Published on

The Main Types of Malware You Should Know

Authors
  • avatar
    Name
    Rosa Tiara
    Twitter

Introduction

Malware is short for malicious software. It is any program or code designed to harm your computer, steal your information, or cause problems. There are different types of malware, let's explore them!


What is Malware?

Malware is bad software that gets onto your device without your permission which can damage your files, steal your passwords, slow down your computer, or even lock you out of your own device.


Types of Malware

1. Virus

A virus is malware that attaches itself to a file or program. When you open that file, the virus activates and spreads to other files on your computer.

How it Works

It needs you to do something first, like opening an email attachment or downloading a file -> Once active, it copies itself to other files -> It will start damaging or deleting your files

Example: You download a document that looks normal. When you open it, the virus inside starts copying itself to other documents on your computer.


2. Trojan Horse

A trojan horse is malware that pretends to be something useful or safe. It tricks you into installing it on your computer.

Fun fact alert! 🚨

The name "Trojan Horse" comes from Greek mythology. In the Trojan War, the Greeks built a large wooden horse and left it outside Troy as a gift. The Trojans brought it inside, not knowing Greek soldiers were hidden inside. At night, the soldiers opened the gates and let the Greek army in, leading to Troy's defeat.

How it works:

  • It looks like a normal program, game, or tool
  • You think you are installing something helpful
  • Once installed, it does something bad without you knowing

Example: You download what looks like a free photo editor. After installing it, the trojan horse secretly steals your passwords while you use the program.


3. Worms

Worms are malware that spread automatically from computer to computer without needing you to do anything.

How it works

They find weaknesses in your network or software -> they copy themselves to other computers -> spread

Example: A worm finds a security hole in your email program. It sends copies of itself to everyone in your contact list, and then to everyone in their contact lists.


4. Spyware

Spyware is malware that watches what you do on your computer and collects information about you.

How it works

It runs in the background without you noticing -> tracks your keystrokes, websites you visit, and files you open, etc -> it will send this information to attackers.

Example: Spyware records everything you type, including passwords and credit card numbers. It sends this data to criminals who use it to steal your money.


5. Adware

Adware is malware that shows you unwanted advertisements. It can also track your browsing habits to show you targeted ads.

How it works: Displays pop-up ads on your screen -> slows down your computer -> collects info about websites you visit

Example: You install a free program. Suddenly, your screen fills with pop-up ads for products you do not want. The adware is making money for the attacker by showing you these ads.


6. Ransomware

Ransomware is malware that locks your files or your entire computer and demands money (ransom) to unlock them.

How it works

encrypts your files so you cannot access them -> shows a message asking for payment, usually in crypto -> even if you pay, there is no guarantee you'll get your files back

Example: You open a suspicious email attachment. Your computer screen shows a message saying all your files are locked. The message demands $500 in Bitcoin to unlock them.


7. Scareware

Scareware is malware that tricks you into thinking your computer has a serious problem. It then offers a fake solution that you must pay for.

How it works

shows fake warning messages -> claims your computer is infected or broken -> asks you to buy fake antivirus software to fix it

Example: A pop-up appears saying your computer has 50 viruses. It tells you to click a button to buy antivirus software for $99. The warning is fake, and the software is useless lol.


8. Backdoor

A backdoor is malware that gives attackers secret access to your computer. They can control it remotely without you knowing.

How it works

It creates a hidden way into your computer -> attackers then can access your files, install more malware, or even use your computer for attackers.

The scary thing is, it stays hidden so you don't notice it.

Example: A backdoor gets installed on your computer. An attacker can now log in remotely, read your emails, and use your computer to attack other computers on the internet.


9. Rootkit

A rootkit is malware that hides deep in your computer's operating system, which is very hard to detect and remove.

How it works

It buries itself in system files -> hides other malware from antivirus software -> gives attackers full control of your computer.

Example: A rootkit installs itself in your operating system. It hides spyware and a backdoor so well that your antivirus cannot find them. The attacker has complete control, and you do not know it.


Final Thought

Malware comes in many forms, but they all share one goal: to harm your computer or steal your information. With this blog, I hope you can protect yourself and your devices better.

Remember: if something seems too good to be true, it most likely is 😂

Stay safe and happy learning!