Malware, Ransomware, Virus... What’s the Difference? | Blog | ThreatWarrior

Malware, Ransomware, Virus… What’s the Difference?

by | Sep 20, 2018

Like it or not, cyberspace is full of cybercrime. Hackers keep finding novel ways to take advantage of security flaws and breach organizations. Common weapons these cyber actors use include malware and viruses, and a widely-used technique for network infiltration is phishing.

But the breakdown of cybercrime goes much further. Since cyber attacks are an eventuality, wouldn’t you like to get familiar with the types and terminology?

Malware

Malware (any malicious software) is specifically designed to secretly infect and damage your computer. It is introduced in a number of ways including:

  • Through malware attachments in an email or instant message
  • Through sharing infected files
  • Through an infected USB stick
  • From an infected website

Virus

A type of malware, a virus is a contagious piece of code that attacks the software of your computer. It inserts itself into another program then multiplies and spreads on its own once it has been introduced into the system.

Spyware

Spyware does just what its name infers. It is malware that spies on you and monitors your internet activity. It helps the bad guys collect information about you and your computer without your knowledge or consent.

Worm

Malware that copies itself and destroys information and files saved on a computer. Like a virus, worms replicate copies of themselves that leave infections across a network. Unlike viruses, worms do not require a host program to circulate and can travel through a network unaided.

Trojan

A Trojan is a type of attack named after the wooden horse the Greeks used to enter the city of Troy. It is malware the victim believes to be a legitimate program and runs it. However, it is actually designed to steal personal and financial information. It later takes over the computer’s system files. Unlike worms and viruses, they require user interaction to spread and cannot self-replicate.

Ransomware

Ransomware is designed to restrict access to your systems and files until you pay a ransom. Advanced ransomware often encrypts the victim’s files and the hackers demand a ransom for decryption.

Phishing

Phishing is different from malware and the different types of malware. It is a bad guy’s attempt to get your personal login information to gain control of your email, social network account, or online bank account.

Backdoor

An unknown point of access to a system that bypasses authentication techniques. Backdoors provide easier access to a compromised system.

Adware

Generates revenue by producing advertisements presented to the infected device’s user. Adware can be lucrative for the creator but is not dangerous like other malicious software.

Rootkit

Rootkits mask their existence (or mask the existence of other malware) on a network by intercepting and changing API calls that provide system info. The goal is to gain unauthorized access and control over a computer or system.

There are many threats to be aware of in the cyber landscape. Bad actors will attempt to compromise you, which means you need to be prepared. Familiarize yourself with the terminology and educate yourself on what you need protection against. Employ solutions that can advance with the threat landscape and provide visibility into your entire security environment. Get the C-suite on board to sponsor security initiatives and help educate your organization on cybersecurity awareness.

Related Insights

Zero-Day Attacks Explained

Zero-Day Attacks Explained

Zero-day attacks… an almost-menacing, militant-sounding term. Zero-day attacks (or zero-day exploits) are actually cyberattacks that take advantage of previously-unknown vulnerabilities in software. Zero-days are called so because the vulnerabilities are exploited...

Insider Threats

Insider Threats

The Russian cyber attack on the 2016 Presidential Election has brought cybersecurity to the forefront. Regardless of which industry you’re in, that attack made it abundantly clear we’re all at risk of cyber breaches. But don’t kid yourself – it isn’t just foreign...

Phishing Explained: Don’t Get Hooked

Phishing Explained: Don’t Get Hooked

If you have an email account, it’s likely you’ve experienced a phishing attack. Simply put, a phishing attack is when a person with nefarious intent sends you an email that appears to be from a company or person you know. The text of the email often warns that there...