Modern malware has more sophisticated ways of hiding
However, modern malware is much more stealthy and tries to have as little impact as possible on the victim's PC.
But why is new malware being developed to hide from users, and what does that say about the current cybercrime world?
Why is modern malware more stealthy than old malware?
While old malware was often focused on destroying data, this changed when cybercriminals learned that they could monetize their creations. Why cause damage when you can use your skills to earn extra income?
To maximize the amount of money malware can make from its owners, it is often designed to be hidden from users. The longer the malware stays on a PC, the more money its creators make.
That's not to say that all malware designed to make money is designed to be stealthy. When a malware strain is designed to instill fear in users, it will often make itself very visible. Examples include ransomware and fake virus scans that make it very clear that it wants you to pay. However, most of the time, they will try to stay undetected for as long as possible.
Cryptojacking
Cryptojacking malware wants to stay secret because that's how it makes money for the developer. It sits on your PC and uses its resources to mine cryptocurrency, which is sent to the malware developer. The more unchecked Cryptojacking malware is, the more money it makes.
Botnet
Botnet malware remains hidden because that's how its owners send commands to your PC. Left unchecked, a PC 'recruited' into a botnet could send spam emails or launch DDoS attacks on services. As long as the malware remains on your PC, it remains part of a larger botnet.
Stealing sensitive information
Some types of malware collect information from you. These include keyloggers that sit dormant on your computer and relay your keystrokes to cybercriminals, or banking Trojans designed to steal login credentials for sensitive services. Everything from your credit card information to your account logins is transmitted back, and as long as that information isn't deleted, it can collect as much as it wants.
How does modern malware evade detection?
It may seem strange that malware goes undetected, as antivirus programs have never been better. However, cybercriminals use a number of tricks to get past your defenses.
Using Fileless Malware
Fileless Malware can bypass antivirus programs because it doesn't place any files on your computer. Instead, it all runs in your computer's memory (RAM), where antivirus programs don't look. From there, it can stage further attacks without being detected.
Fileless Malware can be difficult to detect and remove, so the best way to prevent infection is to be extremely careful around common malware sources.
Impersonating a legitimate application
Cybercriminals sometimes create apps that appear legitimate. They either copy a real app or find a popular service that doesn't have one and create a fake one. For example, a malicious Google Play Store app stole $70,000 by pretending to be the official app for a cryptocurrency service.
To avoid falling into the trap of cybercriminals, check out how to spot fake Android apps so you can better protect yourself.
Find unsafe targets using Internet connection
Sometimes, cybercriminals don't need to do anything fancy to spread malware. With the rise of smart homes and Internet of Things (IoT) devices, we're seeing a wave of gadgets accessing the internet without properly securing their connections. Cybercriminals can then hijack these devices for their own purposes without being detected, such as with IoT botnets.
Always remember that connecting devices to the Internet is a two-way street. If you buy an Internet-connected gadget, make sure it's from a brand you trust. This is especially important for any device that could potentially compromise your privacy if it falls into the wrong hands, such as a smart home camera. And if the thought of hackers gaining access to your device makes you shudder, it's best to opt for an alternative that doesn't connect to the Internet, such as a gadget that runs on your local network.
Now that bad actors are using their skills to make money, much of the malware is much stealthier than it used to be. The best way to avoid having to deal with a stealthy virus is to make sure you don't get infected in the first place, and with some knowledge, you can protect yourself from these new strains.
You should read it
- What is Safe Malware? Why is it so dangerous?
- Can a VPN Fight Malware?
- What is Malware? What kind of attack is Malware?
- The 4 most common ways to spread malware today
- Learn about polymorphic malware and super polymorphism
- What is Goldoson Malware? How can you protect yourself?
- What is rooting malware? What can you do to protect yourself?
- Some simple tricks to deal with Malware
May be interested
- New hacker tricks, increasingly more sophisticated, to avoid being exposedrecently, security firm fortinet (usa) has released a report on cyber security threats. according to this report, cybercriminals are becoming more and more sophisticated in cloaking and anti-analysis activities to avoid being exposed.
- The 4 most common ways to spread malware todayif there's one thing that poses a threat to all users of technology, it's malware. this malware can be extremely dangerous, harmful, and comes in many different forms.
- List of notorious billion-dollar robbery missions in modern times, from ancient ways like Earth to sophisticated psychological tricksjewelry worth trillions of dong has been stolen
- 5 ways malware can easily infect a Macthere are actual mac security threats and many problems resulting from user behavior. here are some dangerous practices that can infect malware on a mac.
- Top hideout Free Fire little knownhere are a few hiding places in free fire that gamers are easy to find and if not paying attention, you will not be able to see players hiding in it.
- Detecting malware infection campaign hidden in fake Windows 11 installerinternational security researchers have just issued an urgent notice about a sophisticated malicious attack campaign targeting windows users worldwide.
- Sophisticated spam Trojan unmatchedveteran security expert joe stewart thinks he has embraced malware until he comes across spamthru trojan, a malicious program designed to spread spam from infected computers.
- Malware that specializes in eavesdropping and sabotage is discovered hiding on Telegramnew golang malware is using telegram as a 'lever' to spread itself everywhere.
- Discover a new kind of malicious code that can record the phone call to extort moneyreddrop is one of the most sophisticated android malware that researchers have ever seen spread widely.
- Malware on iOS can pretend to power off iPhone to silently monitor with camera, microphoneresearchers have successfully developed a rather sophisticated attack technique targeting ios devices. the special feature of this technique is to use a malware to pretend to turn off the iphone and then silently monitor the user through the camera and microphone.