answersLogoWhite

0

How does Malware work?

Updated: 9/13/2023
User Avatar

Wiki User

15y ago

Best Answer

Malware can attack multiple ways. The technology (spyware, trojan, rootkit) and the attack vector (fake software, e-mail attachments, direct hacking) has remained the same.

It's the intent that is different, malware always has some type of fraud behind the purpose of distribution.

Some examples of how malware works

Trojan Horse

You download a cool calculator program and install it. The calculator works fine. In a few days you start to have problems with your computer and when you search on the internet you start to get annoying pop-ups. Then you start to get popups at random when you are not searching the internet. The malicious pop-up program was most likely hidden away inside the calculator program. The installation also may have implanted itself inside programs that already existed on your computer. This makes it difficult to remove.

Rootkit in e-mail attachment

Your friend sends you a funny video, when you double click on it you get a security warning, but you want to see it so you click OK to get past the warning. However nothing happened, you think nothing of it..maybe it was a bad copy.

Later you talk to your friend however he says he didn't send you a video. Something did happen in the background when you clicked on the video, malware was installed. There is no way to know the intent behind it. You may not notice anything, your computer could be used as a bot net drone to attack web sites or other computers.

Spyware in "drive by download"

You click on a link in search results and immediately get pop-ups. You close the pages but get weird errors. You think nothing harmful could have come of it, you simply "drove by" the website. You didn't install anything. However your computer had a software flaw that let the website install spyware without your permission. You didn't get a warning because it was a flaw in the programming of the web browser. You now have spyware resident on your system. What you type in web forms, login pages, chat and what sites you visit could all be sent to the hacker's website.

More info on malware at http://www.security-tech-reviews.com/types-of-malware.html

User Avatar

Wiki User

15y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: How does Malware work?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

What type of malware requires direct interaction with a hacker to work properly?

Trojan


When troubleshooting corrupted work files that appear to be infected what would you want to look for?

malware


What is system security scanner?

Malware Malware


What is Trojan. Zbot?

Malware do not download


Can malwarebytes anti-malware work together with kaspersky internet security antivirus?

I have in the past, no conflict was detected.


What is Free Malware for computer?

A free malware removal tool helps you identify and remove malware from your computer


Worms and Trojan horses are examples of .?

malware


I have something called Malware bytes' Anti-Malware installed on my computer and it will NOT allow me to remove it........ how can I remove it?

Chill You Woudnt Want To Delete it Malware Bytes Anti Malware Is On The Good Side Of The War Of Malware Try Add/Remove Programs


Is malware a virus?

Viruses are a kind of malware. Malware is basically, as the name suggests, malicious software that can affect your computer. There are some easy to understand sources about what is malware and viruses in the related links.


Can you install different malware and ant virus at the same time?

Yes. Malware can be teamed up in rootkits for massive mayhem or downloaded separately. Anti virus software can also work in teams, such as AVG and Kaspersky.


Can malware duplicate itself?

Some malware can duplicate itself. Self-replicating malware which does so as a propagation mechanism is called a Worm.


What is the oldest mode of malware infection?

The oldest mode of malware infection is tricking the user into downloading the malware. This is known as a Trojan Horse.