Malware
Malware, short for malicious software, is any software intentionally
designed to cause damage, disrupt operations, or gain unauthorised
access to computer systems, networks, or devices.
Alt text: Malware
Key Characteristics of Malware
1. Intentional Harm:
● Malware is created with the intention of causing harm to systems or
stealing information.
Example: A program that encrypts files on a user's computer and
demands a ransom for decryption (ransomware).
2. Variety of Forms:
● Malware comes in different forms, each with unique behaviours and
purposes.
Example: Viruses, worms, trojans, ransomware, spyware, adware,
and rootkits.
1 | Page
3. Stealth and Deception:
● Many types of malware are designed to evade detection by
disguising themselves as legitimate software or operating in the
background.
Example: A trojan horse appears to be a harmless application but
contains hidden malicious code.
Common Types of Malware
a. Virus
b. Worms
c. Trojans
d. Ransomware
e. Spyware
f. Adware
g. Rootkits
a. Viruses:
Malware that attaches itself to a legitimate program and spreads to
other programs or files when executed.
****
Alt text: Computer virus
Example: A virus that infects a word processing document and
spreads to other documents when opened.
2 | Page
b. Worms:
Self-replicating malware that spreads
without user interaction by exploiting
vulnerabilities in networked devices.
Example: A worm that propagates
through network shares, infecting
multiple computers.
Alt text: Multiple computers
infected by replicating worms.
c. Trojans:
Malware disguised as legitimate software
tricks users into installing it, thereby allowing
unauthorised access to their systems.
Example: A fake antivirus program that
Alt text: Trojan horse installs a backdoor into the user's system.
d. Ransomware:
Malware that encrypts a victim’s files
and demands a ransom payment for
the decryption key.
Example: The WannaCry ransomware
attack that spread globally and
affected numerous organizations.
Alt text: Ransomware
e. Spyware:
Malware that secretly gathers
information about a user’s activities
without their consent.
Example: Keyloggers that capture
and transmit keystrokes to attackers.
Alt text: Spyware
3 | Page
f. Adware:
Malware that automatically displays or downloads advertising
material when a user is online.
Alt text: Adware
Example: Pop-up ads that appear on a user's screen while browsing
the internet.
g. Rootkits:
Malware designed to gain
administrative-level control
over a system without
detection.
Example: A rootkit that hides
itself within the operating
system’s core files, making it
difficult to detect and remove. Alt text: Root kit
Practical Importance of Malware
1. Detection and Prevention:
Understanding how different types of malware operate helps in
deploying appropriate detection and prevention mechanisms.
Example: Using antivirus software to scan and detect malicious files.
4 | Page
2. Incident Response:
Knowing the signs and symptoms of malware infections allows for
quick and effective incident response.
Example: Recognising unusual system behaviour, such as slow
performance or unexpected pop-ups, as potential indicators of
malware.
3. System Hardening:
Implementing security measures to protect systems against malware
attacks.
Example: Regularly updating software, using firewalls, and employing
intrusion detection systems (IDS).
4. User Education:
Educating users on safe computing practices to prevent malware
infections.
Example: Training users to recognise phishing emails that may
contain malicious attachments or links.
5 | Page