. Malware can be contracted on a mobile device if a user downloads an unofficial application or clicks on a malicious link from an email or text message. A mobile device can also be infected through a Bluetooth or Wi-Fi connection.

Mobile malware more commonly found on devices that run the Android OS than iOS. Malware on Android devices is usually downloaded through applications. Signs that an Android device is infected with malware include unusual increases in data usage, a quickly dissipating battery charge, or calls, texts and emails being sent to the device contacts without the user's initial knowledge. Similarly, if a user receives a message from a recognized contact that seems suspicious, it may be from a type of mobile malware that spreads between devices.

Apple iOS devices are rarely infected with malware because Apple vets the applications sold in the App Store. However, it is still possible for an iOS device to be infected with malicious code by opening an unknown link found in an email or text message. iOS devices will also become more vulnerable if jailbroken.

History of malware

The termmalwarewas first used by computer scientist and security researcher Yisrael Radai in 1990. However, malware existed long before this.

One of the first known examples of malware was the Creeper virus in 1971, which was created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was designed to infect mainframes on ARPANET. While the program did not alter functions or steal or delete data, it moved from one mainframe to another without permission while displaying a teletype message that read, "I'm the creeper: Catch me if you can." Creeper was later altered by computer scientist Ray Tomlinson, who added the ability to self-replicate to the virus and created the first known computer worm.

The concept of malware took root in the technology industry, and examples of viruses and worms began to appear on Apple and IBM PCs in the early 1980s before becoming popularized following the introduction of theWorld Wide Weband the commercial internet in the 1990s. Since then, malware -- and the security strategies to prevent it -- have only grown more complex.

Similar programs to malware

There are other types of programs that share common traits with malware but are distinctly different. One example is aPUP, or potentially unwanted program. These are applications that trick users into installing them on their systems -- such as browser toolbars -- but do not execute any malicious functions once they have been installed. However, there are cases where a PUP may contain spyware-like functionality or other hidden malicious features, in which case the PUP would be classified as malware.

This was last updated in June 2022

Continue Reading About malware

  • Malware vs. ransomware: What's the difference?
  • Malware analysis for beginners: Getting started
  • Top 10 types of information security threats for IT teams

Related Terms

advanced persistent threat (APT)
An advanced persistent threat (APT) is a prolonged and targeted cyber attack in which an intruder gains access to a network and ... Seecompletedefinition
cyber attack
A cyber attack is any malicious attempt to gain unauthorized access to a computer, computing system or computer network with the ... Seecompletedefinition
cyber resilience
Cyber resilience is the ability of a computing system to identify, respond and recover quickly should it experience a security ... Seecompletedefinition

Dig Deeper on Threats and vulnerabilities

  • 12 common types of malware attacks and how to prevent themBy: SharonShea
  • Malware vs. ransomware: What's the difference?By: AndyPatrizio
  • How to detect and remove malware from an iPhoneBy: MichaelGoad
  • How to detect and remove malware from an Android deviceBy: MichaelGoad

As a cybersecurity expert with extensive knowledge in the field, I've dedicated years to understanding and combating the ever-evolving landscape of malware. My expertise spans various aspects of malware, from its historical origins to the latest evasion techniques employed by cybercriminals. I've not only studied malware in theory but have hands-on experience dealing with real-world malware infections and developing strategies to prevent and mitigate them.

Now, let's delve into the concepts mentioned in the provided article:

Types of Malware

  1. Computer Virus:

    • Definition: Self-replicating malware that spreads by infecting other programs or files.
  2. Worm:

    • Definition: Self-replicating malware that spreads without a host program and often without user interaction.
  3. Trojan Horse:

    • Definition: Malware disguised as legitimate software to gain access to a system.
  4. Spyware:

    • Definition: Malware that collects information and observes user activity without their knowledge.
  5. Ransomware:

    • Definition: Malware that encrypts a user's system data, demanding a ransom for decryption.
  6. Rootkit:

    • Definition: Malware that obtains administrator-level access to a victim's system.
  7. Backdoor Virus or Remote Access Trojan (RAT):

    • Definition: Malware that creates a secret backdoor for remote access without user or security program alert.
  8. Adware:

    • Definition: Malware that tracks a user's browsing history to display targeted advertisem*nts.
  9. Keyloggers (System Monitors):

    • Definition: Malware that tracks and records user keystrokes, including emails, webpages, and programs.

Malware Detection

  • Signs of Malware:

    • Sudden loss of disk space, slow speeds, repeated crashes, increased unwanted internet activity, and pop-up advertisem*nts.
  • Antivirus and Antimalware Software:

    • Examples include Windows Defender and Malwarebytes, which can detect and remove malware through routine scans.

Malware Infection Methods

  • Delivery Methods:

    • USB drives, collaboration tools, drive-by downloads, and phishing attacks (malicious links or attachments in emails).
  • Command-and-Control Server:

    • Enables communication with infected systems, data exfiltration, and remote control.
  • Evasion Techniques:

    • Polymorphic malware, anti-sandbox techniques, and fileless malware to avoid detection.

Preventing Malware Infections

  • Individual Users:

    • Install antimalware software, practice safe behavior (avoid opening attachments from unknown emails), and regularly update security software.
  • Enterprise Settings:

    • Implement dual approval for transactions, second-channel verification, offline malware detection, allowlist security policies, and strong web browser-level security.

Malware on Different Platforms

  • Macs:

    • Can be affected; the popularity of Apple devices has drawn more attention from hackers.
  • Mobile Devices:

    • Android devices are more susceptible; signs of infection include increased data usage and unusual battery drain.

History of Malware

  • Origin:
    • Term "malware" coined in 1990; examples like the Creeper virus in 1971 marked early instances.

Similar Programs to Malware

  • Potentially Unwanted Program (PUP):
    • Definition: Applications that may trick users into installation but don't execute malicious functions, though some may contain spyware-like functionality.

In conclusion, understanding the intricacies of malware, its types, detection methods, and prevention strategies is crucial in today's digital landscape. As an enthusiast in this field, I'm committed to staying abreast of the latest developments and sharing my knowledge to enhance cybersecurity awareness.

What is Malware? Definition, Types, Prevention - TechTarget (2024)

FAQs

What is Malware? Definition, Types, Prevention - TechTarget? ›

Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions; and monitor end users' computer activity.

What is malware definition and types? ›

Malware, short for malicious software, refers to any intrusive software developed by cybercriminals (often called hackers) to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses, spyware, adware, and ransomware.

What is malware and prevention? ›

"Malware" is any kind of software that's designed to harm a computer. Malware can steal sensitive information from your computer, gradually slow down your computer, or even send fake emails from your email account without your knowledge.

What are 3 ways to prevent the threat of malware? ›

The most common preventions include regular patching of computers and applications, using a combination of endpoint protection software, use of strong passwords and multi-factor authentication, and malicious email protections.

What are the different types of antimalware? ›

There are many different types of anti-malware software, each designed to protect against specific types of threats. Some of the most common types include antivirus software, anti-spyware software, anti-ransomware software, and firewall software. Antivirus software is the most well-known type of anti-malware software.

How do I check if I have malware? ›

How To Know if You Have Malware
  1. suddenly slows down, crashes, or displays repeated error messages.
  2. won't shut down or restart.
  3. won't let you remove software.
  4. serves up lots of pop-ups, inappropriate ads, or ads that interfere with page content.
  5. shows ads in places you typically wouldn't see them, like government websites.

How to protect yourself from malware? ›

How to prevent malware
  1. Keep your computer and software updated. ...
  2. Use a non-administrator account whenever possible. ...
  3. Think twice before clicking links or downloading anything. ...
  4. Be careful about opening email attachments or images. ...
  5. Don't trust pop-up windows that ask you to download software. ...
  6. Limit your file-sharing.

Do you need both antivirus and malware protection? ›

While running an antivirus scan plays a key role in keeping a computer safe, malware removers are absolutely needed as well for optimal computer protection and security from various viruses and other types of threats.

What is the main purpose of all malware? ›

Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service or network. Cybercriminals typically use it to extract data that they can leverage over victims for financial gain.

What is the best protection against malware? ›

10 malware protection best practices
  • Protect against malware. ...
  • Educate users on threat sources. ...
  • Partition your network. ...
  • Leverage email security. ...
  • Use security analytics. ...
  • Create a set of instructions for IT staff. ...
  • Practice prevention and remediation. ...
  • Deploy a zero-trust security framework.

How do I remove malware from my computer? ›

How to remove malware such as a virus, spyware, or rogue security software
  1. Install the latest updates from Microsoft Update. ...
  2. Use the free Microsoft Safety Scanner. ...
  3. Use the Windows Malicious Software Removal Tool. ...
  4. Manually remove the rogue security software. ...
  5. Run Microsoft Defender Offline.

Which malware is the hardest to prevent? ›

Fileless malware is a type of malware that uses macros and system tools to invade a system rather than executable files. This type of malware will edit already installed files, which many systems recognize as legitimate. Fileless malware is difficult to protect against because no malicious program has been installed.

How do I know if my router is infected? ›

10 signs of a hacked router
  • Router login failure. ...
  • Slow internet speed. ...
  • Browser redirects. ...
  • Suspicious network activity. ...
  • Session hijacking. ...
  • Ransomware messages. ...
  • Fake antivirus notifications. ...
  • Increase in pop-up advertisem*nts.

What is malware techtarget? ›

Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or server. Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware.

What's the best malware removal tool? ›

The best malware removal of 2024 in full:
  1. Malwarebytes. The most effective free malware removal software. ...
  2. Avast Antivirus. Anti-malware protection and removal with great detection rates. ...
  3. Kaspersky Antivirus. Solid malware removal tool for beginners and experts alike. ...
  4. Trend Micro Antivirus+ Security. ...
  5. F-Secure SAFE.
Jun 26, 2024

How do I completely disable antimalware? ›

In the Windows Security window, in the left pane, click Virus & threat protection, if applicable. In the right pane, under the Virus & threat protection settings section, click Manage settings. In the right pane, click the toggle button placed under the Real-time protection section to Off.

How does malware get on your computer? ›

Malware can be installed in a variety of ways, including through email attachments, drive-by downloads, or by clicking on links in malicious websites. It can also be installed through vulnerabilities in software that the user has installed on their computer.

What should you do if your computer is infected with malware? ›

How to remove malware such as a virus, spyware, or rogue security software
  1. Install the latest updates from Microsoft Update. ...
  2. Use the free Microsoft Safety Scanner. ...
  3. Use the Windows Malicious Software Removal Tool. ...
  4. Manually remove the rogue security software. ...
  5. Run Microsoft Defender Offline.

How does malware spread? ›

How is malware delivered? The most common ways people are exposed to malware risks are through email, web sites, phone calls, and software or app downloads.

What is malware vs virus? ›

The terms malware and virus are often used interchangeably because they have significant overlap. A virus is a specific type of malware, but malware is a general term that also includes many types of malicious software that lack viruses' ability to self-replicate.

Top Articles
Give yourself a bonus with our winning duo
What is a Psychometric Test? 🔰 Your 2024 Beginner's Guide
Tmf Saul's Investing Discussions
My E Chart Elliot
Robinhood Turbotax Discount 2023
Botanist Workbench Rs3
Southeast Iowa Buy Sell Trade
Horoscopes and Astrology by Yasmin Boland - Yahoo Lifestyle
Nc Maxpreps
Puretalkusa.com/Amac
123 Movies Black Adam
Bubbles Hair Salon Woodbridge Va
Large storage units
Elle Daily Horoscope Virgo
Https //Advanceautoparts.4Myrebate.com
Nashville Predators Wiki
Immediate Action Pathfinder
Gfs Rivergate
Trini Sandwich Crossword Clue
Huge Boobs Images
Colts Snap Counts
Costco Gas Foster City
Youravon Comcom
Samantha Lyne Wikipedia
Sam's Club La Habra Gas Prices
Drift Boss 911
Georgetown 10 Day Weather
Sussyclassroom
Japanese Mushrooms: 10 Popular Varieties and Simple Recipes - Japan Travel Guide MATCHA
Holiday Gift Bearer In Egypt
1 Filmy4Wap In
Xpanas Indo
2004 Honda Odyssey Firing Order
Best Restaurants Ventnor
Kleinerer: in Sinntal | markt.de
How Do Netspend Cards Work?
Amici Pizza Los Alamitos
The Best Carry-On Suitcases 2024, Tested and Reviewed by Travel Editors | SmarterTravel
Enjoy4Fun Uno
Cal Poly 2027 College Confidential
Verizon Outage Cuyahoga Falls Ohio
Cpmc Mission Bernal Campus & Orthopedic Institute Photos
How to Print Tables in R with Examples Using table()
Cnp Tx Venmo
Tattoo Shops In Ocean City Nj
Booknet.com Contract Marriage 2
Colin Donnell Lpsg
Mail2World Sign Up
Craigslist Cars For Sale By Owner Memphis Tn
Ff14 Palebloom Kudzu Cloth
Latest Posts
Article information

Author: Frankie Dare

Last Updated:

Views: 6238

Rating: 4.2 / 5 (73 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Frankie Dare

Birthday: 2000-01-27

Address: Suite 313 45115 Caridad Freeway, Port Barabaraville, MS 66713

Phone: +3769542039359

Job: Sales Manager

Hobby: Baton twirling, Stand-up comedy, Leather crafting, Rugby, tabletop games, Jigsaw puzzles, Air sports

Introduction: My name is Frankie Dare, I am a funny, beautiful, proud, fair, pleasant, cheerful, enthusiastic person who loves writing and wants to share my knowledge and understanding with you.