With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous – from stealthy data theft to automatic distribution via botnets.
Malware: Versatile, Dangerous and Increasingly Intelligent
Malware is constantly finding new ways to infect systems unnoticed. They often find their way onto devices via supposedly harmless channels, such as:
- Email attachments: Documents or executable files (e.g. .exe, .scr) that activate malware when opened. Read our previous article to find out more.
- Manipulated websites: Even well-known websites can contain malware through manipulated ad banners or codes.
- Free downloads: Malware can be installed as a hidden component of free software offers, for example via downloaded games, tools or apps.
What Types of Threats Exist?
The distribution and functionality of malware varies greatly, and depending on the category – be it virus, worm, Trojan or adware – there are different threats. The main types include:
- Ransomware blocks access to the device or encrypts data. Unlocking is only offered against payment of a ransom.
- However, as unlocking is not guaranteed, it is advisable not to comply with the demands and instead make regular backups of important data.
- Spyware: This type of malware spies on personal data, for example by accessing login details or credit card information. Supposedly useful programmes or applications that are installed unnoticed on the device, such as keyloggers, can make victims of spyware attacks
- Trojans and viruses: Trojans often disguise themselves as useful software or file attachments and sneak onto the device. Once installed, they open a ‘back door’ through which attackers can access the system. Many of these programmes are designed to download further malware from the internet and cause additional damage.
- Adware: Although better known as annoying than dangerous, adware can record user data while surfing and display personalised advertising. These programmes can get onto the device unnoticed and then disrupt browsing with repeated pop-up adverts.
- Botnets: Infected devices are networked together by cyber criminals and used to carry out large-scale attacks. Botnets can be used, for example, to carry out DDoS (Distributed Denial of Service) attacks that specifically paralyse websites or servers.
- Manipulation of online banking: Some malware specialises in inconspicuously intercepting and manipulating online banking data traffic. As this happens without any visible signs, those affected often only notice the damage when checking their bank statement.
How Can You Protect Yourself?
The German Federal Office for Information Security (BSI) recommends the following measures:
- Updates and backups: keep your operating systems and programmes up to date with updates and regularly back up important data to prevent data loss in the event of an incident.
- Use security programmes: Install an up-to-date antivirus programme and a firewall to detect suspicious activity early and block malware. You can find out more about firewalls in our series.
- Be careful with emails: Do not open any attachments or links from unknown sources and check the content for plausibility even with supposedly trusted senders.
- Trustworthy download sources: Only download programmes and files from known, reputable websites.
- Change passwords if suspected: If you suspect that a device has been infected, change your passwords for online accounts to be on the safe side and check your accounts for suspicious activity.
BSI Brochure for Guidance and Prevention
Together with the NRW Consumer Advice Centre and the NRW State Office of Criminal Investigation, the BSI has published the brochure Malware – how to protect yourself. This contains valuable information on common infection paths and protection methods that can be used in everyday life to counteract the increasing threat of malware. Interested parties can also find extensive information on current security warnings and tips on the BSI website.
In view of the rapid pace of technological development, it is crucial that users actively inform themselves about the latest security precautions and continuously secure their devices. Ubiquitous connectivity brings many benefits, but it also requires a high degree of responsibility when dealing with digital media.
If you want to know more about IT security and how you can always be safe when surfing the internet, take a look at all the blog posts in the ‘IT security’ category.
Responsible for the content of this article is Malak Mostafa. .
Leave a Reply