Unsupported Browser Detected
The web Browser you are currently using is unsupported, and some features of this site may not work as intended. Please update to a modern browser such as Chrome, Firefox or Edge to experience all features Michigan.gov has to offer.
Supported Browsers
Malware - What Is It and How To Avoid It
Malware– which isshort for Malicious Software–is a catch-all term forappsorsoftwareintentionallydesignedto damageorcontaminatean electronic device.Itmaysteal sensitiveandconfidentialinformationstored on your deviceorinstall harmful softwareto spy onyour onlineactivitiesandpossibly even hold your device hostage.Malware can infect all types of electronic devices, including cell phones, personal computers, tablets, smart televisions,and even gaming systems.
Malwaretypically spreads by duplicating itself.Ithides within the device’s data files,and the device must run that fileforthe malwareto do its dirty work.Malware may remain dormant until the infected file is accessed,which then causesthemalware to execute and dodamage.Once activated,malware may spreadto other files and programs across your device.
Howismalwaredelivered?
The most commonwayspeople are exposedto malware risksarethrough email,web sites, phone calls, and software or app downloads.
- Email:Sending out malware through email is simple and effective foracybercriminal.Emails may appear to come from trusted sourcessuch as the user’s bank or credit card company,or even a contact within the user’s list.The email will feature an appealing linkor attachmentthat, if clicked on, will direct the usertowardaseemingly legitimateversionofa trustedwebsite, convincingtheuserto changeapassword and send login information to the cybercriminal.The link or attachmentistypicallyavirusthat immediatelybeginscollecting data onceit isopened.
- Websites:A cybercriminalmaydesignpop-up ads thatwarn users they have avirusto entice the user intoclicking“OK”to clean their system. Clicking OK installs the virus on the host system.Even going to an unsecure website providesanopportunityfor a virus tobe downloaded.
- Phone:Usersmayreceive a callfroma cybercriminalclaiming to be tech support,statinga virushas beendetected on oneor moreelectronic device,andrequestingpermission to access thatdeviceremotely.Thecybercriminalwillthendownload a virus, hijackthedevice,andsteal personalandconfidential information.
- Apps: A cybercriminal mayinsert maliciouscodein a popular app,and thenadvertise it asafree appfordownloading.Once the user downloads the app, the malware infects the device.
Cybercriminalscando thisfrom the comfort of homeand belocatedanywhere in the world.Theydo notneed direct contact with you to be successful.Cybercriminalscandefinitelytrickusersinto infectingtheirown devices.But malwareattackswill not work without the most important ingredient: YOU!
This is why it is so important to know what malware is, how to detect it, andhow to deal with it.
The many forms of malware
- Viruses:A virus ismalware that attaches to another program or app and,when triggered,replicates itself by modifying other computer programs and infecting them with its own code.Thismaycauseadevice to crash andallowcybercriminalsto steal or destroydata.At the very least, it can create performance issuesthat hindereffective use of thedevice.
- Computer worm:A worm issimilar to a virus,butit does notrequire user interaction to trigger.
- Trojan horse:A trojan horse ispopular malware that can harmadigital device and its data by crashingthedevice, deleting files, and stealing confidential information.
- Ransomware:Ransomware ismalware that will lockadeviceanddenyaccess toitsfiles and data.Cybercriminals then seek paymentto unlock the device.Ifthedevice is infected with Ransomware, the FBI urgesusersto report these infections to the Federal Internet Crime Center.
- Spyware: Spywareoftenappear as pop-up advertisem*nts to deceiveusersand sharetheirinformation with third-party entities.
- Adware:Adware isadvertising-supported software that generates ads automatically for creating revenue.Adware typicallyis bundled with softwareinstalledandthen identifies the websites visited to presentselectadvertisem*nts totheviewer.
- Scareware:Scareware is amalicious computerprogramdesignedto tricktheuserinto buying and downloading unnecessary and potentially dangerous software, such as fake antivirus protection.
Detecting malwareonadevice
Usersmayexperiencea variety ofsymptomsthatindicate the presence of malwareon their device.Somesystembehaviors that raise red-flagsareobvious,such as reduced performance, frequent crashing or freezing,sluggishapps, internet connection issues, unexpected pop-up ads,changes to thebrowser’s home page, current antivirus software or appstopworking,andexcessive battery usage.
Less obvious behaviors thatshouldbe monitoredareloss of disk space, an increase in the system’s internet activity,orthe deviceturningonWi-Fiand internet connectionswithoutuserknowledge.
Sometimes thereareno signs, but this does not meanoneshould be complacent, because no newsis notalwaysgood news.Powerful malware can hide deep inasystem, going about its dirty business without raising any redflags as it snags passwords, steals sensitivefiles,or even usesthe devicesystem to spread tootherdevices.
Proper responseto malware infection once detected
Ifmalwareis believedto havetaken up residence inadevice,there are a few stepsthatshouldbetaken.
- First, isolate the infected system or device.Disable thewireless connection andturn-off Bluetoothso otherconnected devices will not become infected.
- Next,install atrustedand legitimate anti-malware/anti-virusprogramandrun a scan.
- Once the device is clean,it isimportantto changepasswords, not only fordevices but alsoforemailandsocial media accounts, favorite shopping sites,and online bankingandbilling centers. Finally, REPORT IT.Several agencies want to knowabout malware attacksincludingthelocalFBI Office, theFederal Trade Commission (FTC),andtheInternet Crime Center (IC3).
No protection is absolute, but a combination of personal awareness and well-designed protective tools will make your device as safe as it can be.
Avoiding malwarebefore it happens
All devices are vulnerable to malware.Given the choice, who wouldn’t want to preventacomputer virusinstead of dealing with the aftermath?So themost important questionis: “How do I make sure my device remains malware free?”
The answer to thatis twofold:(1)personal vigilance and(2)protectivetools.
- Personal vigilanceis the first layer of protection against malware, but simply being careful is not enough.Because online security is not perfect, even downloads from legitimate sites can sometimes have malware attached.Thismeans even the mostcautioususer is at risk unless additional measures are taken.
DO NOT
- download apps from third-party sources.Most malicious software is found in third-party apps.
- openstrange,unsolicited,andunverified emails, texts,or messagesof unknown origin.These can all be disguised to look like they are from awell-known company, bank,or even a friend.For additional information about fraudulent emails, please see “Fraudulent Email Thieves Intend to Steal Your Personal Information.”
- open or click onhyperlinksor attachmentsininstant or textmessages from unknown sources ...clickon pop-up ads while browsing the internet.
- use public Wi-Ficonnections ifyou can avoid it.
DO
- download a trusted ad-blockertoenable the device’sbrowser to block advertisem*nts and pop-ups.
- visit secure websitesonly,where the web address starts withhttps://. (The S indicates secure.)
- install applications from trusted sources,reviewingthevendor prior to downloading.
- installand regularly updatetrustedanti-virus or anti-malware software.Thesecurity software that comes built intoadevice covers the basics, but it cannot always stop new, advanced, or rapidly-evolving threats.
- set up account alerts for online bankingtobe notifiedwhen account updates occur.
- changesystemlogin ID and password frequently.Do the same for any personal accounts such bank or credit card online accounts.
- installa virtual privatenetwork (VPN).Byrunningtheinternet connection through an encrypted channel, the VPN protects data even when it is in transit.be aware of current and popular scamsthattrickusers intounknowinglydownloadingthevirus.
- back up devicesregularly. Backingup files keeps them in an offline location that is not connected to the internet.This will help protectusersiftheylose access to data due to malware.
- Protective toolsare created to address malware and virusesandare designed to seek out and eliminate any malware on a device.Well-designed anti-virus programs will check any newly downloaded app to ensure it is malware-free, periodically scan the device to detect and defeat any malware that might have slipped through, and is regularly updated to recognize the latest threats.Current and expert reviews of the latest technology products and software can be found online.
Moreinformation aboutmalware canbe found on theFederal Trade Commission (FTC)website.
Formoreinformation about unsolicited email scams, please seeFraudulent Email Thieves Intend to Steal Your Personal Information.
Forgeneralinformation on specific scams, see theAttorney General’s list of current Consumer Alerts.
Report Fraud
To report fraud or if you have a general consumer complaint, contact theAttorney General's Consumer Protection Team at:
Consumer Protection Division
P.O. Box 30213
Lansing, MI 48909
517-335-7599
Fax: 517-241-3771
Toll free: 877-765-8388
Online complaint form