Malware

Malware is short for malicious software and is used as a catch-all term to refer to any software that causes damage to a computer, server, or computer network. Malware on your computer could lead to:

  • theft of personal information
  • spam being sent to other computer users worldwide
  • your computer running more slowly
  • your computer crashing more often and taking longer to start up
  • the use of valuable computer memory and hard disk space
  • the alteration of your computer's settings from what the manufacturer intended

While many of these dangers can render a computer or the data on it useless, there are ways to mitigate the damage, and in many cases to stop the attack before it becomes a problem.

Types of Malware

Viruses

A malicious program that usually requires some action on the part of a user in order to infect a computer; for example, opening an infected attachment or clicking on a link in a rigged email may trigger a virus to infect your computer.

Worms

Self-replicating malware that, for instance, hunts down unprotected computers and recruits them for criminal or other malicious purposes. Unlike a virus, worms do not require any action on your part in order to infect your computer.

Trojan Horses

A Trojan horse, in software terms, refers to a malicious piece of software that is hidden inside an apparently useful and innocent application. Users systems generally become infected by trojan horses when they install software or a fake "patch" from an Internet download or an email attachment.

Remote Access Trojan Horses (RATs)

Malware that gives an attacker ongoing remote control of your computer, allowing them to browse files, install additional malware, or use your network connection for other attacks.

Spyware

Spyware and adware are small software programs that get stored on your computer without your permission, usually when you visit a website, sign up for "free" mailings, or download "free" software. These programs gather information about your computer use, web browsing, online purchasing and send it to sites that may sell it to others.

Rootkits

Rootkits are designed to give an attacker "root" or administrative access to a victim's computer. With root access, an attacker can perform a variety of tasks on the computer including browsing the infected computer's hard drive, making new user accounts or changing existing ones, or even using the computer's network connection for nefarious purposes.

Fileless Malware / “Living off the Land”

Malware that abuses legitimate tools already on your system (for example, PowerShell or WMI) so little or no malicious file is saved to disk, which makes it harder to detect and remove.

Cryptojacking (cryptominer malware)

Software that hijacks your computer’s processing power to mine cryptocurrency, which can make your system run hot and slow, even when you aren’t actively using it.

Malicious Browser Extensions

Add-ons that look helpful but can read your web activity, inject unwanted content, or steal login data; only install extensions you truly need and review their permissions regularly.

Botnets

Groups of infected computers controlled by attackers and used for spam, credential stuffing, and denial-of-service attacks; a single infected device can silently become part of a much larger attack.

Preventive Strategies

  • Install antivirus software - All computers connecting to the K-State network must have antivirus software installed. Learn what's recommended: antivirus.k-state.edu.
  • Install critical software updates - Microsoft Windows Update for PCs Apple Support Downloads for Mac.
  • Be cautious of email attachments - never open unexpected attachments.
  • Use a non-admin account for daily work. This limits the damage that malware can do.
  • Ensure all installed software is updated regularly, not just the operating system.
  • Limit browser extensions and remove any that you aren’t using regularly. Malicious extensions are an increasing popular method for stealing data.
  • Enable MFA whenever possible, including personal accounts.
  • Back up important files in a location with version history and test restore processes regularly to protect against ransomware attacks.
  • If something seems off (unexpected pop-ups, redirects, “security” alerts) disconnect from the network and contact the IT Service Desk.