Names of different types of malware. Please read the rest of this article and you will fully understand what I am referring to the same thing and the answer is technically no, They are different, and we’re going to go over what these differences are, whether it’s how they spread or what these things do to your computer. So maybe it’s just out of curiosity, or it can help you protect your computer going forward. The first term we can go over is pretty simple, which is malware and this refers to any kind of malicious software. It’s an all-encompassing term.
Any type of software that does harm to a computer and all the terms we’re going to be talking about in this video could be considered malware. It’s like an umbrella term, but there are lots of suburbs. So we’re going to go over the different categories and types of malware. There are too many when it comes down to it all malware usually has the same goal, which is to make money illegally for the creator of the malware. The first term we can talk about is a computer virus, which is usually the term that most people use all the time, but it’s not actually
Was a common type of malware. We’ll get to that in a bit. But regardless, a computer virus is the name for malicious software that when executed, replicates itself by modifying files for other programs, and possibly including the operating system itself, so that way because these files are modified to now include the virus. Whenever that program or the operating system has started, then it will also run the virus code, and this could be for any number of reasons, feeling personal information.
Taking control of the computer and using its computer power or storage for something that the author of the virus wanted lots of typical virus stuff you can imagine, But the main differentiator for a virus is that it remains dormant until it’s run by the user. And then when it is it replicates itself in some way, And this file may come in the form of an s e file, which is executed directly. Or perhaps it’s embedded in a macro in a Microsoft word document or something like that. So when you run the program
Soft word. It exploits that and executes and that embeds itself in the rest of the computer that way. So again, downloading the file is not enough to infect your computer. But once you do run it, presumably thinking it’s something else.
Then it does its virus thing, and it may spread itself by sending out an email to all your contacts the same way it was infecting you that way. Perhaps, Or maybe it puts itself in the upload folder for bit Torrent. So then it also uploaded itself to the file sharing service so other people will download it. Something like that. So really, the term virus has two qualities that describe how it spread, which is itself replicates, and it’s also run manually by a user now the neck
The term might seem a bit similar, and that is computer work. So this also self replicates, But it also has a very important difference in that. Unlike a virus, which needs to be manually run by the user, a computer worm can spread itself automatically without user intervention. So this means it doesn’t need a host program to run like MS-word or the file that you need to run.
It can do this automatically. It scans for other computers on the network that it can infect, and then it does so automatically if it’s able to, of course, a worm will probably also have the ability to be run manually by a user and infect computers. That way that might be how it initially get started within a network and then spreads automatically from there from that first-person doing it, and worms spread using vulnerabilities and exploits of operating systems themselves to infect all the computers.
Network. So once one compares infected it scans as I said, all the other computers and networks of any other computers have that same vulnerability and then infects them automatically without any user transferring files or anything like that. It all happens automatically in the background from the virus itself. And if you’re wondering, wait a minute. How can the worm spread to other computers? If the user isn’t even running it? Well, it shouldn’t be able to and that’s why it is an exploit of the vulnerability. The operating system is not designed to work.
Like that. But for whatever reason, the worm can trick the operating system and not only downloading that file and downloading the worm but also running it with zero user intervention because of that exploit now again, the term worm only describes the software based on how it spreads and replicates. It doesn’t say or define what it does once it does, things, in fact, apparently most computer worms
Don’t contain a so-called payload, which is like side code that will do virus stuff that you typically think of like spying on it or damaging in the computer, so it might just spread just for the heck of spreading. But that doesn’t mean that it won’t harm the network it still uses CPU power and bandwidth and stuff like that. But if it does happen to have a payload, it could do any number of things that you typically associated with malware.
Such as encrypting files for ransom, wear, spying and stealing credit card information, or even installing a so-called backdoor, which might allow the computer to be controlled by the creator of the worm and then added into a part in it to do all sorts of malicious things as a group with other computers and worms are just one more example of why you need to keep your operating system up to date because that’s just one example of software. They can take advantage of exploits in your operating system. Usually, older versions after they have been
Covered and people don’t update. And it’s a hacker’s dream to be able to take advantage of these things. And really, it’s so easy to avoid. Just keep your software up to date, so both viruses and worms spread themselves and replicate themselves in one way or another, whether it’s manually by the user automatically through a worm. But there are plenty of other types of malware that don’t replicate themselves but are just as destructive. So the next type we can mention is our Trojans or a Trojan horse is which is a type of malware that misrepresents itself as a
The normal or benign program, but really in the background will be doing malicious things so basically tricks the user into installing it because it thinks it’s something else and thinks that’s something legitimate and typically, Trojans are the most common type of malware out there, and they may look like a program May they may run. They may do their intended purpose, like if it’s a calculator, app, or something. It might be able to calculate things and look like a calculator. But its main purpose is to get you down.
Loaded, thinking it’s just a calculator. And then it does all this other stuff behind the scenes without you knowing. Another really common examples are fake antivirus programs that tell you Oh, look how many computer viruses and infections we found you better by our premium package to remove all these when, in reality, that antivirus program itself is the virus. It’s fake, and the Trojans can be spread in any number of ways that you can imagine, such as spam email attachments that come out of the blue.
They might be fake advertisements or through social media stuff like that. But again, the main differentiator between the Trojans and say a virus is that a true GYN doesn’t inject itself into other files of other programs. It doesn’t replicate itself and send it to other people or anything like that. If it did, it would be considered a virus. So those three categories viruses, worms, and Trojan typically described the way that the malware spreads, but they don’t talk about how much or necessarily what damage they do.
Once they do, in fact, and there are categories for that that we can talk about. Next. The first of these is spyware, which just as the name suggests is software malware that spies on you where collect information from the computer and then sends it somewhere else. Now technically spy, where could include programs that aren’t even illegal like you do give them permission to spy on you and collect information but usually the vast majority of the time when someone says Spy where
Referring to malware that did not get your permission to collect any information and it is malicious and spy where it could come in lots of different flavors. It could be a key logger, which collects every single letter that you type in, hoping to collect passwords or credit card numbers or bank accounts and stuff like that. It may also monitor what you’re doing online and what monitoring your Web traffic.
To be able to inject things into it, such as advertisements or maybe replacing links with affiliate links or advertisements to websites that it wasn’t necessarily going to direct to, and usually, malware that adds advertisements to your computer and one way or another is typically referred to as adware. So it may be that some of the malware that we talk about in this video may fall under multiple categories. Another couple big categories are scare wear and ransomware may be considered a
Category of a scare where we’ll get to that. But scare wear is typically some sort of malware that tricks the user into paying money or doing something by scaring them or threatening that so one example might be a virus or intrusion or whatever that pops up on the screen. A big thing that says you’re being arrested by the FBI. Unless you pay up this money as a fine or something like that. It scares you like, Oh, my God, I don’t want to get arrested, and then some people might pay or a lot like those IRS scams that you get on.
The phone. It might be something similar on the computer that says If you don’t send this much Bitcoin to this address, then the IRS is going to arrest you and you’re going to go to jail. But it doesn’t necessarily have to threaten you. It could be again just to scare you. A lot of advertisements, for example, are kind of sketchy. You’ve probably seen them. It says your computer is infected with so many viruses. Click here.
To clean your computer and all that sort of thing. It doesn’t know if your computer is infected or not just trying to scare you into doing it. That would be scary Work. Now. Ransomware is a form of a scare where that will typically hold your computer hostage in one way or another. Until you usually pay some sort of amount of money. Sometimes ransomware may just be kind of bluffing and it
Only locks your computer in a way that’s pretty easy to reverse. If you know what you’re doing, and it doesn’t actually affect any of your files, But other times, ransomware, does have teeth and it actually will encrypt your files, for example, and it says, if you don’t pay us this amount of money within this amount of time, we’re going to destroy the decryption key and your files will be gone.
And the reason they do this is because if people know that their software out there that this one isn’t bluffing, then they’re a lot more likely to pay up to get their files back at them Bagged up, for example, all right now the final type of malware we’re going to talk about this video, at least, is route kits and route kits usually take over the computer by gaining elevated privileges or administrative privileges, privileges. And the name root kid comes from the term route privileges, which just means something that has control over the deepest, most secure.
Parts of the operating system. And because this type of malware does have such deep control over the computer can hide very well. It has control over everything. It can even hide by not even including itself in the list of processes like in the task manager or something like that complete control, And this means it’s going to be very, very hard to remove, if not impossible, because it will even have control over the programs that are meant to remove it, such as anti-virus programs. It could prevent you
From installing antivirus programs. You can stop there is any fire is programs from running stuff like that. So a lot of times, especially if the rootkit is embedded in the kernel, which is the core of the operating system. Usually, if you get a rootkit, the best thing is to just completely wiped the drive and reinstall the operating system from scratch, because you don’t know if you removed everything. And if it’s still hiding and waiting to reinstall itself later, and word kits usually can install themselves using operating system vulnerable.
Reason exploits like we kind of talked about before or stealing admin credentials or using credentials that found to then take over Now, at this point, you might be worried. You’re like, Oh, how do I protect myself? And there are three things you can do that will almost certainly protect you 99% of the time. And the first of these is to, of course, keep your operating system and software up to date. I said this so many times.
Do not skip Windows, updates, updates as soon as you get the ability to, and that way, if you get like a zero-day vulnerability, which is something that was just discovered and released immediately to the public, and hackers will be jumping on that to try and get people who don’t update right away. So keep stuff up to date. Then you’ll be protected from any exploits. The next important thing. I said this before again is to back up your data have backup copies of your data.
Hopefully on an external hard drive that is not connected to the computer. So ransomware can’t encrypt the backup as well. Or using something like cloud backup that is off-site this way. If you do get malware that harms your files or does something else to your computer that requires a reinstallation of your OS. It will be way easier to recover them, especially in the case of ransomware. And finally, the third major thing is to use some sort of antivirus. I mean, it’s better than nothing to have the one that’s built into your
Computers such as Windows Defender or whatever it’s called now again, better than nothing if you know what you’re doing, But ideally, you use a type of antivirus that has something called Internet security, which usually kind of scans for things coming across the network and usually can block things before they ever even get to your computer. And a lot of these antiviruses is also had anti-ransomware features that will stop the program from running. If it seems that it’s modifying files like ransomware might do if you’re looking for suggestions for some options for any viruses.
One Good option is bit defender full disclosure. They did sponsor a previous video of mine, but they’re not sponsoring this one. There’s no sponsor for this video. Another good option is set. Non 32. I’ve used them in the past haven’t had any problems. But really, you can just go on Google and search best antivirus current year at the end of it and look at tests and see what one is the best trip the current year, so hopefully, that clears things up. If you didn’t know about the differences between names of other types of malware now you do.
You and you might have a better understanding of how certain types of malware spread so you can better defend your computer against it. You’ll kind of know what you’re up against. If you guys want you can keep watching by clicking some other videos.
Cybersecurity Consulting Ops is doing business in Philadelphia, Philly, South Jersey, Southern New Jersey, North Jersey, Trenton NJ, Cherry Hill, Atlantic City, Winslow Township, Mt Laurel, Mount Laurel, Newark NJ, Newark DE, New York City, and other towns and city on the east coast of America.
Antigua and Barbuda,ATG,AG,Bahamas,the Commonwealth of the Bahamas,BHS,BS,Barbados,Barbados,BRB,BB,Botswana,the Republic of Botswana,BWA,BW,Costa Rica,the Republic of Costa Rica,CRI,CR,Dominica,the Commonwealth of Dominica,DMA,DM,Dominican Republic,the Dominican Republic,DOM,DO,Ethiopia,the Federal Democratic Republic of Ethiopia,ETH,ET,Gambia,the Republic of the Gambia,GMB,GM,Ghana,the Republic of Ghana,GHA,GH,Grenada,GRD,GD,Guyana,the Co-operative Republic of Guyana,GUY,GY,Jamaica,JAM,JM,Kenya,the Republic of Kenya,KEN,KE,Malawi,the Republic of Malawi,MWI,MW,Mauritania,the Islamic Republic of Mauritania,MRT,MR,Mauritius,the Republic of Mauritius,MUS,MU,Mozambique,the Republic of Mozambique,MOZ,MZ,Namibia,the Republic of Namibia,NAM,NA,Niger,the Republic of the Niger,NER,NE,Nigeria,the Federal Republic of Nigeria,NGA,NG,Panama,the Republic of Panama,PAN,PA,Rwanda,the Republic of Rwanda,RWA,RW,Saint Kitts and Nevis,KNA,KN,Saint Lucia,LCA,LC,Saint Vincent and the Grenadines,VCT,VC,Senegal,the Republic of Senegal,SEN,SN,Seychelles,the Republic of Seychelles,SYC,SC,Sierra Leone,the Republic of Sierra Leone,SLE,SL,South Africa,the Republic of South Africa,ZAF,ZA,South Sudan,the Republic of South Sudan,SSD,SS,Sudan,the Republic of the Sudan,SDN,SD,Suriname,the Republic of Suriname,SUR,SR,Togo,the Togolese Republic,TGO,TG,Trinidad and Tobago,the Republic of Trinidad and Tobago,TTO,TT,Uganda,the Republic of Uganda,UGA,UG,United Republic of Tanzania,TZA,TZ,United States of America,USA,US,Zambia,ZMB,Zimbabwe,Zimbabwe,ZWE,NJ,NYC,NY,Pa,DE,US,USA,JM,BBD,BHS,DOM,PAN,LCA,VCT,KNA