Malware, short for malicious software, includes any software intentionally designed to cause harm to a computer, server, or network. Malware can come in many variants, but they share similar objectives: financial gains, disruption and destruction of targeted entities, and political motivations.
Over the years, malware has evolved significantly, becoming more sophisticated and harder to detect. Modern malware can operate stealthily, embedding itself deep within systems, evading detection by traditional security measures, and executing complex attacks. This evolution has led to the development of specialised types of malware, each designed for specific purposes such as stealing sensitive data, extorting money, disrupting operations, or gaining unauthorised access to systems. Understanding the various types of malware is essential for more effective detection, prevention, and response strategies to protect valuable data and maintain cybersecurity.
A virus is a malicious code that attaches to clean files and replicates itself by modifying other computer programmes and inserting its own code, spreading throughout a computer system. It requires user interaction to spread from one system to another, such as opening an infected file.
In contrast to a virus, a worm is a type of malware that does not require any user interaction to spread. A worm is a standalone malware that replicates itself automatically, spreading across networks by utilising automatic file transfer features that may have been enabled, either deliberately or accidentally, on network computers. Its ability to replicate without needing to attach itself to programmes or files enables it to propagate across networks more quickly than a virus. It often gains access into a system through exploiting network vulnerabilities, backdoors or external drives.
Trojan malware disguises itself as legitimate software that tricks victims into installing it, giving unauthorised access to victims’ systems. It is designed to operate under-the-radar once the code is activated by the victims and is often used to let other types of malware into the system. Although a trojan cannot self-replicate and spread automatically like worms, they are still capable of destructive damage to business operations. A prominent example is the Emotet malware, which according to Ensign’s Cyber Threat Landscape Report 2023, started out as a banking trojan in 2014 and have since evolved into a more complex and adaptable threat, utilising Excel Macros and PowerShell to deliver payloads and developing sandbox evasion techniques.
Spyware is a software that secretly monitors user activity without their knowledge or consent. Instead of disrupting a device's operations, spyware aims to collect sensitive information that can provide attackers with remote access. Attackers often use the keystroke logging capability of spyware to track and collect victims’ login credentials, browsing history and location details, using the data for financial theft or selling it to third parties.
Adware refers to unwanted software designed to display advertisements on the victims’ screens. It often occurs within the victims’ web browser and consumes processing power, slowing down the performance of their devices. While adware is not always dangerous, in some cases it may be designed to analyse the websites visited by victims, present advertising content, install additional programmes, and redirect victims’ browsers to unsafe sites, potentially hijacking their browsers to install viruses or spyware.
Ransomware locks or encrypts data on a victim’s computer system and demands a ransom for its release. Despite the attacker’s promises to restore the locked data once ransom is paid, victims cannot guarantee the recovery of their files, thus the risk of data being destroyed or leaked remains. While ransomware is mostly distributed as Trojans, it can also be delivered via viruses and worms, exploiting different methods to reach and infect systems.
Fileless malware uses legitimate, built-in system tools and processes to carry out malicious activities. It operates entirely in a computer's memory without writing files to the hard drive, and often utilise system processes available and trusted by the operating system. This makes it difficult to for traditional antivirus solutions to detect and remove since they are designed to scan files. Fileless malware often utilises PowerShell, Windows Management Instrumentation (WMI), or other native Windows tools to carry out attacks while evading detection.
Cryptojackers are a form of malware designed to mine cryptocurrency from a victims’ devices without their knowledge. Attackers use victims’ Central Processing Unit (CPU) or Graphics Processing Unit (GPU) resources on their computers or mobile devices to verify transactions on a blockchain network and earn cryptocurrency. This malicious form of cryptomining significantly reduces costs for an otherwise resource-intensive and expensive process for cybercriminals.
Malware can often operate covertly, making it challenging to recognise without keen awareness and the right tools. However, certain telltale signs can indicate that your system may be compromised. Being able to identify these warning signs can help you take prompt action to address the infection and secure your data and systems.
Malware attacks typically unfold in several phases, each involving different techniques to compromise a system. Understanding these phases can help in developing robust defences and mitigation strategies.
The first phase of malware attacks involves leveraging various delivery methods to distribute malware. They include:
Once the malware is delivered, attackers take advantage of either technical vulnerabilities, human vulnerabilities, or both to facilitate the entry of malware into their systems and devices.
After the malware is downloaded on a device, there are two main ways that it may execute its malicious code:
Malware often take steps to persist on the system, such as modifying registry entries to start the execution automatically, or creating scheduled tasks that launch the malware.
Once the malware is installed, it establishes a communication channel between the compromised system and the attacker-controlled server, enabling the attacker to control the malware remotely. The malware may use domain generation algorithms (DGAs) or pre-configured domains and IP addresses to connect to the attacker’s C&C server, receiving instructions and sending back data that was exfiltrated.
To avoid detection by security software, the malware may use various evasion techniques, such as encrypting communication with the C&C server to evade network monitoring tools and changing its code or behaviour to avoid signature-based detection.
A payload refers to the intended damage that the malware is designed to inflict. Payloads can be delivered in different forms based on the attacker’s objectives:
Malware can spread through various methods, including network shares, email attachments, malicious links, and removable media like USB drives. It can also capitalise on vulnerabilities in connected devices, such as printers, routers, and Internet of Things (IoT) devices. More specifically for worms, they can replicate and spread to other systems within a network without any user intervention, enabling them to propagate quickly.
When a malware attack occurs, its implications can extend beyond the immediate disruption of services or theft of information. These attacks often have far-reaching and severe consequences that affect individuals, businesses, and even national security. Understanding the full spectrum of these implications is crucial for comprehending the true cost of malware and the importance of robust cybersecurity measures.
Malware that has infected individual users’ devices and files may inadvertently spread to their company and infect organisational systems. If the individual brings their infected device to work and connects to the company’s local network, the malware can propagate to other devices on the same network. Using shared drives or collaboration tools to upload or share infected files can also spread malware within the organisation.
Financial impacts are often significant, including potential ransom payments, costly remediation efforts, increased insurance premiums, and revenue losses due to business disruptions. These costs can far exceed the initial ransom demand.
Organisations risk permanent loss of sensitive information if they are unable to decrypt their files. Modern attacks often involve double or triple extortion, adding another layer of risk.
Reputational damage can be long-lasting, eroding customer and investor trust, potentially leading to lost business opportunities and partnerships. If proprietary information is leaked, their competitors may gain unfair advantages.
Malware attack implications on a national scale will be more extensive and severe compared to those on an organisational scale. Malware targeting critical infrastructure, such as water supply systems and transportation networks, can lead to widespread disruption of essential services. Attacks on public safety systems, such as emergency response and healthcare networks, can endanger lives and further undermine national security. Malware may also be used by nation-state actors to steal sensitive government and military information for cyber espionage, compromising national security.
In view of the dire consequences of malware attacks, it is crucial for organisations to take precautionary measures to bolster their cyber defences. That requires a comprehensive approach that combines technical measures, user education, and robust security practices.
Organisations should provide ongoing security awareness training to help staff recognise phishing attempts, avoid suspicious downloads, and create strong and unique passwords for all accounts. Multi-factor authentication should also be enabled for staff to prevent unauthorised access.
Implementing multiple backup methods, such as storing data on external hard drives and cloud services, and regular backup schedules protects against data loss from malware attacks and enhances organisational cyber resilience. Regular updating and patching of operating systems, applications, and software is essential to address vulnerabilities that malware could exploit. Prioritising critical security updates and patches will help to seal potential entry points for malware attacks.
With the prevalence in usage of polymorphic malware and other advanced threats in malware attacks today, traditional signature and rule-based systems are no longer effective in detecting modern elusive malware. Utilising advanced threat detection and response solutions have therefore become even more crucial for organisations to keep up with the threats.
This is where Ensign’s advanced AI-powered detection and response solutions (Helios) excels, providing accurate data-driven threat insights for organisations to gain better visibility into impending attacks. Our patented technologies ensure high-fidelity alerts, significantly reducing false positives and streamlining threat prioritisation. Helios also ensures comprehensive threat coverage by being able to detect a wide range of threats including malware, ransomware, phishing, exfiltration, and insider threats. To learn more about how Helios may enhance your organisation’s cyber defences, you may download the Helios factsheet.
Ensign Helios offers a robust, AI-powered cyber analytics solution designed to detect and respond to advanced threats, including malware, with unparalleled accuracy and efficiency.
Learn more about the capabilities of Helios.
A comprehensive incident response (IR) plan provides organisations with clear steps to minimise damage, eradicate the malware threat, and recover normal business operations efficiently. Regular testing and updating of the IR plan through tabletop exercises and simulations helps to reveal potential vulnerabilities for malware exploitation which can then be addressed promptly.
Given the rapid and relentless nature of cyberattacks, timely remediation of intrusions is crucial to prevent further damage to critical infrastructure. However, developing a well-defined and comprehensive IR plan may seem complex and daunting without the right expertise. With Ensign’s Digital Forensics and Incident Response (DFIR) services, we go beyond providing remediation solutions in the event of a cyber attack, we also identify the motivation and root causes of the incident to prevent its recurrence.
To learn more about our incident response services.