The Virus and Malware Ambiguity
Most people think of any malware as a form of virus, and use these words interchangeably. While a virus is a malware a malware is not always a virus. There are many different types of malware, and viruses fall into their own category of malware (albeit a large one). Even Computer Cleric prefers to use the term “virus” in place of malware, though our services count towards all forms of malware. Here are the most common types of malware:

Adware
Adware is short for Advertising-Supported Software. This type of malware follows you, injecting advertisements via pop-ups into your browsing experience. Adware is often bundled with “free” versions of software, and is not always considered illegal. Legitimate software will usually have an adware listed as an optional install, though the check box for this option starts out selected and is usually well hidden in the download settings. Adware often comes bundled with spyware, and can even take you to sites with more dangerous malware built into sites coding.

Bots
Bots are autonomous programs designed to perform certain operations. Some bots are mostly harmless and are built for the user in order to alleviate particularly repetitive tasks (such as grinding in video games, scanning and bidding in online auctions, refilling forms for contests, etc). Even in this innocent state most bots are banned from any sites where the bot could provide an unfair advantage to the user. Google even uses a form of bots (called spiders) to search the web and updates their databases (perfectly harmless of course). However, recently bots have taken a more sinister turn, and are being used to spam websites, enter passwords repeatedly in attempts to break into accounts, DDoS attacks, spiders (like Google’s, only for malicious information recovery), and more. These are the reason you often find CAPTCHA tests in forms.

Bugs
Bugs aren’t directly malware or harmful. Bugs are usually simple human error in programing or partially corrupted data and can often go unnoticed until undesirable results occur. Minor bugs can cause simple glitches in programs where as major bugs can freeze or crash computers. Some bugs even leave breaches in a program’s security. Bugs are constantly being squashed by program developers. Its important to always keep your files up to date to avoid these. There are even programs that have been released that were so buggy, they have developed into a sort of virus (giving some credence to those who theorize that computer programs can evolve and change without direct human control).

Ransomware
These particularly annoying types of malware restrict user access to their computer or file unless an exchange of money is made (this should go without saying, but just in case, never give money to placate any malware). Ransomware can be used to encrypt data, rendering unreadable, or to lock a computer by changing passwords, altering BIOS, or even altering windows explorer (and other desktop applications). Ransomware can be a particularly difficult infection to remove.

Rootkit
A rootkit is a malicious software designed to remotely access a computer without being noticed by the user. Once installed on a computer it is possible for the attack behind the software to access your files, change your systems settings and configuration, install other malware, remove or cripple antivirus and other security programs, and even link your computer with other computers to form a network that can run bots in the background unnoticed. Rootkits are possibly the most difficult to detect malware, and by far the hardest to remove, mostly because rootkits can even change themselves with an attackers access. Any suspicion of a rootkit malware will be an overnight virus removal service, as the computer must be closely monitored to find the rootkit, and closely monitored afterwards to make sure the rootkit didn’t replicate itself elsewhere on the computer.

Spyware
Spyware malware is Rootkit malware’s younger, easier to get rid of, sibling. Spyware collects data by monitoring a user’s activity and keystrokes. In this way an attacker can steal passwords, account information, logins, financial data, and even identities. Like a rootkit, spyware can also modify security settings of software and browsers to avoid detection. Unlike a rootkit, spyware is generally easy to detect, as the malware behaves more predictively.

Trojan
A trojan, or trojan horse, is a type of malware that disguises itself as a normal file or program, in order for a user to download and install the program onto their computer. From there the trojan either behaves like other malware, or releases various forms of malware onto the computer. Trojans are most commonly found on file sharing and torrenting websites. Rarely is free actually free.

Virus
Often used as the catch-all term for malware, a virus is any form of malware  that can self-replicate by attaching itself to other programs and files. The virus then spreads to other computers with the aid of a user via downloads/uploads, email attachments, pictures, etc. The different types of viruses can vary widely (for a well written and comprehensive list I recommend 20 Common Types of Computer Viruses)

Worm
Computer worms and virus are often used synonymously. True a worm behaves much like a virus, but unlike a virus it can self-replicate and deliver itself to other systems without any aid of a user. This makes worms one of the most common forms of malware. One of the most effect methods a worm can use to spread is by sending copies of itself in mass emails to the user’s contacts.

Malware Symptoms
While malware exists in all sorts of different forms, they all have generally the same impact on a system. Infected computers have slower processing speeds, increased CPU usage or random CPU spikes, slower web browsing speeds, network complications, freezing or crashing, modified or deleted files, random appearance of unknown programs or files, programs activating/deactivating without user consent, strange or erratic computer behavior, or emails being sent without a user’s knowledge. If you have any of these symptoms it is important to isolate your device from the internet or from home networks immediately, to help prevent the further spread of the malware that your device is most likely infected with. Check out our troubleshooting page for more help.

Leave a Reply

Your email address will not be published. Required fields are marked *