As your organisation grows it begins to amass more and more data with everything from financial reports, presentations, files, and most importantly, sensitive client and business information. All of this information which represents hundreds of thousands of man-hours could disappear in the event of a disaster. The wrong opened email may invite invasive malware to cause chaos on your business network. The most common reason behind massive data loss remains to be viruses, ransomware and malware; all of which can infiltrate your network.
What is Malware and what does it do?
Malware is short for malicious software. It’s a code, script or software that is specifically designed to damage, encrypt, steal, or perform illegitimate action on devices, data, hosts, or entire networks.
There are many different types of Malware that have varying ways of infecting systems and propagating themselves. You may of heard of WannaCry, Locky, Rapid or Petya recently.
Malware is commonly delivered via an email attachment such as a ZIP file or attached as macros to certain email files or can be downloaded with files from the internet. It cannot damage the physical hardware or network equipment, but it can damage the data and software that resides on them.
The two main types of Malware
Two of the most common types of malware are known as Viruses and Worms. These types of programs are able to self-replicate and can spread copies of themselves. To be classified as a virus or worm, the Malware must have the ability to grow on its own. The main difference between these two is that a worm operates more or less independently of other files, whereas a virus depends on a host program to spread itself. We explore each in more detail below.
A computer virus is a type of Malware that propagates by inserting a copy if itself within another program. As with human viruses, a computer virus can easily spread from one computer to another. Viruses can range in severity from causing annoying functionality bugs to damaging data or software and causing denial-of-service (DoS) conditions throughout the network.
Unlike computer viruses, worms are standalone software and do not require a host program or human help to propagate. A worm enters a computer through a vulnerability in the system setup and takes advantage of file-transport or information-transport features on the system, allowing it to travel around unaided. Like viruses, worms are able to self replicate and can therefore cause the same type of damage.
Is Ransomware a type of Malware?
Yes, Ransomware is a type of Malware that cleverly blocks access to your computer files and quickly spread to other devices on the network. Cyber Criminals encrypt devices and ask victims to pay a substantial ransom to retrieve data. However, there is no guarantee that once the ransom is paid the data will be decrypted.
There are three types of Malware and Ransomware in circulation:
1: Encrypting Ransomware
It’s designed to block system files and demand payment to provide the victim with the key that can decrypt the blocked content. Examples include Zepto, RAA, Crypto and more which are discussed below.
2: Locker Ransomware
Locks the victim out of the operating system, making it impossible to access the desktop and any apps or files. The files are not encrypted in this case, but the cyber criminals still ask for a ransom to unlock the infected computer. Examples include Winlocker.
3: Master Boot Record ransomware (MBR)
Overwrites the master boot record (MBR) of the affected PCs, leaving their operating systems in an unbootable state. Examples include Satana and Petya Ransomware.