Knowing Malware – Part 3

As noted in Knowing Malware – Part 1 and Knowing Malware Part 2, there are many methods hackers will use to steal your information or infect your computer. Lets take a look at a few more, lesser known forms of malware.

Malvertising
Malvertising is a form of malware that has to do with advertising. Essentially, the cybercriminal will buy legitimate ad space on a popular website, such as famous news sources and stock exchange websites. While the space for the ad was legally purchased, the links can contain malware or redirect the user to an unsafe website which can contain viruses or attempt to steal their personal information.

Spoofing
Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source1. This can apply to phone calls, emails, and websites. Spoofing is fairly common in emails – the user will recieve an email from the cybercriminal posing as a person or business asking for a response or to open a malicious file. More committed hackers will replicate a website and hope the user doesn’t recognize the difference, and can potentially insert login credentials that can be stolen.

The Solution to Malware
Removing malware can range from being fairly simple to impossible without a clean wipe. Some simple programs can be removed and stop the attack. Others may be impossible to find, or have spread to so many components that the infection has spread to far to repair. Taking your computer in to a professional to clean does not always work, and can be an expensive services, therefore, preventation is always the best solution. Users should utilize anti-malware software on their computers, and frequently run scans with it. Always run security updates, as hackers are finding new ways to infect others each day and programs need to consistently update to keep up. Even this is not enough, though. Awareness is key – users should always be careful on what they click on, where they input sensitive information, and should take care to recognize illigetimate emails and programs.

 

1https://www.forcepoint.com/cyber-edu/spoofing