4.2 Summarize various types of attacks and their impact
📘CompTIA Network+ (N10-009)
Malware is short for malicious software. It’s any software intentionally designed to harm a computer, network, or user. Malware can:
- Steal sensitive data (like passwords or financial info)
- Disrupt systems or networks
- Allow attackers to gain unauthorized access
- Encrypt data and demand ransom
Malware can spread in many ways, including email attachments, infected software downloads, network vulnerabilities, or removable media.
Types of Malware
1. Viruses
- Definition: A virus is a piece of code that attaches itself to files or programs. It spreads when the infected file is opened or executed.
- Behavior in IT systems:
- Can corrupt files or system data
- Might cause programs or servers to crash
- Can slow down network or system performance
- Example: A virus attaches to an internal company document. When employees open it, their computers get infected, and the virus spreads to shared network drives.
2. Worms
- Definition: Worms are self-replicating malware that spread automatically across networks without user action.
- Behavior in IT systems:
- Exploit vulnerabilities in operating systems or network services
- Can flood network traffic, causing slowdowns or outages
- Can deliver other malware payloads (like ransomware)
- Example: A worm exploits a network printer vulnerability and automatically copies itself to every connected computer in the office.
3. Trojans (Trojan Horses)
- Definition: Trojans appear to be legitimate software but contain hidden malicious functions. Unlike viruses and worms, they don’t self-replicate.
- Behavior in IT systems:
- Can create a backdoor for attackers to remotely access the system
- Can steal credentials, install keyloggers, or download additional malware
- Example: An employee downloads a software update from an unverified source. It installs normally but secretly gives hackers remote access to the workstation.
4. Ransomware
- Definition: Malware that encrypts a victim’s files or systems and demands payment for decryption.
- Behavior in IT systems:
- Encrypts critical files, making them inaccessible
- Often spreads through phishing emails or infected downloads
- Can halt operations until the ransom is paid
- Example: A ransomware attack encrypts all files on a company file server. Employees can’t access shared documents until the attack is mitigated or a backup is restored.
5. Spyware
- Definition: Malware that secretly monitors user activity and sends the information to an attacker.
- Behavior in IT systems:
- Can log keystrokes to capture usernames and passwords
- Can monitor network traffic or browser activity
- Can operate silently, making it hard to detect
- Example: Spyware installed on office computers records login credentials for cloud services.
6. Adware
- Definition: Software that automatically displays unwanted advertisements. Some adware may also collect user information.
- Behavior in IT systems:
- Generates pop-ups, redirecting users to malicious sites
- Can consume network bandwidth and slow down systems
- Example: Adware installed on a workstation triggers pop-ups when employees browse the internet, distracting them and slowing performance.
7. Rootkits
- Definition: Malware designed to gain unauthorized administrative access while hiding its presence.
- Behavior in IT systems:
- Allows attackers to control systems without detection
- Can disable security software or hide other malware
- Example: A rootkit installed on a server hides itself and other malware while giving hackers full access to sensitive databases.
8. Keyloggers
- Definition: Malware that records every keystroke made on a device.
- Behavior in IT systems:
- Captures sensitive information like passwords, credit card numbers, or confidential documents
- Often installed as part of a Trojan
- Example: A keylogger captures credentials of the IT admin, allowing attackers to access secure network resources.
9. Botnets
- Definition: Networks of infected devices controlled by an attacker (bots). They can be used for large-scale attacks.
- Behavior in IT systems:
- Launch Distributed Denial of Service (DDoS) attacks
- Send spam emails or malware
- Operate silently on multiple systems
- Example: Hundreds of office computers infected with bot malware are remotely controlled to overwhelm a target website with traffic.
Malware Delivery Methods
- Email attachments or links
- Infected websites or downloads
- Network vulnerabilities (unpatched software)
- Removable media (USB drives)
- Malvertising (malicious ads)
Impact of Malware on IT Systems
- Data loss or corruption
- Unauthorized access to sensitive information
- Financial loss due to downtime or ransom
- Network congestion or system crashes
- Reputation damage for organizations
Key Points for the Exam
- Know the difference between viruses (attach to files), worms (self-replicate), Trojans (disguise as legitimate software).
- Understand ransomware encrypts files, spyware steals data, rootkits hide themselves, keyloggers track keystrokes, botnets control multiple devices.
- Recognize malware delivery methods and impacts on IT systems.
