Malware

Malware is short for “malicious software” that aims to steal or destroy data inside any computer, device, or system (e.g., phones, tablets, laptops, etc.). Malware can enter a device through downloaded files, infected apps, malicious ads, hacked websites, opened email attachments, or any other time you download something to your system.

Malware simplified

For example, an unknown source can attach a malware-infected PDF file to an email and send it to you. If you open the file, the malware will activate and infect your computer or phone. If left neglected, it can cause damage to your device or even steal your data. 

Probability

Chances of becoming a victim of malware, scareware or virus attack are very low (1 in 779).

Most common types of malware

Ransomware

Ransomware is malicious software that uses encryption to disable a target’s access to their data until a ransom is paid. Ransomware is commonly used to target large organizations because they have a lot of valuable data and can afford to pay more. Victims of ransomware often can’t operate at all under the effects of ransomware. And even if they agree to pay, there’s no guarantee their data will be decrypted or won’t get deleted.

Virus

A virus is a piece of malicious code that is inserted inside of an application. Once downloaded and run, a virus can spread and reproduce into the network. From here, it can steal personal information or launch DDoS or ransomware attacks.

Trojan

A Trojan is a malware that disguises itself as useful code or software. It can come in the form of an app, game, patch, or any tool. Once downloaded and installed, a Trojan can take over the device’s system and perform unwanted actions like exporting, modifying, or deleting data. The difference between a Trojan and a virus is that a virus needs the infected app to be running in order to spread and reproduce.

Spyware

Spyware’s pure intent is to collect information from an infected device. Such data includes credentials, payment information, or any other type of personal information that can later help hackers cash out. Spyware can also download and install other malicious software to its victim’s device.

Keyloggers

A keylogger is a very common type of spyware that tracks and records its victim’s keystrokes. The software itself is not purely malicious and has its uses in business and personal cases. But hackers often use keyloggers to fish for people’s logins and passwords for malicious purposes.

Adware

Adware is a type of malware that tracks its victim’s online activity to gather information about their browsing habits. This data is put into profiles and later sold to ad agencies and data brokers without the user’s consent. In a way, adware is similar to spyware, but it doesn’t track keystrokes and it can’t download and install software into its victim’s device.

Rootkits

A rootkit is a type of malware that gives hackers remote control to their victim’s device, usually with full administrative privileges. Rootkits are very difficult to detect and can open backdoors to trojans, spyware, or ransomware.

Worms

Worms are a type of malware that targets system vulnerabilities. They can gain access and install themselves onto the victim’s device. From there, they allow hackers to steal data or launch DDoS or ransomware attacks.

Tips to prevent malware

Be wary of emails

Be wary of emails

Don’t open suspicious emails, attachments, or URLs as they can carry viruses. If you’re thinking of opening any links or files, check them on websites like VirusTotal first.

Do your research

Do your research

Always double-check the validity of a website and the company you’re buying from using services like Scamvoid and TotalVirus. Refrain from visiting shady, outdated websites.

Check your downloads

Check your downloads

Don’t download files from unknown or unsecured HTTP pages. Only use HTTPS and check your download sources with online tools like VirusTotal.

Use an antivirus

Use an antivirus

Use an antivirus program with real-time protection, perform regular scans, and check all files you download for possible malware infections.

Use ad blockers

Use ad blockers

Tools like CleanWeb and other ad blockers can prevent known malicious ads from loading on your devices.

Use a VPN

Use a VPN

Some VPNs offer additional protection by blocking requests to known malicious sites that can contain all sorts of malware.

Keep updated

Keep updated

Keep your systems, apps, and browsers up to date. Malware loves vulnerabilities in systems and apps, especially worms, rootkits, and trojans.

Malware crime stats

According to the FBI Internet Crime Reports, here's how devastating malware, scareware or virus attacks were from 2015 to 2022:

$
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
,
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
,
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
Lost to cybercriminals
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
,
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
9
8
7
6
5
4
3
2
1
0
0
People were victims to malware

Average losses and victim count
year over year

Average losses and victim count chart

Malware, scareware or virus attack cases have reached record numbers with 4.3K yearly victims (around 12 victims per day) in 2016.

Victims have reported the highest average financial loss to malware, scareware or virus attacks in 2022 ($12.2K per victim).

During the 2020 COVID-19 pandemic, the number of malware cases decreased by 40%, but the average financial loss grew by 473% (from $847 to $4.9K) per victim compared to 2019.

Despite the increasing awareness of online crimes, daily financial losses to malware, scareware or virus attacks have grown around two times from 2015 ($11.4K per day) to 2022 ($25.6K per day).

DownloadCreative Commons Attribution-Share Alike 3.0 International License
This image is licensed under the Creative Commons Attribution-Share Alike 3.0 International License - https://creativecommons.org/licenses/by-nc-sa/3.0/