Blog & News


This is a premium post...


If you are not an AIM member - Consider joining. AIM Members receive access to all our premium content online.

If you're an AIM member please login to your AIM account to view this post:


Back to Posts

Mastering Malware Defense

Posted on September 2, 2024

By Webster Bank

Criminal perpetrators of malware attacks are displaying unprecedented relentlessness, intensifying their efforts to pilfer data, tarnish reputations, and wreak havoc across businesses of all scales. Understanding malware and knowing how to thwart attacks is the first line of defense for business leaders.

In 2023, the worldwide number of malware attacks reached 6.06 billion, an increase of 10 percent compared to the preceding year.

What Is Malware?

Malware is an intrusive software cybercriminals use to steal data or destroy computer systems. Oftentimes, the malware can be disseminated via phishing emails or downloads, or by accessing unsafe websites.

Types of Malware

From ransomware, adware, and spyware to viruses, worms, trojans, and cryptojacking, malware comes in myriad forms, with newer, more sophisticated forms emerging all the time. Here are a few common types to keep on your radar:

Adware

This software displays ads to the user by multiple pop-ups. Adware can track information about you or extract personal information. Adware can be bundled with other software or downloaded from non-reputable sources, like unofficial app stores.

Spyware

This runs silently and gives an attacker control over a device. Spyware can be installed when the attacker has physical access to your device and installs a spyware app, or if you get tricked into downloading the app via a fraudulent email or text message.

Trojan

When downloaded, Trojan software performs like the legitimate application but actually does malicious activity in the background. Trojans can be found in pirated or fake antivirus software.

Ransomware

When downloaded, this malware encrypts a company, organization, or individual’s data and holds the electronic key for ransom. Ransomware gained popularity recently and is now a primary objective for attackers globally. It usually attempts to spread itself at high speed through the network, locking every computer and server it can find.

Advanced Persistent Threat (APT) Attack

An APT attack is an attack from an intruder that establishes an undetected presence in a network to steal data over a prolonged period of time. APT attacks are often used simultaneously by fraudsters, who will attempt to maintain access to the system.