Malware and Viruses: What You Need to Know to Protect Your Data

Blog

By Karl Bickmore, CEO Snap Tech IT


The terms “Malware” and “Virus” are used interchangeably in the computer world. While most people understand that both will create havoc on your system, they don’t necessarily know the differences between them. One of the best ways to protect your business data from both predators is to learn what they are, how they operate, examples of each & how to prevent them from infiltrating your IT environment.

Let’s dig deeper into the differences between a Virus and Malware.

What is Malware?

Malware is a catch-all term for any type of malicious software, regardless of how it works, its intent, or how it is distributed. Types of malware include computer viruses, worms, ransomware, spyware, and others. Therefore, a computer virus is a type of malware.

Many people generalize the conversation around malware and viruses by choosing the term “computer virus” because it has been around the longest. The very first record of a computer virus attack dates back to 1982 and infected Apple IIe computer systems. However, because it is a more comprehensive term, “malware” should be used when discussing the variety of vulnerabilities out there.

 

What is a Computer Virus? Computer VIrus

A computer virus is a piece of code that inserts itself into existing legitimate files and replicates itself through them. The term was coined because it is analogous to a biological virus that infects a host and is spread through forms of contact. There are three common types of computer viruses:

  1. File infection virus: One that infects programs or files and attempts to spread via that program across as many computers as possible.
  2. Macro virus: This type of virus infects programs that have automation compatibilities. It often infects powerful Microsoft Office applications such as Word, Excel, Outlook, and PowerPoint.
  3. Polymorphic virus: This newer type of virus works by modifying its own code to avoid detection, while it is infecting files or macros. Traditional antivirus programs using detection that is virus-definition-based can be fooled by this type of virus. Only the newer, advanced endpoint protection software tools are effective at finding them.

 

Other Types of Malware

As previously mentioned, computer viruses are only one type of malware. There are a few others that are more obscure, such as worms, ransomware, scareware, adware/spyware.

Let’s take a closer look at these.

Malware Types

Worms

Worms are similar to viruses, except that instead of infecting legitimate files, they use their own unique files that can self-replicate and spread through your network. They are therefore harder to detect, because most virus defenses look for common files that have been altered. Worms rely on vulnerabilities that your IT team hasn’t patched, or that your software vendor hasn’t found and written a patch for yet.

The difference between viruses and worms, while both cause damage and copy themselves rapidly, it’s how they self-replicate that makes them different. Viruses require the help of a host and worms act independently.

 

Ransomware

This is the new big bad boy on the scene. This type of malware compromises your system, encrypts your data — and often times your data backup — and then demands you pay them a hefty sum to get access to your files. Most of us now know someone who has experienced ransomware attacks. Typically, these exploit you to gain access to your system via phish emails, fake websites, and fake web search results. Sadly, many people or organizations are not prepared properly for this type of attack and they are left to pay the ransom in order to restore their data.

 

Scareware

This is the poor stepbrother to ransomware. It uses similar methods to gain access to your system and then preys on your gullibility to scare you into buying something you don’t really need or threatens to release your personal details publicly. A common version of this is an email phish claiming to have control of your system and your use of pornography on that system. It demands a payoff to prevent sharing it with your loved ones. Another version of scareware sells fake antivirus software. Scareware usually can be ignored as far as the threat itself is concerned, but your system will still need to be cleaned of the malware.

 

Adware/Spyware

This type of malware isn’t as damaging as the other types but still has negative consequences, such as an invasion of privacy. Adware and spyware often masquerade as legitimate programs or browser add-ins. It claims to provide you with some function, and sometimes that function is actually provided, but its actual purpose is to exploit you for marketing purposes. For example, it changes what advertisements appear in your browser when surfing the Internet and subjects you to annoying pop-ups. It will also collect your personal information and sell it to third-parties for nefarious purposes.

 

Memory-only Malware

This is a fast-growing category of malware because it is among the hardest to detect. It doesn’t even place a file on your computer. It operates out of the transient memory of the computer. Only the best endpoint protection software can detect it, as many begin on the assumption that a file needs to be scanned. These types of attacks enter your system through emails or websites and will take action behind the scenes to run scripts or commands using native operating tools that are perfectly normal. Memory-only malware will introduce other types of malware including scareware and ransomware. It can be particularly difficult to fix because you keep fighting the symptoms by cleaning the new malware it introduces. You fix one and another shows up.

While there are additional types of malware beyond those discussed here, this list covers the majority of them. Hopefully, you have a better understanding of the criminal element we are facing and from which we need protection. Using the right kind of endpoint and server protection that blocks most or all types of malware is critical. Many of those available on the market have not kept up with the times and are powerless against entire strains of malware. It is amazing they are still in business.

Be proactive instead of reactive: Identify your exposure to cybersecurity threats with a no-cost Dark Web Scan.