SlideShare a Scribd company logo
Mischievous Malware
Malware
Unfortunately, malware is not a foreign term, in
fact it’s pretty well known to anyone that uses a
computer. There are several types of malware, as
well as mediums in which you may receive it. So,
before you click on that link for the free cruise you
won, think about all of the personal data you
could be giving away.
Typesof
Malware
 First, let’s take a quick tour of the types of malware you may
run into.
 Viruses: These act very similar to the flu virus. Once it gets
into a computer, it propagates by copying itself and becoming
part of another program. Then just like the flu at an
elementary school, it spreads from computer to computer.
 However, a virus must be activated, by opening or running
the file. Viruses also include worms and trojans.
 Spyware: This form of malware works just as its name
intends. It is a software that usually piggybacks on
legitimate downloads. Once it is in your computer, it spies on
the information you key in and sends it to a website. The
first sign of spyware usually is a slow computer since it takes
up many resources to run.
Typesof
Malware
 Adware: We all know this one all too well. Those pesky
pop-ups telling you your computer is infected or that
you won money. These also piggyback on other
applications or downloads, such as free computer
wallpaper, widgets or toolbars.
 Adware is kind of tricky, inherently it isn’t dangerous
to your computer, although annoying, but not
dangerous. However, once clicked on you’ve basically
opened the floodgates.
Types of
Malware
 Ransomware: With the popularity of cryptocurrency, ransomware
has become more and more abundant. Often, this type of
malware won’t damage your computer… right away. Instead it
locks it and holds it hostage.
 The hacker asks for a ransom and will provide a key only if and
the ransom has been paid. If not, the hacker will usually wipe
your device of all of its data.
 Botware: This is another malware beginning to gain popularity
due to the cryptocurrency gold rush. Botware ultimately turns
your computer into a zombie by flooding it with denial-of-service
attacks. It helps hide anything going on below the surface.
 A surprising symptom of botware is a higher electric bill. Your
computer’s CPU will be running constantly and the fan will run
for longer than usual.
Malvertising
Now that you are a bit more familiar with the mischievous
malware that could corrupt your devices, it’s time to delve into a
lesser known malware scam known as malvertising.
This has been gaining headway on Google, so much so, they
created an individual landing page asking consumers to report
malvertising and explaining how to combat it. The way this
works is that cybercriminals utilize several types of display
advertisements to distribute malware. A few ways you’d see
malvertising is through auto-redirecting ads that will take you
to a phishing page, click bait and malicious code hidden within
an ad.
Malvertising
 Sadly, cybercriminals usually use legitimate ad networks
because of the high volume of ads they distribute. It makes
it incredibly easy for them to throw a code into an ad
without the advertiser having the slightest clue.
 The worst malvertising connects users’ computers to an
exploit kit that runs analysis on the defending computer,
looking for vulnerabilities and exploiting them. From there,
attackers can install malware, ransomware or gain full
access to the computer and sensitive information.
Sometimes Google may even flag your website for hosting
malware, which will affect how you show up in search
results.
What You
Can Do
Like most other malware situations, the best way to
keep it from ruining your device or even your life, is to
keep everything up to date. It is important to ensure
any scripts ads may be running on are current. This
includes programs like Java, Flash and Microsoft
Silverlight. Ad networks are working hard to stay
above the curve, but it is your responsibility to help
with that.
WhatYouCan
Do
 Be sure to report any suspicious ads to Google. If the
ad’s script contains suspicious code, including
encrypted code, it should be treated with suspicion.
Remove the ad from your website and report it to your
ad network.
 Also, there are many ad verification websites that help
back check ads for suspicious code. The bottom line
with any mischievous malware is to keep your eyes
open and report foul play.
Security
Awareness
Training and
Educating
Your Team
There are a number of managed security solutions that
will stop a malware attack before it can occur. Your
team members are actually your greatest threat. A
security awareness training solution will keep your
team educated through real-life email experiences.
SecurityAwarenessTrainingandEducatingYourTeam
This kind of solution phish tests your employees. This involves sending them fake
phishing emails as a test. If a team member ends up clicking on mock malicious link
they will be redirected to a customized educational page. This will explain why they
failed the phish test so they don’t do so in the future.
They will also continue to be phish tested until they pass. This way your team will have
an awareness of what a malicious email looks like.
If you’d like more information about managed security,
malware and how you can protect your business, contact
The TNS Group today.

More Related Content

PPTX
Managed Services: Turning Pandemic Into Profitable Protection
PPTX
Threat Detection and Response Solutions
PPTX
Managed Security: How Secure Are You During COVID?
PPTX
Endpoint Security Solutions
PPTX
5 Signs Your End-Users Need a Security Boost
PPTX
FINTECH: Industries we Serve
PPTX
Construction: Protect Your Assets From Ground-Breaking Threats
PPTX
Perimeter Protection Solutions
Managed Services: Turning Pandemic Into Profitable Protection
Threat Detection and Response Solutions
Managed Security: How Secure Are You During COVID?
Endpoint Security Solutions
5 Signs Your End-Users Need a Security Boost
FINTECH: Industries we Serve
Construction: Protect Your Assets From Ground-Breaking Threats
Perimeter Protection Solutions

What's hot (20)

PPTX
Distribution: Industries we Serve
PPTX
Compliance is a Team Project
PPTX
IT Consultng
PPTX
Managed Security Solutions
PPTX
Media: Industries we Serve
PPTX
Infrastructure and Desktop Support
PDF
Top 10 Cybersecurity Tips of 2022
PPTX
IT Services Solutions
PPTX
Data Security: Are you Protected?
PPTX
Distribution Industry: What is Ransomware and How Does it Work?
PDF
10 best cybersecurity companies in healthcare for 2021
PPTX
Ransomware: Can you protect against attacks?
PDF
VerusGuard Multiauthentication 1.0
PPTX
Cyber Ethics: Cyber Security Services | VAPT and WAPT
PDF
2016 CYBERSECURITY PLAYBOOK
PDF
What is threat intelligence ?
PDF
Digital Shadows and the NIST Cyber Security Framework
PPTX
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
PPTX
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
PDF
Digital Shadows SearchLight™ Overview
Distribution: Industries we Serve
Compliance is a Team Project
IT Consultng
Managed Security Solutions
Media: Industries we Serve
Infrastructure and Desktop Support
Top 10 Cybersecurity Tips of 2022
IT Services Solutions
Data Security: Are you Protected?
Distribution Industry: What is Ransomware and How Does it Work?
10 best cybersecurity companies in healthcare for 2021
Ransomware: Can you protect against attacks?
VerusGuard Multiauthentication 1.0
Cyber Ethics: Cyber Security Services | VAPT and WAPT
2016 CYBERSECURITY PLAYBOOK
What is threat intelligence ?
Digital Shadows and the NIST Cyber Security Framework
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
Webinar: Ransomware Checklist – Are You Ready For Ransomware’s Next Wave?
Digital Shadows SearchLight™ Overview
Ad

Similar to Mischievous Malware (20)

PDF
Malware and malicious programs
PDF
Malware Infections
PPT
S P Y W A R E4 S I K
DOC
Web design premium
PDF
Know More About Malvertising!
PPSX
Security Awareness Training
PPT
Viruses and Spyware
PPTX
IT viruses
PPT
How Computer Viruses Work
PPTX
Malvertisement the covert advert
PPTX
2nd Class PPT.pptx
PDF
What is malware
PPT
Spyware Adware1
PDF
Know More about Your Enemies
PDF
What is ransomware?
PPTX
Major Computer Virus Types to Watch Out
PPTX
Malware
PPTX
MALWARE AND ITS TYPES
PPT
Cyber-Security-CIT good for 1st year engineering students
PPTX
Spyware-A online threat to privacy
Malware and malicious programs
Malware Infections
S P Y W A R E4 S I K
Web design premium
Know More About Malvertising!
Security Awareness Training
Viruses and Spyware
IT viruses
How Computer Viruses Work
Malvertisement the covert advert
2nd Class PPT.pptx
What is malware
Spyware Adware1
Know More about Your Enemies
What is ransomware?
Major Computer Virus Types to Watch Out
Malware
MALWARE AND ITS TYPES
Cyber-Security-CIT good for 1st year engineering students
Spyware-A online threat to privacy
Ad

More from The TNS Group (19)

PDF
Your Phone System Remains Important for Business—Here’s Why.pdf
PDF
How to Interview Your Prospective IT Provider.pdf
PDF
6 Indicators That Your Current IT Solution Needs an Overhaul
PDF
Holiday Cybersecurity Tips
PPTX
Benefits of an MSP: Increased Profitability
PPTX
Cybersecurity and the Shipping Industry
PPTX
Top Tech Trends of 2020
PPTX
How Office 365 can Save Thanksgiving
PPTX
Distribution Industry: Hardware Infrastructure Upgrades
PPTX
Healthcare Industry: Updates and Upgrades
PPTX
Business Continuity Planning
PPTX
Cloud Security
PPTX
Cloud Managed Services: Cloud Infrastructure
PPTX
Maritime Shipping: Industries we Serve
PPTX
Professional Services: Industries we Serve
PPTX
Non-Profit Organizations: Industries we Serve
PPTX
Healthcare: Industries we Serve
PPTX
Education: Industries we Serve
PPTX
Disaster Recovery: What Could Happen Without a Plan
Your Phone System Remains Important for Business—Here’s Why.pdf
How to Interview Your Prospective IT Provider.pdf
6 Indicators That Your Current IT Solution Needs an Overhaul
Holiday Cybersecurity Tips
Benefits of an MSP: Increased Profitability
Cybersecurity and the Shipping Industry
Top Tech Trends of 2020
How Office 365 can Save Thanksgiving
Distribution Industry: Hardware Infrastructure Upgrades
Healthcare Industry: Updates and Upgrades
Business Continuity Planning
Cloud Security
Cloud Managed Services: Cloud Infrastructure
Maritime Shipping: Industries we Serve
Professional Services: Industries we Serve
Non-Profit Organizations: Industries we Serve
Healthcare: Industries we Serve
Education: Industries we Serve
Disaster Recovery: What Could Happen Without a Plan

Recently uploaded (20)

PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
project resource management chapter-09.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Encapsulation theory and applications.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PDF
Mushroom cultivation and it's methods.pdf
PDF
August Patch Tuesday
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Approach and Philosophy of On baking technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MIND Revenue Release Quarter 2 2025 Press Release
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
project resource management chapter-09.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
1 - Historical Antecedents, Social Consideration.pdf
OMC Textile Division Presentation 2021.pptx
Digital-Transformation-Roadmap-for-Companies.pptx
Chapter 5: Probability Theory and Statistics
Encapsulation theory and applications.pdf
A comparative analysis of optical character recognition models for extracting...
Mushroom cultivation and it's methods.pdf
August Patch Tuesday
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
A novel scalable deep ensemble learning framework for big data classification...
Web App vs Mobile App What Should You Build First.pdf
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Approach and Philosophy of On baking technology

Mischievous Malware

  • 2. Malware Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away.
  • 3. Typesof Malware  First, let’s take a quick tour of the types of malware you may run into.  Viruses: These act very similar to the flu virus. Once it gets into a computer, it propagates by copying itself and becoming part of another program. Then just like the flu at an elementary school, it spreads from computer to computer.  However, a virus must be activated, by opening or running the file. Viruses also include worms and trojans.  Spyware: This form of malware works just as its name intends. It is a software that usually piggybacks on legitimate downloads. Once it is in your computer, it spies on the information you key in and sends it to a website. The first sign of spyware usually is a slow computer since it takes up many resources to run.
  • 4. Typesof Malware  Adware: We all know this one all too well. Those pesky pop-ups telling you your computer is infected or that you won money. These also piggyback on other applications or downloads, such as free computer wallpaper, widgets or toolbars.  Adware is kind of tricky, inherently it isn’t dangerous to your computer, although annoying, but not dangerous. However, once clicked on you’ve basically opened the floodgates.
  • 5. Types of Malware  Ransomware: With the popularity of cryptocurrency, ransomware has become more and more abundant. Often, this type of malware won’t damage your computer… right away. Instead it locks it and holds it hostage.  The hacker asks for a ransom and will provide a key only if and the ransom has been paid. If not, the hacker will usually wipe your device of all of its data.  Botware: This is another malware beginning to gain popularity due to the cryptocurrency gold rush. Botware ultimately turns your computer into a zombie by flooding it with denial-of-service attacks. It helps hide anything going on below the surface.  A surprising symptom of botware is a higher electric bill. Your computer’s CPU will be running constantly and the fan will run for longer than usual.
  • 6. Malvertising Now that you are a bit more familiar with the mischievous malware that could corrupt your devices, it’s time to delve into a lesser known malware scam known as malvertising. This has been gaining headway on Google, so much so, they created an individual landing page asking consumers to report malvertising and explaining how to combat it. The way this works is that cybercriminals utilize several types of display advertisements to distribute malware. A few ways you’d see malvertising is through auto-redirecting ads that will take you to a phishing page, click bait and malicious code hidden within an ad.
  • 7. Malvertising  Sadly, cybercriminals usually use legitimate ad networks because of the high volume of ads they distribute. It makes it incredibly easy for them to throw a code into an ad without the advertiser having the slightest clue.  The worst malvertising connects users’ computers to an exploit kit that runs analysis on the defending computer, looking for vulnerabilities and exploiting them. From there, attackers can install malware, ransomware or gain full access to the computer and sensitive information. Sometimes Google may even flag your website for hosting malware, which will affect how you show up in search results.
  • 8. What You Can Do Like most other malware situations, the best way to keep it from ruining your device or even your life, is to keep everything up to date. It is important to ensure any scripts ads may be running on are current. This includes programs like Java, Flash and Microsoft Silverlight. Ad networks are working hard to stay above the curve, but it is your responsibility to help with that.
  • 9. WhatYouCan Do  Be sure to report any suspicious ads to Google. If the ad’s script contains suspicious code, including encrypted code, it should be treated with suspicion. Remove the ad from your website and report it to your ad network.  Also, there are many ad verification websites that help back check ads for suspicious code. The bottom line with any mischievous malware is to keep your eyes open and report foul play.
  • 10. Security Awareness Training and Educating Your Team There are a number of managed security solutions that will stop a malware attack before it can occur. Your team members are actually your greatest threat. A security awareness training solution will keep your team educated through real-life email experiences.
  • 11. SecurityAwarenessTrainingandEducatingYourTeam This kind of solution phish tests your employees. This involves sending them fake phishing emails as a test. If a team member ends up clicking on mock malicious link they will be redirected to a customized educational page. This will explain why they failed the phish test so they don’t do so in the future. They will also continue to be phish tested until they pass. This way your team will have an awareness of what a malicious email looks like.
  • 12. If you’d like more information about managed security, malware and how you can protect your business, contact The TNS Group today.