{"id":2031,"date":"2021-05-07T04:52:00","date_gmt":"2021-05-07T04:52:00","guid":{"rendered":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/?p=2031"},"modified":"2021-04-28T15:26:53","modified_gmt":"2021-04-28T15:26:53","slug":"malware-attacks-in-regina","status":"publish","type":"post","link":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/malware-attacks-in-regina\/","title":{"rendered":"Malware Attacks in Regina"},"content":{"rendered":"\n<p>First let&#8217;s talk about the definition of malware. <\/p>\n\n\n\n<p>Malware, short for&nbsp;<em>malicious software,<\/em>&nbsp;is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. As&nbsp;<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/dd632948.aspx\">Microsoft puts it<\/a>, &#8220;[malware] is a catch-all term to refer to any software designed to cause damage to a single computer, server, or computer network.&#8221; In other words, software is identified as malware based on its&nbsp;<em>intended use,&nbsp;<\/em>rather than a particular technique or technology used to build it.<\/p>\n\n\n\n<p>This means that the question of, say, what the difference is between malware and a virus misses the point a bit: a virus is a type of malware, so all viruses are malware (but not every piece of malware is a virus).<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Types of malware<\/h2>\n\n\n\n<p>There are a number of different ways of categorizing malware; the first is by how the malicious software spreads. You&#8217;ve probably heard the words&nbsp;<em>virus, trojan,&nbsp;<\/em>and&nbsp;<em>worm&nbsp;<\/em>used interchangeably, but&nbsp;<a href=\"https:\/\/support.symantec.com\/en_US\/article.TECH98539.html\">as Symantec explains<\/a>, they describe three subtly different ways malware can infect target computers:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>A&nbsp;<strong><a href=\"https:\/\/www.csoonline.com\/article\/3429569\/what-is-a-computer-worm-how-this-self-spreading-malware-wreaks-havoc.html\">worm<\/a>&nbsp;<\/strong>is a standalone piece of malicious software that reproduces itself and spreads from computer to computer.<\/li><li>A&nbsp;<strong><a href=\"https:\/\/www.csoonline.com\/article\/3406446\/what-is-a-computer-virus-how-they-spread-and-5-signs-youve-been-infected.html\">virus<\/a>&nbsp;<\/strong>is a piece of computer code that inserts itself within the code of another standalone program, then forces that program to take malicious action and spread itself.<\/li><li>A&nbsp;<strong><a href=\"https:\/\/www.csoonline.com\/article\/3403381\/what-is-a-trojan-horse-how-this-tricky-malware-works.html\">trojan<\/a>&nbsp;<\/strong>is a program that cannot reproduce itself but masquerades as something the user wants and tricks them into activating it so it can do its damage and spread.<\/li><\/ul>\n\n\n\n<p>Malware can also be installed on a computer &#8220;manually&#8221; by the attackers themselves, either by gaining physical access to the computer or using privilege escalation to gain remote administrator access.&nbsp;<\/p>\n\n\n\n<p>Another way to categorize malware is by what it&nbsp;<em>does&nbsp;<\/em>once it has successfully infected its victim&#8217;s computers. There are a wide range of potential attack techniques used by malware:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong><a href=\"http:\/\/www.csoonline.com\/cms\/article\/3295877\">Spyware<\/a>&nbsp;<\/strong>is&nbsp;<a href=\"https:\/\/www.webroot.com\/us\/en\/resources\/tips-articles\/what-is-spyware-and-how-to-detect-it\">defined by Webroot Cybersecurity<\/a>&nbsp;as &#8220;malware used for the purpose of secretly gathering data on an unsuspecting user.&#8221; In essence, it&nbsp;<em>spies&nbsp;<\/em>on your behavior as you use your computer, and on the data you send and receive, usually with the purpose of sending that information to a third party. A&nbsp;<strong><a href=\"https:\/\/www.csoonline.com\/article\/3326304\/security\/what-is-a-keylogger-how-attackers-can-monitor-everything-you-type.html\">keylogger<\/a>&nbsp;<\/strong>is a specific kind of spyware that records all the keystrokes a user makes\u2014great for stealing passwords.<\/li><li>A&nbsp;<strong><a href=\"https:\/\/www.csoonline.com\/article\/3222066\/how-to-detect-and-remove-a-rootkit-in-windows-10.html\">rootkit<\/a>&nbsp;<\/strong>is, as&nbsp;<a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/rootkit\">described by TechTarget<\/a>, &#8220;a program or, more often, a collection of software tools that gives a threat actor remote access to and control over a computer or other system.&#8221; It gets its name because it&#8217;s a kit of tools that (generally illicitly) gain&nbsp;<em>root access&nbsp;<\/em>(administrator-level control, in Unix terms) over the target system, and use that power to hide their presence.<\/li><li><a href=\"https:\/\/www.csoonline.com\/article\/3406422\/what-is-adware-how-it-works-and-how-to-protect-against-it.html\"><strong>Adware&nbsp;<\/strong><\/a>is malware that forces your browser to redirect to web advertisements, which often themselves seek to download further, even more malicious software. As&nbsp;<em><a href=\"https:\/\/www.nytimes.com\/2018\/06\/13\/technology\/personaltech\/battling-adware-that-redirects-your-browser.html\">The New York Times&nbsp;<\/a><\/em><a href=\"https:\/\/www.nytimes.com\/2018\/06\/13\/technology\/personaltech\/battling-adware-that-redirects-your-browser.html\">notes<\/a>, adware often piggybacks onto tempting &#8220;free&#8221; programs like games or browser extensions.<\/li><li><strong><a href=\"https:\/\/www.csoonline.com\/article\/3236183\/ransomware\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">Ransomware<\/a>&nbsp;<\/strong>is a flavor of malware that encrypts your hard drive&#8217;s files and demands a payment, usually in Bitcoin, in exchange for the decryption key. Several high-profile malware outbreaks of the last few years, such as&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3233210\/ransomware\/petya-ransomware-and-notpetya-malware-what-you-need-to-know-now.html\">Petya<\/a>, are&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3236183\/ransomware\/what-is-ransomware-how-it-works-and-how-to-remove-it.html\">ransomware<\/a>. Without the decryption key, it&#8217;s mathematically impossible for victims to regain access to their files. So-called&nbsp;<strong>scareware&nbsp;<\/strong>is a sort of shadow version of ransomware; it claims to have taken control of your computer and demands a ransom, but actually is just using&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3186229\/data-protection\/updating-apple-ios-will-protect-you-from-this-fake-ransomware-attack.html?nsdr=true\">tricks like browser redirect loops<\/a>&nbsp;to make it seem as if it&#8217;s done more damage than it really has, and unlike ransomware can be relatively easily disabled.<\/li><li><strong><a href=\"https:\/\/www.csoonline.com\/article\/3253572\/internet\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\">Cryptojacking<\/a>&nbsp;<\/strong>is another way attackers can force you to supply them with Bitcoin\u2014only it works without you necessarily knowing. The&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3267572\/encryption\/how-to-detect-and-prevent-crypto-mining-malware.html\">crypto mining malware<\/a>&nbsp;infects your computer and&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3253572\/internet\/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html\">uses your CPU cycles to mine Bitcoin<\/a>&nbsp;for your attacker&#8217;s profit. The mining software may run in the background on your operating system or even as JavaScript in a browser window.<\/li><li><strong><a href=\"https:\/\/www.csoonline.com\/article\/3373647\/what-is-malvertising-and-how-you-can-protect-against-it.html\" rel=\"noreferrer noopener\" target=\"_blank\">Malvertising<\/a><\/strong>&nbsp;is the use of legitimate ads or ad networks to covertly deliver malware to unsuspecting users\u2019 computers. For example, a cybercriminal might pay to place an ad on a legitimate website. When a user clicks on the ad, code in the ad either redirects them to a malicious website or installs malware on their computer. In some cases, the malware embedded in an ad might execute automatically without any action from the user, a technique referred to as a \u201cdrive-by download.\u201d<\/li><\/ul>\n\n\n\n<p>Any specific piece of malware has both a means of infection and a behavioral category. So, for instance,&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3227906\/ransomware\/what-is-wannacry-ransomware-how-does-it-infect-and-who-was-responsible.html\">WannaCry<\/a>&nbsp;is a ransomware worm. And a particular piece of malware might have different forms with different attack vectors: for instance, the Emotet banking malware has been spotted in the wild as both a&nbsp;<a href=\"https:\/\/isc.sans.edu\/forums\/diary\/Malspam+pushing+Emotet+malware\/22650\/\">trojan and a worm<\/a>.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Prevention &#8211; An Ounce of Prevention Equals a Pound of Cure<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware Prevention &#8211; An Ounce of Prevention Equals a Pound of Cure<\/h2>\n\n\n\n<p>With spam and&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/2117843\/phishing\/what-is-phishing-how-this-cyber-attack-works-and-how-to-prevent-it.html\">phishing<\/a>&nbsp;email being the primary vector by which malware infects computers, the best way to prevent malware is make sure your email systems are locked down tight\u2014and your users know how to spot danger. We&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3186602\/security\/top-5-email-security-best-practices-to-prevent-malware-distribution.html#slide1\">recommend a combination of carefully checking attached documents and restricting potentially dangerous user behavior<\/a>\u2014as well as just&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3235520\/phishing\/15-real-world-phishing-examples-and-how-to-recognize-them.html\">familiarizing your users with common phishing scams<\/a>&nbsp;so that their common sense can kick in.<\/p>\n\n\n\n<p>When it comes to more technical preventative measures, there are a&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3287099\/ransomware\/10-ways-to-prevent-detect-and-recover-from-ransomware-and-zeroday-threats.html\">number of steps you can take<\/a>, including keeping all your systems patched and updated, keeping an inventory of hardware so you know what you need to protect, and performing continuous vulnerability assessments on your infrastructure. When it comes to ransomware attacks in particular, one way to be prepared is to&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3273578\/ransomware\/preventing-ransomware-attacks-the-right-way.html\">always make backups of your files<\/a>, ensuring that you&#8217;ll never need to pay a ransom to get them back if your hard drive is encrypted.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Find Malware<\/h2>\n\n\n\n<p>It&#8217;s fully possible\u2014and perhaps even likely\u2014that your system will be infected by malware at some point despite your best efforts. How can you tell for sure?&nbsp;<em>CSO&nbsp;<\/em>columnist Roger Grimes has written a&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/2883958\/malware\/malware-detection-in-9-easy-steps.html\">deep dive into how to diagnose your PC<\/a>&nbsp;for potential malware that you might find helpful.<\/p>\n\n\n\n<p>When you get to the level of corporate IT, there are also more advanced visibility tools you can use to see what&#8217;s going on in your networks and detect malware infections. Most forms of malware use the network to either spread or send information back to their controllers, so&nbsp;<a href=\"https:\/\/phys.org\/news\/2017-05-network-traffic-early-indication-malware.html\">network traffic contains signals of malware infection that you might otherwise miss<\/a>; there are a&nbsp;<a href=\"https:\/\/www.pcmag.com\/article2\/0,2817,2495263,00.asp\">wide range of network monitoring tools out there<\/a>, with prices ranging from a few dollars to a few thousand. There are also&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/2124604\/network-security\/what-is-siem-software-how-it-works-and-how-to-choose-the-right-tool.html\">SIEM tools<\/a>, which evolved from log management programs; these tools analyze logs from various computers and appliances across your infrastructure looking for signs of problems, including malware infection.&nbsp;<a href=\"https:\/\/www.gartner.com\/reviews\/customer-choice-awards\/security-information-event-management\">SIEM vendors<\/a>&nbsp;range from industry stalwarts like IBM and HP Enterprise to smaller specialists like Splunk and Alien Vault.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Get Rid of Malware<\/h2>\n\n\n\n<p>How to remove malware once you&#8217;re infected is in fact the million dollar question. Malware removal is a tricky business, and the method can vary depending on the type you&#8217;re dealing with.&nbsp;<em>CSO&nbsp;<\/em>has information on how to remove or otherwise recover from&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3222066\/malware\/how-to-detect-and-remove-a-rootkit-in-windows-10.html\">rootkits<\/a>,&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3215147\/malware\/how-to-recover-from-a-ransomware-attack.html\">ransomware<\/a>, and&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/3267572\/encryption\/how-to-detect-and-prevent-crypto-mining-malware.html\">cryptojacking<\/a>. We also have a guide to&nbsp;<a href=\"https:\/\/www.csoonline.com\/article\/2894520\/data-protection\/are-you-infected-with-malware-check-windows-registry-keys.html\">auditing your Windows registry<\/a>&nbsp;to figure out how to move forward.<\/p>\n\n\n\n<p>If you&#8217;re looking for tools for cleansing your system, Tech Radar has a good&nbsp;<a href=\"https:\/\/www.techradar.com\/news\/the-best-free-malware-removal-tools\">roundup of free offerings<\/a>, which contains some familiar names from the antivirus world along with newcomers like Malwarebytes. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Malware\/Virus Examples<\/h2>\n\n\n\n<p>Take a look at a thorough analysis on types of malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Trends in Malware<\/h2>\n\n\n\n<h2 class=\"wp-block-heading\">This is How Serious Malware Is: Attacks on Businesses<\/h2>\n","protected":false},"excerpt":{"rendered":"<p>First let&#8217;s talk about the definition of malware. Malware, short for&nbsp;malicious software,&nbsp;is a blanket term for viruses, worms, trojans and other harmful computer programs hackers use to wreak destruction and gain access to sensitive information. As&nbsp;Microsoft puts it, &#8220;[malware] is a catch-all term to refer to any software designed to cause damage to a single [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2031","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/posts\/2031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/comments?post=2031"}],"version-history":[{"count":5,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/posts\/2031\/revisions"}],"predecessor-version":[{"id":2036,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/posts\/2031\/revisions\/2036"}],"wp:attachment":[{"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/media?parent=2031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/categories?post=2031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/oldstaging.ticktocktech.com\/computer-repair-regina\/wp-json\/wp\/v2\/tags?post=2031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}