WHAT IS MALWARE, HOW IT WORKS, HAZARDS TO COMPUTERS AND HOW TO OVERCOME IT

In the world of computers, there are many terms about program interference due to viruses, infected programs and others.

One of those annoyances is malware. Malware can infiltrate via email, internet downloads to infected programs. So if you’re not careful, you could accidentally introduce malware into your computer while surfing the internet.

Malware or Malicious Software is a program designed with the intention of causing damage by infiltrating computer systems. So if the computer has been infected with malware then many things will happen. For example the theft of important data that is detrimental and the like.

Dangers and Losses Due to Malware

At first glance, you can already imagine what the dangers of malware for computers. And what you need to know, malware attacks not only computers but also websites. The following are the dangers and losses that malware can cause.

  • Causes damage to the computer system. The computer can be slow because it has been inserted by a virus to damage the system.
  • It also allows theft of data / information. This can be very detrimental because malware can steal users’ personal information.
  • Theft of any data and information on the website.
  • Making a website down
  • Consumes memory capacity and internet quota.

How Malware Works

The thing that generally happens to cause malware is downloading software from illegal places where malware is inserted.

This malware includes viruses, worms, trojan horses, most rootkits, spyware, dishonest adware, and other software that is harmful and unwanted by PC users.

Websites can be infected with malware if users download website themes illegally, it can cause data and information on the website to collapse, sometimes it can also cause the website server to go down due to suspicious activities.

Worse, malware is not only in the form of programs, malware can also be in the form of code/scripts. So Malware includes various programs and scripts that are suspected of being able to damage computer systems and various important information contained in them.

So in short, this malware can enter existing computer systems through various applications that have been installed or it could be through sending data from gadgets that have been exposed to viruses.

Malware is usually created with the aim of damaging software and operating systems through unknown code/scripts. So the party who created the malware inserts the malware hidden by the party who created it.

Overcoming Malware

The simplest way to get rid of malware is to install an antivirus that can work against malware. So an antivirus that is just to prevent viruses is not enough, you also have to install its anti-malware.

Because malware is a group that contains various programs that are harmful to existing computer systems. While the virus is part of Malware.

Malware Type

1. Virus

Virus is a program that is inserted to damage the system performance of another program. Virus is a malware that has the ability to manipulate data, infect, damage, and change existing programs.

Viruses can also reproduce by inserting a copy program and then becoming part of another program on the computer.

How Virus Works and Spreads through executable files such as .exe, .com, .vbs. In this way the virus will be active after the user starts running a program that has been infected before. So this type of virus will not appear if the program is not run.

2. Worm

Besides viruses, other malware is worms. Worm is a program that can reproduce itself and spread on computer networks through open security holes.

The way a worm works is similar to a virus, the difference is that the virus still depends on a program while the worm does not. Worm is a program that stands alone and does not depend on a program such as a virus to be a nest for its spread.

Even worms are able to infect and destroy various files on a computer system better than viruses. Worms spread by utilizing existing networks.

The way the worm will take advantage of various network security gaps that are open in the operating system. After entering the system, the worm will start transferring files and various data in the system. Finally, the system allows the worm to infect various data independently.

If the worm has infected the network then your data can be stolen, access to the antivirus cannot be done, security features in the system will turn off, the infected system will be useless, consuming available bandwidth.

Not only that, with its ability to reproduce quickly can result in computer memory running out. After that your computer can be slow and crash.

3. Trojan Horses

The next malware is a trojan. A Trojan is a computer program that can go undetected and manipulate like a good program to use, when in fact it is not at all. Trojans are usually used to obtain information and control it.

The distinctive feature of Trojans is that they are able to be controlled via other computers, trojans are also able to manipulate so that it seems like a good and legal program, Trojans cannot reproduce themselves but spread via email and download files from the internet.

4. Keylogger

Keylogger is a program that aims to record all activities when you press a button on the keyboard. 

Actually a keylogger can have benefits depending on who is going to use it. For example, if used properly, a keylogger can monitor employee work activities, monitor student activities in learning. However, if used for bad purposes, keyloggers can be misused to steal passwords and PINs which can be detrimental.

5. Adware

Adware is advertising software that is inserted secretly by the attacker. Adware has the ability to play and display advertisements automatically and is unknown to the user. Adware is often in the form of pop up ads on a site.

6. Dialer

There is also malware in the form of a dialer. Dialer is a program developed to direct telephone connections to the internet. A computer that has been infected with a dialer can force it to connect to the internet even though it is not doing internet activity. You can imagine the losses that occur due to this malware right. The intention to save quota has actually run out due to malware.

7. Wabbit

Another malware called wabbit. The way it works is almost similar to a worm.

In its action Wabbit does not even require a connection to the network because it can work through the local network system. The danger that Wabbit can do is with its ability to duplicate itself to make the hard drive full and the computer will be slow and hang.

8. BOTS

BOTS is a robot that is able to interact with existing network services. The use of BOTS can have both good and bad effects depending on the person who develops it.

But if developed for bad things, BOTS can work like a worm that is capable of self-replicating and then infecting computers.

9. Browser Hijacker

Browser Hijacker is a malware that can modify and add functionality to the Internet Explorer browser. So that it can redirect to certain sites when you use Internet Explorer.

10. Spyware

Spywarw works by spying on computer users and then sending information to other parties. Existing information can be monitored confidentially by others and not known by the victim.

11. Backdoor

Backdoor or in Indonesian backdoor is a type of malware that is able to bypass the login process in a hidden and undetected way. Backdoors take advantage of loopholes and are often inserted via Trojans or Worms.

12. Rootkits & Exploits

Exploits are software designed to attack security vulnerabilities. Exploits are usually used by a researcher to demonstrate that a system has loopholes.

While the Rootkit itself does not attack the system directly. Rootkits are inserted into a computer after the computer is able to be taken over by an attacker. The goal is that they are able to erase the traces of the attack.

Not infrequently Rootkit contains a Backdoor malware, so attackers can attack the computer system again at another time.

Rootkits are difficult to detect, you can use the following software to find out if there is a rootkit or not. Such software includes RKHunter, Rootkit Detector Kit, or ChRootkit.