Understand the malware targeting businesses
Posted on: August 26th, 2020
No matter how big or small your business is – you are susceptible to malware and cyber attacks. But what is malware? The term covers malicious software that is designed to harm or exploit a computer device or network. Keep reading to understand the most common types of malware that cyber criminals are using to target businesses.
A keylogger will maliciously monitor and log the keyboard keystrokes on a computer. They are used by cyber attackers to steal sensitive information, such as passwords, when the user types it into the device.
Ransomware is the most infamous type of malware. The software will lock down a business’s files and hold them for ransom. The cyber criminal will demand a ransom payment to regain access to the information. This type of malware has evolved over time, and attackers typically access the network for an amount of time, which allows them to wipe backups and lock down all devices before you are even aware.
Remote access trojans
With remote access trojans, attacks access and control a computer or device without the user knowing. Remote access trojans are typically downloaded to the device through email attachments or by visiting untrusted websites. These trojans are incredibly challenging to detect, especially because the attacker will act cautiously to avoid giving themselves away.
Random-access memory (RAM) is the short-term data storage in a computer. RAM stores information that your computer is actively using to access this data quickly. Cyber criminals use RAM scrapers to steal this sensitive, short-term data straight from your computer. The scrapers are often used on point-of-sale devices to steal credit and debit card information.
Banking trojans use various techniques to steal your credentials and monies. Typically, these trojans will create a backdoor to access and compromise the system. This allows the attacker to steal sensitive data and collect key logs to access bank accounts or even steal people’s identities. Banking trojans also often utilise web form injection – the malware adds extra fields into online forms to get the user to enter additional information.
Businesses need to establish strong cyber security practices and policies to protect against malware, one of the most common tools used to target them.
Talk to the team at Tango Technology to keep your business secure.
Back to all blog posts