Malware, a portmanteau of “malicious software,” refers to any software, code, or computer program intentionally designed to cause harm to a computer system or its users. Virtually every modern cyberattack involves some type of malware. These harmful programs can range in severity from highly destructive and costly (ransomware) to merely annoying, but otherwise innocuous (adware).
Every year, there are billions of malware attacks on businesses and individuals. Malware can infect any type of device or operating system including Windows, Mac, iPhone, and Android.
Cybercriminals develop and use malware to:
- Hold devices, data, or enterprise networks hostage for large sums of money
- Gain unauthorized access to sensitive data or digital assets
- Steal login credentials, credit card numbers, intellectual property, personally identifiable information (PII) or other valuable information
- Disrupt critical systems that businesses and government agencies rely on
While the words are often used interchangeably not all types of malware are necessarily viruses. Malware is the umbrella term describing numerous types of threats such as:
Viruses: A computer virus is defined as a malicious program that cannot replicate without human interaction, either through clicking a link, downloading an attachment, launching a specific application, or various other actions.
Worms: Essentially a self-replicating virus, worms don’t require human interaction to spread, tunneling deep into different computer systems and moving between devices.
Botnets: A network of infected computers under control of a single attacker known as the “bot-herder” working together in unison.
Ransomware: One of the most dangerous types of malware, ransomware attacks take control of critical computer systems or sensitive data, locking users out and requiring exorbitant ransoms in cryptocurrency like Bitcoin in exchange for regained access. Ransomware remains one of the most dangerous types of cyber threats today.
Multi-extortion ransomware: As if ransomware attacks aren’t threatening enough, multi-extortion ransomware adds additional layers to either cause further damage or add extra pressure for victims to capitulate. In the case of double-extortion ransomware attacks, malware is used to not only encrypt the victim’s data but also exfiltrate sensitive files, such as customer information, which attackers then threaten to release publicly. Triple-extortion attacks go even further, with threats to disrupt critical systems or extend the destructive attack to a victim’s customers or contacts.
Macro viruses: Macros are command series typically built into larger applications to quickly automate simple tasks. Macro viruses take advantage of programmatic macros by embedding malicious software into application files that will execute when the corresponding program is opened by the user.
Trojans: Named for the famous Trojan Horse, trojans disguise themselves as useful programs or hide within legitimate software to trick users into installing them.
Spyware: Common in digital espionage, spyware hides within an infected system to secretly gather sensitive information and transmit it back to an attacker.
Adware: Considered to be mostly harmless, adware is typically found bundled with free software and spams users with unwanted pop-ups or other ads. However, some adware might harvest personal data or redirect web browsers to malicious websites.
Rootkit: A type of malware package that allows hackers to gain privileged, administrator-level access to a computer’s operating system or other assets.