How Do I Get Infected By Malware?

Summarise on:
Charu Pel

Charu Pel

6 min Read

Malware/Ransomware - How Do I Get Infected By Malware?

e-InnoSec team recently completed a 6-part series that guides organizations with leveraging GDPR preparation for CCPA. Here are the links for that series.

Part III - https://www.linkedin.com/posts/charupel_how-do-i-leverage-my-gdpr-preparation-for-activity-6561593578160738304-VCkz/

Part IV - https://www.linkedin.com/posts/charupel_how-do-i-leverage-my-gdpr-preparation-for-activity-6564159152740974592-EKL9/

Part V - https://www.linkedin.com/posts/charupel_monday-morning-cybersecurity-activity-6566860154967474176-68PZ/

Part VI - https://www.linkedin.com/posts/charupel_how-do-i-leverage-gdpr-preparation-for-ccpa-activity-6569448892113444864-RWk_/

We wish to address the problem faced by small organizations because of Malware/Ransomware.

We will briefly address the do's and don'ts for organizations to follow. We will also break down malware in four parts.

  • Part I - How do I get malware? (this post).
  • Part II - Different types of malware Read Part II.
  • Part III - How can I tell if I have a malware infection? Read Part III.
  • Part IV - How to protect against malware? Read Part IV.

What is malware?

Malware, or malicious software, is an umbrella term that describes any malicious program, code, or software written with the intent of damaging devices, stealing data, and generally causing a mess.

What is ransomware?

Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Ransomware typically spreads through phishing emails or by unknowingly visiting an infected website. Ransomware can be devastating to individuals and organizations. This kind of malware typically locks down your computer and files and threatens to erase everything unless you pay a ransom.

What are brief examples of ransomware?

  • Cryptolocker - Known for encrypting users' files and requiring payment to open them.
  • Locker Ransomware - Similar to a crypto locker; if a crypto locker encrypts files, locker ransomware locks files to deny access and demands a ransom to restore access.
  • Bad Rabbit - Encrypts not only files but also the computer's hard disk and can prevent Windows from booting normally.
  • Zcryptor - A self-replicating malware that infects computers and USB drives, spreading through spam or deceptive software installers.
  • Jigsaw - Encrypts files first and can delete them after an hour if the user fails to pay ransom.
  • Petya - Can destroy the operating system by overwriting original data and infecting the entire computer system.

How do I get malware?

The next question is How do I get malware?

AreaDetails
PeopleMalware attacks would not work without the most important ingredient: you; willing to open an email attachment you do not recognize, or click and install something from an untrustworthy source.
Internet and EmailThe internet and email are the two most common ways malware accesses systems.
InternetAny time you are connected to the internet there is risk of malware infection. Any time you download information from the internet there is chance of malware infection in the absence of anti-malware software.
WebsitesPlaying game demos, downloading infected music files, browsing hacked websites, installing toolbars from unfamiliar providers, or opening malicious email attachments can cause malware to penetrate systems.
Install or Download ProgramMalicious apps can hide in seemingly legitimate applications, especially when downloaded from websites or messages instead of a secure app store.
Permission to Access DataCheck warning messages when installing applications, especially if they request permission to access email or other personal information.
Third-Party AppsInstalling mobile apps from unknown third parties is risky. A trusted source is downloading apps directly from vendors.
Free OffersBad actors throw tainted bait with offers for internet accelerators, new download managers, disk cleaners, or alternative web search tools.
Extra ComponentExtra software, also known as a potentially unwanted program (PUP), is often presented as necessary, but often is not.
Social EngineeringUse of social engineering to trick users into clicking, installing software, or opting into fake free offers.
Malicious WebsitesEven visiting a malicious website and viewing an infected page or banner ad can result in a drive-by malware download.

GRC Insights That Matter

Exclusive updates on governance, risk, compliance, privacy, and audits — straight from industry experts.

Related Resources

Related Posts

Malware/Ransomware - Different Types of Malware Part II
Cybersecurity
Malware/Ransomware - Different Types of Malware Part II

Part II of the Malware/Ransomware series: different malware types and initial infection vectors (IIV) to help teams recognize how attacks spread.

Read More
Malware/Ransomware - How Can I Tell If I Have A Malware Infection? Part III
Cybersecurity
Malware/Ransomware - How Can I Tell If I Have A Malware Infection? Part III

Part III of the Malware/Ransomware series: how to detect likely malware infection early and the telltale signs to watch for across performance, pop-ups, crashes, disk usage, and network behavior.

Read More
Malware/Ransomware - How To Protect Against Malware Part IV
Cybersecurity
Malware/Ransomware - How To Protect Against Malware Part IV

Part IV of the Malware/Ransomware series: practical anti-malware controls and business-focused steps to reduce ransomware and malware risk.

Read More
background-line