Athena Systems Malware Guide

Malware, which is short for malicious software, is a term that encompasses a wide variety of software that have been intentionally designed by cyber criminals to damage and disrupt computer systems and their users. In a world of ever-evolving technology, it is especially important to understand the common types of malware that target average everyday users, such as yourself, in order to protect yourself, your data, and your electronic devices. Common reasons behind infecting users with malware include exploitation/manipulation of unknowledgeable users, and the theft of data/information. Once you combine your knowledge of common types of malware, and after reading Learning Module: Phishing, you will begin to understand that phishing can be viewed as a “transport vehicle” that has the ability to deliver malware to unsuspecting users.


What are common types of malware?

● Trojan: A trojan is a type of malware that relies on actions that humans take, in order for it to spread. A trojan disguises itself as a legitimate program or is inserted within the code of a legitimate program in order to infect a user once they install the trojan on their computer.

● Worm: A worm is a type of malware that self-replicates in order to multiply the number of devices that it has infected. A worm works by first infecting a target computer, and from there, it can infect other computers on a network. A worm targets vulnerable computers on a network that belong to individuals, businesses, and organizations.

● Ransomware: Ransomware, a type of malware that has a very self-explanatory name, is perhaps one of the more commonly mentioned malware types today. Ransomware attacks enable cybercriminals to lock users out of their systems, encrypt their files (Causing file data to become unreadable), and extort them for illegal financial gain with the promise of decrypting their files and returning their systems to them.


Tips to Prevent Malware

● If you are looking for a specific software to download, make sure you are acquiring this software from the original author or company.

● Do not click on or download files and attachments that are included in strange/suspicious emails that you receive. As previously mentioned, be extra careful of phishing scams.

● Regularly update your devices and systems. Nowadays, it is very easy to ensure that you have the latest updates and security patches because you will most likely be receiving system notifications on your devices and programs that urge you to update.

● Use the security software included with your computer system (For example, if you have a Microsoft Windows computer, the included Windows Defender or Windows Security interface is sufficient to protect your device from malware).

● Act with a security mindset when using the internet. This can be in the form of making smart decisions and using logic when browsing your favorite trusted websites, and always thinking before you act (Or click, in this case).

● If you ever find yourself in a difficult situation, consider getting support from a tech-savvy relative/friend/neighbor, or a reputable local/online technology support service. (Make sure you extensively read reviews and previous experiences before you initiate contact with a support service to prevent scam attempts).


Sources:
https://www.inc.com/joseph-steinberg/malware-101-an-overview-of-malware-types.html
https://secuvant.com/common-types-of-malware-and-attacks-that-occurred-in-2018/
https://www.uscybersecurity.net/malware/



Malware Quiz

Malware Quiz

Question 1.

Once you decide that you need to download a program, where is the best place to download it from?

Suspicious websites that do not appear to be updated.
An old link that was found online in a forum.
The authorized website of the original company or author.

Question 2.

Whenever you get notifications on your device regarding the latest updates and security patches being available, you should delay installing the updates since they will unlikely be affecting you in any way.
True
False

Question 3.

It is possible to protect yourself, your data, and your devices before it is too late and you are attacked with malware.
False
True

Question 4.

What is a Worm?
An animal that lives in Dirt.
A dance move.
Malware that can self replicate.


Score out of 4 = Score in percentage =