{"id":20811,"date":"2025-01-24T11:30:22","date_gmt":"2025-01-24T10:30:22","guid":{"rendered":"https:\/\/blog.rwth-aachen.de\/itc\/?p=20811"},"modified":"2025-01-17T12:08:34","modified_gmt":"2025-01-17T11:08:34","slug":"zwischen-viren-und-wurmern","status":"publish","type":"post","link":"https:\/\/blog.rwth-aachen.de\/itc\/en\/2025\/01\/24\/zwischen-viren-und-wurmern\/","title":{"rendered":"Between Viruses and Worms"},"content":{"rendered":"<div class=\"twoclick_social_bookmarks_post_20811 social_share_privacy clearfix 1.6.4 locale-en_US sprite-en_US\"><\/div><div class=\"twoclick-js\"><script type=\"text\/javascript\">\/* <![CDATA[ *\/\njQuery(document).ready(function($){if($('.twoclick_social_bookmarks_post_20811')){$('.twoclick_social_bookmarks_post_20811').socialSharePrivacy({\"txt_help\":\"Wenn Sie diese Felder durch einen Klick aktivieren, werden Informationen an Facebook, Twitter, Flattr, Xing, t3n, LinkedIn, Pinterest oder Google eventuell ins Ausland \\u00fcbertragen und unter Umst\\u00e4nden auch dort gespeichert. N\\u00e4heres erfahren Sie durch einen Klick auf das <em>i<\\\/em>.\",\"settings_perma\":\"Dauerhaft aktivieren und Daten\\u00fcber-tragung zustimmen:\",\"info_link\":\"http:\\\/\\\/www.heise.de\\\/ct\\\/artikel\\\/2-Klicks-fuer-mehr-Datenschutz-1333879.html\",\"uri\":\"https:\\\/\\\/blog.rwth-aachen.de\\\/itc\\\/en\\\/2025\\\/01\\\/24\\\/zwischen-viren-und-wurmern\\\/\",\"post_id\":20811,\"post_title_referrer_track\":\"Between+Viruses+and+Worms\",\"display_infobox\":\"on\"});}});\n\/* ]]> *\/<\/script><\/div><p><div id=\"attachment_20812\" style=\"width: 310px\" class=\"wp-caption alignright\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-20812\" class=\"size-medium wp-image-20812\" src=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-300x200.png\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-300x200.png 300w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-1024x683.png 1024w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-768x512.png 768w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-1536x1024.png 1536w, https:\/\/blog.rwth-aachen.de\/itc\/files\/2024\/11\/Blog-Layout-4-2048x1365.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-20812\" class=\"wp-caption-text\">Source: <a href=\"https:\/\/de.freepik.com\/vektoren-kostenlos\/rosa-wurmtier_136484362.htm#fromView=keyword&amp;page=1&amp;position=35&amp;uuid=052b01f6-04e2-4745-9f87-02bd732c6046\">Freepik<\/a><\/p><\/div><\/p>\n<p>With the advent of the Internet in our everyday lives, the risk of malware such as viruses, worms and Trojans has increased dramatically. What began in the 1980s with distribution via floppy discs and CD-ROMs now takes place almost exclusively via the Internet. Various techniques and technologies make modern malware more inconspicuous and at the same time more dangerous &#8211; from stealthy data theft to automatic distribution via botnets.<\/p>\n<p><!--more--><\/p>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">Malware: Versatile, Dangerous and Increasingly Intelligent<\/span><\/h3>\n<p>Malware is constantly finding new ways to infect systems unnoticed. They often find their way onto devices via supposedly harmless channels, such as:<\/p>\n<ul>\n<li><strong>Email attachments:<\/strong> Documents or executable files (e.g. .exe, .scr) that activate malware when opened. Read <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/07\/17\/hilfe-mein-e-mail-passwort-wurde-kompromittiert\/\">our previous article<\/a> to find out more.<\/li>\n<li><strong>Manipulated websites:<\/strong> Even well-known websites can contain malware through manipulated ad banners or codes.<\/li>\n<li><strong>Free downloads:<\/strong> Malware can be installed as a hidden component of free software offers, for example via downloaded games, tools or apps.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">What Types of Threats Exist?<\/span><\/h3>\n<p>The distribution and functionality of malware varies greatly, and depending on the category &#8211; be it <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Schadprogramme\/Viren-und-Wuermer\/viren-und-wuermer_node.html\">virus<\/a>, <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Schadprogramme\/Viren-und-Wuermer\/viren-und-wuermer_node.html\">worm<\/a>, <a href=\"https:\/\/www.bsi.bund.de\/DE\/Themen\/Verbraucherinnen-und-Verbraucher\/Cyber-Sicherheitslage\/Methoden-der-Cyber-Kriminalitaet\/Schadprogramme\/Trojaner\/trojaner_node.html\">Trojan<\/a> or adware &#8211; there are different threats. The main types include:<\/p>\n<ul>\n<li><strong>Ransomware blocks<\/strong> access to the device or encrypts data. Unlocking is only offered against payment of a ransom.<\/li>\n<li>However, as unlocking is not guaranteed, it is advisable not to comply with the demands and instead make regular backups of important data.<\/li>\n<li><strong>Spyware:<\/strong> This type of malware spies on personal data, for example by accessing login details or credit card information. Supposedly useful programmes or applications that are installed unnoticed on the device, such as keyloggers, can make victims of spyware attacks<\/li>\n<li><strong>Trojans and viruses:<\/strong> Trojans often disguise themselves as useful software or file attachments and sneak onto the device. Once installed, they open a <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2022\/01\/17\/backdoors\/\">\u2018back door\u2019<\/a> through which attackers can access the system. Many of these programmes are designed to download further malware from the internet and cause additional damage.<\/li>\n<li><strong>Adware:<\/strong> Although better known as annoying than dangerous, adware can record user data while surfing and display personalised advertising. These programmes can get onto the device unnoticed and then disrupt browsing with repeated pop-up adverts.<\/li>\n<li><strong>Botnets:<\/strong> Infected devices are networked together by cyber criminals and used to carry out large-scale attacks. Botnets can be used, for example, to carry out DDoS (Distributed Denial of Service) attacks that specifically paralyse websites or servers.<\/li>\n<li><strong>Manipulation of online banking:<\/strong> Some malware specialises in inconspicuously intercepting and manipulating online banking data traffic. As this happens without any visible signs, those affected often only notice the damage when checking their bank statement.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">How Can You Protect Yourself?<\/span><\/h3>\n<p>The <a href=\"https:\/\/www.bsi.bund.de\/DE\/Home\/home_node.html\">German Federal Office for Information Security<\/a> (BSI) recommends the following measures:<\/p>\n<ul>\n<li><strong>Updates and backups<\/strong>: keep your operating systems and programmes up to date with updates and regularly back up important data to prevent data loss in the event of an incident.<\/li>\n<li><strong>Use security programmes:<\/strong> Install an up-to-date antivirus programme and a firewall to detect suspicious activity early and block malware. You can find out more about firewalls in our <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/10\/16\/arten-von-firewalls\/\">series<\/a>.<\/li>\n<li><strong><a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/2024\/07\/17\/hilfe-mein-e-mail-passwort-wurde-kompromittiert\/\">Be careful with emails<\/a>:<\/strong> Do not open any attachments or links from unknown sources and check the content for plausibility even with supposedly trusted senders.<\/li>\n<li><strong>Trustworthy download sources:<\/strong> Only download programmes and files from known, reputable websites.<\/li>\n<li><strong>Change passwords if suspected:<\/strong> If you suspect that a device has been infected, change your passwords for online accounts to be on the safe side and check your accounts for suspicious activity.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span style=\"color: #00549f;\">BSI Brochure for Guidance and Prevention<\/span><\/h3>\n<p>Together with the NRW Consumer Advice Centre and the NRW State Office of Criminal Investigation, the BSI has published the brochure <a href=\"https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/DE\/BSI\/Publikationen\/Broschueren\/Wegweiser_Checklisten_Flyer\/Brosch_DINlang_Schadprogramme.html#download=1\">Malware &#8211; how to protect yourself<\/a>. This contains valuable information on common infection paths and protection methods that can be used in everyday life to counteract the increasing threat of malware. Interested parties can also find extensive information on current security warnings and tips on the BSI website.<\/p>\n<p>In view of the rapid pace of technological development, it is crucial that users actively inform themselves about the latest security precautions and continuously secure their devices. Ubiquitous connectivity brings many benefits, but it also requires a high degree of responsibility when dealing with digital media.<\/p>\n<p>If you want to know more about IT security and how you can always be safe when surfing the internet, take a look at all the blog posts in the <a href=\"https:\/\/blog.rwth-aachen.de\/itc\/en\/category\/themen\/it-sicherheit\/\">\u2018IT security\u2019<\/a> category.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>Responsible for the content of this article is <a href=\"https:\/\/www.itc.rwth-aachen.de\/cms\/it-center\/it-center\/profil\/team\/~epvp\/mitarbeiter-campus-\/?gguid=PER-FSX9U9J&amp;allou=1\">Malak Mostafa<\/a>. .<\/p>","protected":false},"excerpt":{"rendered":"<p>Sorry, this entry is only available in Deutsch.<\/p>\n","protected":false},"author":5003,"featured_media":20812,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"c2c_always_allow_admin_comments":false,"footnotes":""},"categories":[311,314,315],"tags":[64,69,624,1187,252,600,1338,1339],"class_list":["post-20811","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-fun-facts","category-it-sicherheit","category-services-support","tag-backup","tag-bsi","tag-firewall","tag-schutz","tag-update","tag-viren","tag-virus","tag-wurm"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/users\/5003"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/comments?post=20811"}],"version-history":[{"count":2,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20811\/revisions"}],"predecessor-version":[{"id":21213,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/posts\/20811\/revisions\/21213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media\/20812"}],"wp:attachment":[{"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/media?parent=20811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/categories?post=20811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.rwth-aachen.de\/itc\/en\/wp-json\/wp\/v2\/tags?post=20811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}