LogiCL |
---|
Services Informatiques |
LogiCL IT Services
Malicious Softwares
Malware (malicious software)
Malware, short for malicious (or malevolent) software, is software used or programmed by
attackers to disrupt computer operation, gather sensitive information, or gain access to private
computer systems. It can appear in the form of code, scripts, active content, and other software.
'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software.
Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers,
dialers, spyware, adware, malicious BHOs, rogue security software and other malicious
programs; the majority of active malware threats are usually worms or trojans rather than
viruses. In law, malware is sometimes known as a computer contaminant, as in the legal codes
of several U.S. states. Malware is different from defective software, which is a legitimate
software but contains harmful bugs that were not corrected before release. However, some
malware is disguised as genuine software, and may come from an official company website in
the form of a useful or attractive program which has the harmful malware embedded in it along
with additional tracking software that gathers marketing statistics.
Software such as anti-virus, anti-malware, and firewalls are relied upon by users at home, small
and large organisations around the globe to safeguard against malware attacks which helps in
identifying and preventing the further spread of malware in the network.
Purposes
Many early infectious programs, including the first Internet Worm, were written as experiments or
pranks. Today, malware is used primarily to steal sensitive information of personal, financial, or
business importance by black hat hackers with harmful intentions.
Malware is sometimes used broadly against government or corporate websites to gather
guarded information, or to disrupt their operation in general. However, malware is often used
against individuals to gain personal information such as social security numbers, bank or credit
card numbers, and so on. Left unguarded, personal and networked computers can be at
considerable risk against these threats. (These are most frequently counter-acted by various
types of firewalls, anti-virus software, and network hardware).
Since the rise of widespread broadband Internet access, malicious software has more frequently
been designed for profit. Since 2003, the majority of widespread viruses and worms have been
designed to take control of users' computers for black-market exploitation.[7] Infected "zombie
computers" are used to send email spam, to host contraband data such as child pornography, or
to engage in distributed denial-of-service attacks as a form of extortion.
Another strictly for-profit category of malware has emerged, called spyware. These programs are
designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate
marketing revenues to the spyware creator. Spyware programs do not spread like viruses;
instead they are generally installed by exploiting security holes. They can also be packaged
together with user-installed software, such as peer-to-peer applications.
Proliferation
Preliminary results from Symantec published in 2008 suggested that "the release rate of
malicious code and other unwanted programs may be exceeding that of legitimate software
applications." According to F-Secure, "As much malware [was] produced in 2007 as in the
previous 20 years altogether." Malware's most common pathway from criminals to users is
through the Internet: primarily by e-mail and the World Wide Web.
The prevalence of malware as a vehicle for Internet crime, along with the challenge of anti-
malware software to keep up with the continuous stream of new malware, has seen the adoption
of a new mindset for individuals and businesses using the Internet. With the amount of malware
currently being distributed, some percentage of computers will always be infected. For
businesses, especially those that sell mainly over the Internet, this means they need to find a
way to operate despite security concerns. The result is a greater emphasis on back-office
protection designed to protect against advanced malware operating on customers' computers. A
2013 Webroot study shows that 64% of companies allow remote access to servers for 25% to
100% of their workforce and that companies with more than 25% of their employees accessing
servers remotely have higher rates of malware threats.
On March 29, 2010, Symantec Corporation named Shaoxing, China, as the world's malware
capital. A 2011 study from the University of California, Berkeley, and the Madrid Institute for
Advanced Studies published an article in Software Development Technologies, examining how
entrepreneurial hackers are helping enable the spread of malware by offering access to
computers for a price. Microsoft reported in May 2011 that one in every 14 downloads from the
Internet may now contain malware code. Social media, and Facebook in particular, are seeing a
rise in the number of tactics used to spread malware to computers.
Security defects in software
Malware exploits security defects (security bugs, or vulnerabilities) in the design of the operating
system, in applications (such as browsers—avoid using Internet Explorer 8 or earlier, e.g. on
Windows XP), or in (old versions of) browser plugins such as Adobe Flash Player, Adobe
Acrobat / Reader, or Java (see Java SE critical security issues). Sometimes even installing new
versions of such plugins does not automatically uninstall old versions. Security advisories from
such companies announce security-related updates. Common vulnerabilities are assigned CVE
IDs and listed in the US National Vulnerability Database. Secunia PSI is an example of software,
free for personal use, that will check a PC for vulnerable out-of-date software, and attempt to
update it.
From Wikipedia, the free encyclopedia.