What Are the Top Ways Malware Gets Spread?
Malicious bad actors such as black hat hackers, criminals or organized crime groups gets their way by infecting targets with Malware.
One of their strongest ways is to infect a target system with Malware. This way they will gain full access to a remote system.
When they have obtained full access they can use this to blackmail customers.
The Top Ways Malware gets spread
- Email Attachments via Email.
- Phishing Emails tricks the user to clicking malicious toxic links.
- Google / Bing Ads or other paid advertise.
- Youtube or other video sites that trick the user to click a link.
- Telegram / WhatsAPP / Messenger groups, channels messages from bots or malicious users sending attachments or tricking the user clicking a link.
- LinkedIN.
- Github.Maclicious
- Pastebin etc.
- Filesharing services such as P2P Torrent.
- Hacking forums.
- Compromised malicious websites that spread malware when visiting them.
- Social Engineering. An attacker can call or trick a user to perform actions to install malware.
- Downloading software from untrusted websites.
- USB drives or other media. An attacker can visit a location and drop USB drives hoping someone will find and connect it.
- Exploiting Software Vulnerabilities. Unpatched systems gets breached by bots that installs malware.
- Network Shares.
- Fake Security Software. Fake software that claims to fix a security issue or fake Anti Virus.
- Botnets. An attacker can use a botnet to inject malware on a large scale to vulnerable targets.
- Connecting to insecure WiFi Networks and can be subjected by man in the middle attacks.
- Malicious Macros in Office documents such as a Word or Excel files.
How to Guard Against Malware and Avoid Getting Infected
What are the top advice to follow to prevent your devices or systems getting infected by Malware?
Always apply critical thinking. Always always questions to your self if a given thing is a good idea.
If someone try to get you to do something again evaluate with your self if anyone can benefit from it.
If you are not sure about a specific topic it is always better wait to take action think about it another time.
Search about the topic and wait to take action.
- Always use strong unique passwords with Two Factor Authentication (2FA) or Multi Factor Authentication (MFA)
- Keep all your operating system, browsers and software up to date.
- Only install trusted reliable Security Products.
- Always be careful when clicking any links or open any attachment in an email.
- Always use email security filtering before open any attachments or clicking any links.
- Only download software from trusted sources.
- Enable strong Firewalls. Block traffic from undesired countries, block toxic IPs, block exploits.
- Only use Public WiFi when having a VPN enabled.
- Do weekly backups of everything so you can easily restore your data without paying a ransom.
- Disable Macros in Office documents such as Word and Excel.
- Never give out sensitive information to prevent social engineering attacks. Example if someone call on the phone never give any sensitive information.
- Perform Vulnerability Scanning of your local and public IPs and patch all your vulnerabilities.
- Monitor your accounts check there no unauthorized logins or transactions.
- Scan any removable USB drive before connecting it.
- If you are not sure about a specific item consult a security professional before taking action.
|