Malware Concept – What is it, types, where does it come from

We explain what malware is and the types of malware that exist. Also, where it comes from and how to protect ourselves from this software.

Malware infiltrates a computer system and carries out covert activities.

What is malware?

In computing it is understood by malware (contraction in English of malices software, that is, “malicious program”) to the various forms of malicious software whose objective is to infiltrate within a computer system and once carry out a series of covert activities, ranging from sabotage of the system itself, the theft of confidential data, the appropriation of its computer resources and / or the contagion of other systems that may be on the network.

These types of malicious programs made their appearance during the 1980s, when personal computers began to become popular throughout the world, and currently have their preferred means of propagation on the Internet, either through suspicious email (Spam), infected web pages, files shared online, etc.

The origin of malware and computer viruses may have been initially a joke or a game, on the part of young programmers, unaware of the damage they could cause. However, since then malicious software has evolved and grown in illegal uses, to the point that the use of antivirus tools has become imperative.

According to reports from the company F-Secure, in 2007 as much malware was produced as in the previous 20 years, and according to Panda Security, in 2011 73,000 new computer threats were created per day, which exceeds the production of legal software with you grow.

Malware types

Trojan malware invites the user to run it and thus open malicious programs.

According to its method of propagation, we can talk about various types of malware, such as:

  • Viruses and worms (worms). It is software that invades the system and performs harmful actions, such as deleting critical components of the Operating System, after having used its resources to send itself by email or by other means, thus spreading the infection.
  • Hidden malware. These are harmful programs that enter the system and act on it silently, without the user noticing.
    • Trojans. Disguised as something harmless or beneficial, these programs invite the user to run them, and then open the door to hundreds of other malicious programs.
    • Backdoors. Its name in English means “back door”, since it allows third parties access to the computer system, evading the usual controls and communication protocols.
    • Drive-by downloads. Malicious pieces of software that are automatically downloaded by certain Web pages without asking the user for authorization or allowing him to stop it in time, and open the door to other forms of virtual invasion.
    • Rootkits. These are techniques for modifying key files of the Operating System, to allow the malware present to remain hidden from the installed detection programs.
  • Advertising malware.
    • Spyware. Programs that secretly collect information from the pages visited on the Internet and use it to bombard us with Spam.
    • Adware. They work the same as spyware, but showing us online advertising as we browse.
    • Hijackers. “Hijackers” programs that modify Internet browser settings, forcing it to start on a certain Web page or to display certain messages.
  • Information hijackers.
    • Keyloggers. Programs that secretly collect user passwords and send them to an anonymous requester, such as credit card numbers, etc.
    • Stealers. Similar to keyloggers, they steal sensitive information from the user, but only what is stored on the computer.
    • Dialers. Not so popular since the bulk of Internet connections are by Broadband, these programs stole the telephone signal and allowed illegal calls to be made remotely.
    • Botnets. This is the name given to sets of computers that respond to instructions from third parties remotely and secretly, allowing them to indirectly send spam or viruses, making it more difficult to trace the source.
    • Ransomware. Various forms of software that break into user accounts online, modify the password, and then ask for a ransom payment to release it.

Where does the malware come from?

We come into contact with malware in a variety of ways, on high-traffic sites like pornographic networks or gambling sites, or by opening suspicious email attachments.

Mostly malware comes from China and the United States, largest software producers in the world, or other similar nations. Occasionally these malicious programs can even come from recognized companies, disguised in their products.

A famous case has been that of the process “Windows Telemetry”That include the new versions of Windows, and that it is capable of collecting information about user habits and secretly sending them to Microsoft, using system resources.

How to protect ourselves from malware?

Installing an antivirus program is one of the best options to protect yourself from malware.

The best option to protect yourself from malware is install an antivirus and antimalware program on the computer, which must be up-to-date in their virus definitions, and to which we must grant the necessary permissions to monitor the entry of unsolicited software into the system.

It is also useful to have the Operating System and our main applications updated, since many security updates compensate for weaknesses in the system that can be exploited by these malicious programs.

And as a measure of digital hygiene, installing unknown software on the machine should be avoided, as well as opening suspicious emails, let alone clicking on advertisements that seem too good to be true.