Spam-borne malware

by Stephane

The different types of malware: viruses, trojans, backdoors, etc.

When users are connected to the Internet, their work tools are at risk of being infected by malware. These can cause serious damage and harm to the machine owner. Malware can enter the computer in a number of different ways: receiving spam in the mailbox, impersonating a user, installing infected software or applications, and so on.

 

 

Malware features

Once implanted in users’ computer systems, malware can contaminate data and render certain files unusable. They also prevent certain applications from working properly. Some types of malware directly attack the security software installed on the computer, giving them more room to maneuver. Users are not immune to file deletion, even if they don’t want to be. Hackers often use malware to collect personal data and steal identities. Their computers could also be used as relays for malicious practices such as mass spamming and bots.

 

 

Malware frequently encountered by users

Several categories of malware frequently attack users’ computer systems.

 

A computer virus is a malicious program that can contaminate the media used, infect the user’s computer network, destroy files, and so on. It slows down the network and, in the long term, damages the computer system. The computer virus can be active and produce all this damage too, or it can be inactive and be a time bomb for the user. It can enter the computer via spam, e-mail attachments, storage devices, Internet downloads and more.

 

A Trojan is a legitimate program that generates additional malicious actions when in use, without the user’s knowledge. It brings together several types of malware: the keylogger, used to retrieve usernames, access passwords or banking data; the logic bomb, remote control of a machine; the bot used to carry out mass mailings, and so on. The Trojan horse is transmitted by all kinds of media: email, spam, etc.

 

Spyware can be considered as spyware. Communicating with a remote server, it illegally transfers all personal information and data contained on the user’s computer to the latter, without the user’s knowledge. Normally, the installation of spyware in software is subject to the approval of the person concerned.

 

A backdoor enables hackers to gain remote access to the user’s computer and carry out all kinds of malicious activities. For example, you can remotely read, modify and even delete the machine’s contents. The backdoor can, for example, be used by hackers to remotely control a machine and use it as a spam server. Without the user’s knowledge, his computer becomes a zombie machine.

 

Using an e-mail protection service like ALTOSPAM integrates 4 antivirus programs, so you’re protected from any malware infection via e-mail.

Test Altospam’s solutions!

Thousands of companies, CTOs, CIOs, CISOs and IT managers already trust us to protect their e-mail against phishing, spear phishing, ransomware, …