Questions tagged [malware]

Malware is any software application which subverts the will of the legitimate owner of a computer, by means of force or subterfuge, with or without personal or monetary gain on the part of the creator.

"Malware" is a portmanteau of "malicious" and "software"

Common forms of malware include:

  • Botnet clients, which grant the malware author some degree of control over the compromised operating system and are generally employed in sending spam e-mail and may be rented out to perform DDoS attacks.
  • Data exfiltrators/Spyware, which collect and transmit data about the computer they reside on back to the creator. These are commonly used to target login and account details for financial, social networking, and gaming websites.
  • Rogue Utility Applications, which attempt to use scare tactics in order to entice the computer's user to purchase the "full version" of the Rogue Utility.
  • Adware, which causes advertisements to appear on the user's desktop, in web pages, or elsewhere.
  • Rootkits, which attempt to conceal the presence of both the rootkit and (usually) an accompanying piece of malware from another category from standard system tools and diagnostic utilities.
  • Ransomware, which encrypts the target's data and demands payment to return access of the data to the owner.

Useful Resources:

2539 questions
89
votes
5 answers

Can a malware power on a computer?

I've just downloaded and executed a piece of malware on my computer. I don't have much time right now, so I just powered it off (turned it off via the Start menu), hoping that it won't be able to steal any data or do malicious activities until I can…
Benoit Esnard
  • 14,694
  • 7
  • 69
  • 69
57
votes
3 answers

Does open source "protestware" represent a security risk?

Since the beginning of the Ukraine-Russian war, a new kind of software was created, which is called "protestware". In the best case, the devs only add some (personal) statements about the war or uncensored information to the repositories or when…
Manfred Kaiser
  • 1,386
  • 2
  • 6
  • 20
25
votes
9 answers

How is it possible to get infected with malware by opening a file on a Mac or Windows machine?

Corporate security trainings keeps saying "download a file from the web or email attachment and open it and you might become infected". I know this used to be the case on old Windows machines in the 90s, but is it still the case on any computer?…
Alien
  • 393
  • 3
  • 4
25
votes
2 answers

Why is spreading malware.scr instead of malware.exe more common?

Both are binaries and I guess that AV products know that .scr files that are not screensavers should be dealt with with "special care". I see quite a lot of "Document.pdf.scr" malware samples and can't explain why it's better than plain ol'…
GalB1t
  • 513
  • 1
  • 5
  • 9
23
votes
2 answers

How do I remove my website from the malware database?

I have a website which is basically a service platform. As far as I know there is no malware in my website (at least not found according to these free scanners). However, Check Point malware database definition is blocking requests to my website…
MD Sayem Ahmed
  • 341
  • 2
  • 6
18
votes
6 answers

Methods of mitigating threats from keyloggers

I am concerned about keyloggers being installed on my system and transmitting sensitive data out of our network. Is there a common method that such malware uses to send its collection back to the hacker? For instance, do they generally contact a…
Paul S.
  • 375
  • 3
  • 7
14
votes
2 answers

How to report getting an offer to put malware in my code

I received an email with the following offer. Alina Schatalina wrote: Would you consider adding our script inside your extension and get monthly payments for it? Our script will inject hidden and safe ads inside browser. These ads can't be noticed…
dteviot
  • 143
  • 4
9
votes
3 answers

Nmap indicates that "telepathstart" and "telepathattack" are listening on ports 5010 and 5011 of my Linux box. What are these?

I have a linux box on my network which, according to Nmap, contains two services called telepathstart and telepathattack listening on ports 5010 and 5011. From the same box, I am receiving inbound requests to my computer on port 113, which my…
JMK
  • 2,506
  • 7
  • 29
  • 40
6
votes
1 answer

Can a malware steal the content of the clipboard?

Is there any malware that can steal the content of the clipboard?. E.g. say you have a text file with say private info or passwords, and you copy this data to paste on say another text file on a flash drive. Are there any malware that can get that…
djangocode
  • 61
  • 2
6
votes
2 answers

Do multiplatform viruses exist?

Is there any known virus that targets the main operating systems: Windows, Linux and Mac OS X?
user45139
6
votes
1 answer

Drive-by downloads

I am aware of the problem of drive-by downloads, which happens when one visits a malicious site and a malware is downloaded to the PC. I want to ask that when such a program is downloaded, how does it manage to execute?
Jake
  • 1,095
  • 3
  • 12
  • 20
6
votes
4 answers

Can malware hide their network activity from Resource Monitor (perfmon)?

Is it possible for malware to hide their network activity from tools like the Resource Monitor that ships with windows? How much effort is it for a malware developer to implement such functionality? I'm just wondering if there is a point in…
Jonathan Egerton
  • 835
  • 1
  • 8
  • 6
5
votes
1 answer

Downloading suspect files into quarantine?

Are there any tools out there or methods available to download a suspect file for analysis without having to worry about being infected?
m4ck
  • 451
  • 6
  • 12
5
votes
3 answers

Can a djvu file be dangerous?

PDF files can contains malicious JavaScript , open actions & etc. But what about djvu files ? If djvu can be malicious, then how to detect that manually (without opening malicious file of course)?
5
votes
2 answers

How do I figure out if a piece of software contains malware?

My question is a bit complicated; I'm trying to evaluate if Selenium is contains malware. I know a lot of people on SO use it and I'm not too worried about it, but I work for a conservative Asian company and right now they're pretty strict about…
xxxRxxx
  • 153
  • 5
1
2 3
12 13