Malware

As malicious program also Evil goods or malware [ mælwɛə ] ( portmanteau word from English- malicious, vicious ' or Latin malus ' bad ' and software ) refers to computer programs that have been developed to perform unwanted and harmful functions where appropriate by the user. Malware is thus a generic term which includes, inter alia, the computer virus. The term virus is older and often not clearly defined. So is the talk of anti-virus protection, so much more generally, the protection is meant against malicious software of any kind. A typical virus spreads, while today's popular malicious programs, the structure of Trojan horses show whose primary purpose is not the distribution, but the remote control capability.

With malware not faulty software is meant, although can cause harm.

Operation

The damage functions are either disguised or the software runs undetected in the background ( typing see below). Malicious functions can be the manipulation or deletion of files or technical compromise the security software and other security devices ( such as firewalls and antivirus programs ) be a computer, but also in this context the unsolicited collecting data for marketing purposes. It is also common for malware that a proper uninstall with the usual means fail, so that at least software fragments remain in the system. This may be able to continue to perform unwanted functions also after uninstalling.

For a detailed operation of malware and viruses in particular → Main article: computer virus.

Classification

Malware is divided into the following types:

  • Computer viruses are the oldest type of malware, they spread by writing copies of itself in programs, documents or media. A partially defective virus called " intended virus ". This usually causes only a " primary infection " of a file, but is not able to reproduce on.
  • A computer worm is similar to a computer virus, but spreads directly through networks such as the Internet and trying to break into other computers.
  • A Trojan horse ( short Trojans ) is a combination of (sometimes only apparently) useful host program with a hidden working, malignant part, often spyware or backdoor. A Trojan horse does not spread itself, but advertises the usefulness of the marketing program for its installation by the user.
  • A Backdoor is a common malicious function that is usually introduced and installed by viruses, worms or Trojan horses. It enables third-party unauthorized access ( "back door" ) to the computer, but hidden and bypassing the usual security devices. Backdoors are often used to abuse the compromised computer as a spam distribution or for denial-of- service attacks.
  • Spyware and Adware research off the computer and the user behavior and send the data to the manufacturer or other sources to this either to sell or to selectively display advertisements. This form of malware is often installed together with other useful software without asking the user, and remains often continued to work after their removal. Spyware is programs that collect information on the activities of the user and pass on to third parties.
  • Adware is called software - often together with desired installations or Webabrufen - without prompting and without benefit to the user launches functions that serve the advertising or market research.
  • Scareware is set out to confuse the user and to entice him to install malicious software or pay for a useless product. For example, fake alerts about alleged virus attack on the computer are displayed to a purchasable software pretends to be removed.
  • Ransomware blocks access to the operating system or encrypted potentially important files and prompts the user for payment of ransom - mostly about coupon payment systems such as Ukash or Paysafecard
  • Grayware is used partly as a separate category to affect software such as spyware and adware, or other variants, the system functions not directly distinguish them from clearly harmful forms (not to be confused with gray goods or reimport of goods at the official importer over).
  • Part dialers ( dialers on value-added telephone numbers ) lists among malware, although they do not count in the narrow sense to do so. Illegal dialer programs perform the dial- secretly, that is, in the background, unnoticed by the user, through and add the victims financial harm, which is billed as the telephone bill. Criminally is for fraud.
  • Rogueware (also rogue software, rogue security software or English " rogue security software" ) deceives the user to remove putative other malicious programs. Some versions are available for a fee, other versions install other malicious programs during the deception process.

Dissemination

In 2008, by security companies like F -Secure " one million new pests " expected. Therefore reach Daily about 25,000 new malicious programs - a Unique samples, so pests with a unique "fingerprint" by MD5 - specially established server, such as honeypots. In contrast, AV-Test, has already mid-April 2008 ten million new malicious programs in 2008. There is a strong change in the spread of malicious software to detect a trojan horse in e- mail attachments are becoming increasingly rare, while the attacks on the Web increase approximately by drive-by download. Moreover, the use of rootkit techniques to hide the pests would increasingly common. According to the California malware specialist child Sight Security average of 13 % of private computers were infected by malware, 2012 in Germany.

Depending on the operating system

On the question of whether Apple or Linux computers are safe, there are different positions. To explain mainly manufacturer of commercial virus scanners, this only becomes a question of distribution of the respective operating systems. Yevgeny Kasperski explained in an interview:

" Just because they have hardly been noticed by the cyber criminals. But that may change. "

The use of a package manager, as is common in Linux distributions, lowers a widespread view that the risk of malware. For this opinion there are no technically verifiable reasons. Operating system independent is the ability to inspect the source code, as is typical for open source software, a strong indication that a particular program - at least in the original version - contains no malware. Binärinfektionen and subsequent manipulations will of course also possible.

96934
de