Jeevesh Kishore Sharma
6 min readMar 6, 2022

--

Malware V.s Viruses, a similarity misconception.

The Internet has transformed our lives in many good ways. Unfortunately, this vast network and its associated technologies also have brought in their wake, the increasing number of security threats. Computer security basically is the protection of computer systems and information from harm, theft, and unauthorized use.

We all have once in our life-time had encountered a virus in one or the other form. Remember those times when we got a ‘CD ‘from our neighbours- brother friend of friend which contains the Super Deluxe Editon version our favourite game i.e. GTA, CS-Go, Contra, NFS or something much better, my favourite Alladin.

Super Excited! Waiting for the CD-ROM💿💿 to read your new CD ,

Loading! Loading! Loading!💽 , clutter…. clutter…. clutter …..sound incoming…. but suddenly your machine crashes with a big blue screen & that’s the time you got the spiky chill of trouble & your father is on the way to home! : fearful-tensed emoji;

So, what happened over there, the machine suddenly expressed his desire to go to beach or something sketchier? Was it a Malware/a virus or maybe worse a ransom-ware/ trojan-horse?

It was indeed a malware, a file-less one: — Operation Cobalt Kitty-ransomware.

But you may be thinking 💭 isn’t malware-virus-ransomware a same thing? In short, No they aren’t.

Malware, viruses, ransomware, trojan horse are all a catch-up term used vice-versa assuming that all mean same but this is not the case. Yes, they are associated with similar category i.e.: — malicious software but their way of functioning is way apart from each other in fact virus’s ransomware & trojan horses are the child elements of the parent element malwares.

Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service or network. Cybercriminals typically use it to extract data that they can leverage over victims for financial gain. That data can range from financial data, to healthcare records, to personal emails and passwords, the possibilities of what sort of information can be compromised have become endless.

Malware is a broad category, with different forms of malware impacting devices and systems differently. Let’s examine some of the most common forms of malware.

Symantec Cyber Security describe three subtly different ways malware can infect target computers:

1.Worm : A computer worm is defined as a program that autonomously propagates itself on the infected system and on the connected network and beyond, and usually performs harmful actions. Computer worms delete files, cause malfunctions and damage to software and hardware, or flood the system with irrelevant content. Typical ways in which computer worms spread include infected USB thumb drives, email attachments, and even infected websites.

2.Virus : Possibly the most common type of malware, viruses attach their malicious code to clean code and wait for an unsuspecting user or an automated process to execute them. Like a biological virus, they can spread quickly and widely, causing damage to the core functionality of systems, corrupting files and locking users out of their computers. They are usually contained within an executable file.

3.Trojan: As the name suggests, Trojan’s sneak onto the victim’s system disguised as a harmless file or application and perform unwanted actions. Depending on the type of Trojan, different functions are executed, such as the targeted deletion of specific system files or even the download of more malicious code from the internet.

Another way to categorize malware is by what it does once it has successfully infected its victim’s computers. There are a wide range of potential attack techniques used by malware:

1. Ransomware also called an encryption or a crypto Trojan, encrypts data on the affected system and only unblocks it when the correct password is entered. The latter is not given to the victims until after they have paid a ransom to the hackers. Digital currencies such as Bitcoin and Ether are the most common means of payment, making it difficult to track the cybercriminals. Ransomware is one of the most popular and dangerous kinds of malware programs of the past few years. Companies, in particular, have recently received demands to pay millions to unblock critical services. The most well-known ransomware variants include WannaCry and Petya.

2. Spyware: As the name suggests, spyware spies on the affected system. It captures valuable user input such as passwords and other information, which is then sent over the internet to the cybercriminals responsible for it. To spread spyware, hackers use the usual infection channels such as email spam or software from questionable download portals

3.Adware: Adware (derived from “advertisement”) refers to unwanted programs that display advertising on the system or automatically direct a browser to dubious websites. The programs usually get onto users’ computers from dubious download portals or infected websites. Once installed, adware can only be removed from the system at great expense, as the tools are deeply embedded in the operating system and web browsers. The most well-known representatives of the adware milieu include unwanted browser toolbars and other mostly nonsensical extensions.

4. Crypto jacking/Crypto Miners: Crypto miners are a novel family of malware. This malware is employed by cybercriminals to mine digital currencies such as Bitcoin and the like in the background. The computing power of the infected system is used for this without the user’s knowledge, of course. Crypto miners hide themselves, for instance, as scripts on websites, where they are smuggled in by cybercriminals via security vulnerabilities. The mined coins end up in the attackers’ digital crypto wallets. In some cases, crypto miners are also used quite legally, to monetize websites for example. However, the site operator must clearly inform visitors of the use of such tools.

5.Scareware: Scareware is a generic term for malware that uses uncertainty and fear to induce the user to install software. The term is derived from the word “scare.” In most cases, this is additional malware or purportedly protective software that, in reality, has no value whatsoever yet can cost all the much more. Scareware is mainly found on questionable online platforms and is primarily aimed at inexperienced users. In a typical scareware scam, you might see an alarming message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!” Cybercriminals use these programs and unethical advertising practices to frighten users into purchasing rogue applications.

6.Backdoor: A backdoor is a deliberately hidden vulnerability in the program code that allows privy users to circumvent typical protection mechanisms, such as authentication using login credentials. These digital backdoors are often hidden in programs by intelligence services in order to gain easy access to sensitive information. For example, Cisco network routers, which process large volumes of global internet traffic, were in the past provided with backdoors for the US Secret Service.

7.Rootkit: A rootkit is a clandestine computer program designed to provide continued privileged access to a computer while actively hiding its presence. The term rootkit is a connection of the two words “root” and “kit.” Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network. Root refers to the admin account on Unix and Linux systems, and kit refers to the software components that implement the tool. Today rootkits are generally associated with malware such as Trojans, worms, viruses that conceal their existence and actions from users and other system processes. A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
Pretty mind-catching right. When I first got to know about it I was like, Why didn’t I know this earlier. I felt so naïve & pinching salt on the wound I found out when my distance uncle son #mamajikiladka corrected me on this because he had read it on a new social-knowledge platform naming Local Eyes #desiAccurateQuora to be precise. Later on, I also joined it & tbh it helped a lot, including solving queries writing this article.

Source: — Local Eyes Community & Jeevesh Tech Tips with a bit of Google Pinch.

Author:- Jeevesh Kishore Sharma
linkedin.com/in/jeeveshkishoresharma

Interested to be a part of something desi & specifically curated for the Indian Janta with precise query resolution. Join desi Quora now.
Sorry, I mean join Local Eyes Community Now!!
Happy Querying!!

--

--

Jeevesh Kishore Sharma
0 Followers

Tech enthusiast with tech consultancy experience and practical expertise in assembling & troubleshooting computer hardware. Wanderlust and a voracious learner.