You are on page 1of 4

What is a Malware Attack?

A malware attack is a cyber-attack that is carried out by a malicious


program or code, or malware. Malware can be used to steal
information, modify and delete data, monitor computer activity and
cause damage to computer systems.

Often malware uses freeware to infiltrate computers. Freeware is


downloadable software that comes with no strings attached. Malware
is any software program created to damage, disrupt or gain access to
information systems and can take many different forms.

The purpose of a malware attack is to damage, disrupt or gain access


to a computer or network and the information stored on them.
Malware can be introduced either through an email link or a
downloaded file from the Internet.

A malware attack will often result in loss of data, financial loss, or


both. A malware attack typically includes an email or website
carrying malicious code that can infect the computer of a user who
downloads and opens the email or visits the website. The malware
could then spread to other computers on the network, enter personal
or classified information and send spam emails.
What does malware do?

Malware (short for malicious software) can infect networks and


devices in order to harm those devices, networks and/or their users in
some way. Malware is designed to trick people into installing it on
their computers or other devices, often masquerading as useful
software like a game or video or music player.

Once installed, malware can slow down your computer, collect


information about you without your knowledge, commit identity theft
by stealing passwords for banking or e-commerce sites, use your
computer as part of a network that is involved in the distribution of
spam email, install other kinds of malware on your computer and steal
personal data and Malware can infect computers, networks, and
mobile devices in order to steal data important to the user, lock out
access and prevent the use of those devices by their owners.
Depending on the exact type of malware and its intended purpose, its
effects can be quite varied.
How do malware infections happen?

As malware authors gain access to new methods of infecting systems,


it is important that your team stays aware of the most common attack
techniques.

We've given you an overview of the most common attack vectors in


order to help you preempt threats. Some of the most common methods
of infection involve email attachments with malicious code or links
that direct users to phishing sites where they enter their user
credentials, infecting their systems and spreading malware among
their network.

Command & Control servers are also commonly used to communicate


with affected machines, resulting in the spread of malware. To better
understand how malware infections occur, let's look at some real-
world examples of the three most common types of malware delivery:
phishing attacks, drive-by downloads, and email attachments.
Malware infections happen when cyberthreat actors deliver malware
by disguising malicious files and links in legitimate email
communications. In addition, malware can be hidden inside software
vulnerabilities embedded within outdated or vulnerable software
applications. Once the malware is installed, a cyberattacker can
anonymously access the compromised system or server remotely.
These findings can be used by you to help implement your
organization's security defenses against these attacks.

You might also like