{"id":2616,"date":"2018-09-11T11:27:48","date_gmt":"2018-09-11T16:27:48","guid":{"rendered":"https:\/\/www.stratospherenetworks.com\/blog\/?p=2616"},"modified":"2018-09-11T11:27:48","modified_gmt":"2018-09-11T16:27:48","slug":"common-types-of-malware-explained","status":"publish","type":"post","link":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/","title":{"rendered":"5 Common Types of Malware Explained"},"content":{"rendered":"<p><a href=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack.jpg\"><img decoding=\"async\" class=\"alignleft size-medium wp-image-1991\" src=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-300x225.jpg\" alt=\"cybersecurity attack\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-300x225.jpg 300w, https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2016\/09\/Security-breach-attack-1024x768.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>Malware \u2013 or malicious software \u2013 is one of the leading causes of data breaches, according to Verizon\u2019s <a href=\"https:\/\/www.verizonenterprise.com\/resources\/reports\/rp_DBIR_2018_Report_execsummary_en_xg.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">2018 Data Breach Investigations Report<\/a>. Cybercriminals leverage these nefarious programs to infiltrate computers and other devices and gain access to sensitive data.<\/p>\n<p>There are lots of different types of malware out there, including scripts, active web content, and executable code, according to <a href=\"https:\/\/www.comodo.com\/ctrlquarterlyreport\/2017summary\/Comodo_2017Report.pdf\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">Comdo Threat Research Labs<\/a>. On top of that, the malware landscape is dynamic and ever-evolving, with new variants emerging every day.<\/p>\n<p>Still, many malicious programs fall into certain categories. Just like knowing about <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/5-types-of-hackers-businesses-should-know-about\/\" target=\"_blank\" rel=\"noopener\">common types of hackers<\/a> can help as you take steps to <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">proactively protect your business<\/a> from cybersecurity threats, understanding the typical types of malware you\u2019re likely to encounter can give you a leg up in safeguarding your data.<\/p>\n<p>This isn\u2019t an exhaustive list, but here\u2019s what you should know about five common types of malware that might attack your IT network.<\/p>\n<p><strong>1. Ransomware: <\/strong>This has become one of the leading IT security threats worldwide in the past few years. Cybercriminals <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/get-hit-ransomware\/\" target=\"_blank\" rel=\"noopener\">use ransomware<\/a> to encrypt their victim\u2019s files and then demand payment in exchange for the decryption key.<\/p>\n<p>It\u2019s had a major impact on organizations across all industries around the globe: In 2017, for example, the WannaCry ransomware incident resulted in tens of thousands of infections in more than 150 countries, according to the <a href=\"https:\/\/www.us-cert.gov\/ncas\/alerts\/TA17-132A\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">United States Computer Emergency Readiness Team<\/a>. Your best bet to defend against this type of malware is keeping your anti-virus solution updated, implementing a next-gen firewall, and <a href=\"https:\/\/www.stratospherenetworks.com\/backup-and-disaster-recovery.html\" target=\"_blank\" rel=\"noopener\">backing up your data<\/a>.<br \/>\n<strong><br \/>\n2. Trojans: <\/strong>This variety of malware gets its name from the wooden horse the Greeks used to sneak their soldiers into the city of Troy in Greek mythology. Just like the Greeks\u2019 horse, Trojans look like legitimate programs (e.g., free anti-virus programs), but they\u2019re smuggling malicious code, according to the CSO article \u201c<a href=\"https:\/\/www.csoonline.com\/article\/2615925\/security\/security-your-quick-guide-to-malware-types.html\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">8 types of malware and how to recognize them<\/a>.\u201d<\/p>\n<p>Users have to execute a Trojan for it to complete its malicious mission, and this type of malware typically comes in attached to an email or via an infected web page. Although anti-virus programs and firewalls can help, Trojans are difficult to defend against since literally millions of new types emerge every month, CSO states.\u00a0\u00a0\u00a0\u00a0 <strong><\/p>\n<p>3. Viruses: <\/strong>A computer virus is a contagious bit of code that can infect a device and then spread from file to file (and to other devices when files are shared), according to the TechAdvisory.org article \u201c<a href=\"https:\/\/www.techadvisory.org\/2015\/07\/4-different-types-of-malware-explained\/\" target=\"_blank\" rel=\"noopener nofollow\" class=\"external external_icon\">4 different types of malware: explained<\/a>.\u201d<\/p>\n<p>The best way to defend against these is an up-to-date anti-virus solution. Users can also avoid getting infected by not clicking on any suspicious executable (\u201cexe\u201d) files they receive. \u00a0\u00a0<strong><\/p>\n<p>4. Worms: <\/strong>Like viruses, worms infect devices and then spread across systems and networks, TechAdvisory.org states. However, they don\u2019t need a user to execute anything to infest because they can self-replicate. To avoid getting worms, ensure your anti-virus and firewall are up-to-date.\u00a0 \u00a0\u00a0<strong><\/p>\n<p>5. Spyware: <\/strong>Rather than cybercriminals looking to demand a ransom or get their hands on sensitive data, spyware is often installed by people who want to monitor the activities of someone they know, according to CSO. However, hackers still might use it in certain cases to log keystrokes and get passwords. To stop it, you\u2019ll need to find the executable and stop it.<\/p>\n<p>Ultimately, the malware landscape changes rapidly, and it\u2019s hard for anyone to keep up with all the different types of malicious programs that continue to pop up. Taking proactive steps to <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/12-steps-to-make-infrastructure-secure-performing-security-audit\/\" target=\"_blank\" rel=\"noopener\">defend your IT infrastructure<\/a> against malware and hackers is crucial for any business these days.<\/p>\n<p>If you\u2019d like to learn more about how to effectively defend your organization against cybersecurity threats, contact our team of <a href=\"https:\/\/www.stratospherenetworks.com\/managed-cybersecurity-solutions.html\" target=\"_blank\" rel=\"noopener\">IT security experts<\/a> today by calling 877-599-3999 or emailing <a href=\"mailto:sales@stratospherenetworks.com\" target=\"_blank\" rel=\"noopener\">sales@stratospherenetworks.com<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware \u2013 or malicious software \u2013 is one of the leading causes of data breaches, according to Verizon\u2019s 2018 Data Breach Investigations Report. Cybercriminals leverage these nefarious programs to infiltrate computers and other devices and gain access to sensitive data. &hellip; <a href=\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\">Read more <span class=\"meta-nav\">><\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":3391,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[261],"tags":[],"class_list":["post-2616","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips-from-the-president"],"yoast_head":"<title>5 Common Types of Malware Explained | Chicago IT Support<\/title>\n<meta name=\"description\" content=\"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Common Types of Malware Explained | Chicago IT Support\" \/>\n<meta property=\"og:description\" content=\"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\" \/>\n<meta property=\"og:site_name\" content=\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-11T16:27:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"dsparks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"dsparks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\"},\"author\":{\"name\":\"dsparks\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"headline\":\"5 Common Types of Malware Explained\",\"datePublished\":\"2018-09-11T16:27:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\"},\"wordCount\":635,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"articleSection\":[\"Tech Tips from the President\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\",\"name\":\"5 Common Types of Malware Explained | Chicago IT Support\",\"isPartOf\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"datePublished\":\"2018-09-11T16:27:48+00:00\",\"author\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\"},\"description\":\"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"contentUrl\":\"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png\",\"width\":1024,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.stratospherenetworks.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Common Types of Malware Explained\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#website\",\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/\",\"name\":\"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support\",\"description\":\"The Stratosphere Networks IT Support blog offering IT Support Services information.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c\",\"name\":\"dsparks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g\",\"caption\":\"dsparks\"},\"url\":\"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/\"}]}<\/script>","yoast_head_json":{"title":"5 Common Types of Malware Explained | Chicago IT Support","description":"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/","og_locale":"en_US","og_type":"article","og_title":"5 Common Types of Malware Explained | Chicago IT Support","og_description":"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.","og_url":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/","og_site_name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","article_published_time":"2018-09-11T16:27:48+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","type":"image\/png"}],"author":"dsparks","twitter_card":"summary_large_image","twitter_misc":{"Written by":"dsparks","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#article","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/"},"author":{"name":"dsparks","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"headline":"5 Common Types of Malware Explained","datePublished":"2018-09-11T16:27:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/"},"wordCount":635,"commentCount":0,"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","articleSection":["Tech Tips from the President"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/","url":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/","name":"5 Common Types of Malware Explained | Chicago IT Support","isPartOf":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","datePublished":"2018-09-11T16:27:48+00:00","author":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c"},"description":"For businesses looking to safeguard their data, here are five common types of malware to watch out for and how to defend sensitive information against them.","breadcrumb":{"@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#primaryimage","url":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","contentUrl":"https:\/\/www.stratospherenetworks.com\/blog\/wp-content\/uploads\/2020\/01\/One-color-globe.png","width":1024,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/www.stratospherenetworks.com\/blog\/common-types-of-malware-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stratospherenetworks.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Common Types of Malware Explained"}]},{"@type":"WebSite","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#website","url":"https:\/\/www.stratospherenetworks.com\/blog\/","name":"Stratosphere Networks IT Support Blog - Chicago IT Support Technical Support","description":"The Stratosphere Networks IT Support blog offering IT Support Services information.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stratospherenetworks.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/610effe029357cf39739d82d57e3b03c","name":"dsparks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.stratospherenetworks.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b07d2c6f91fabde958f3d699e6916d89ce9b9f2b23ebf9b18d8adb5aed7e14b?s=96&d=mm&r=g","caption":"dsparks"},"url":"https:\/\/www.stratospherenetworks.com\/blog\/author\/dsparks\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2616","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2616"}],"version-history":[{"count":2,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions"}],"predecessor-version":[{"id":2618,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2616\/revisions\/2618"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media\/3391"}],"wp:attachment":[{"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2616"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2616"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stratospherenetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2616"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}