What is malware and how cybercriminals use it | McAfee (2024)

  • Products
    • All-In-One Protection Recommended

      • McAfee+ Products

        Worry-free protection for your personal info, privacy, identity, and all your personal devices.
        Individual and family plans

      • McAfee+ Ultimate

        Our most comprehensive privacy, identity and device protection.

      • McAfee Total Protection

        Protection for your devices with identity monitoring and VPN.

    • Device Protection

      • Antivirus
      • Virtual Private Network (VPN)
      • Mobile Security
    • Free Tools & Downloads

      • Web Protection
      • Free Antivirus Trial
    • Other Services

      • PC Optimizer
      • Virus Removal
  • Features
    • Keep Me Private Online

      • Personal Data Cleanup
      • VPN (Virtual Private Network)
    • Safeguard My Identity

      • Identity Monitoring
      • Password Manager
    • Protect My Devices

      • Antivirus
      • Web Protection
    • Protect My Family

      • Protection Score
      • Parental Controls
  • About Us
    • Our Company

      • Company Overview
      • Investors
    • Our Efforts

      • Public Policy
    • Join Us

      • Careers
      • Life at McAfee
      • Our Teams
      • Our Locations
  • Resources
    • Stay Updated

    • Learn More

      • Learn at McAfee
      • What is Antivirus?
      • What is a VPN?
      • What is Identity Theft?
    • Press & News

      • McAfee Newsroom
  • Why McAfee

    Products

    Recommended

    All-In-One Protection

    McAfee+ Products

    Worry-free protection for your personal info, privacy, identity, and all your personal devices.
    Individual and family plans

    McAfee+ Ultimate

    Our most comprehensive privacy, identity and device protection.

    McAfee Total Protection

    Protection for your devices with identity monitoring and VPN.

    Device Protection

    Antivirus

    Virtual Private Network (VPN)

    Mobile Security

    Free Tools & Downloads

    Web Protection

    Free Antivirus Trial

    Device Security Scan

    Other Services

    PC Optimizer

    Virus Removal

    Features

    Keep Me Private Online

    Personal Data Cleanup

    VPN (Virtual Private Network)

    Safeguard My Identity

    Identity Monitoring

    Password Manager

    Protect My Devices

    Antivirus

    Web Protection

    Protect My Family

    Protection Score

    Parental Controls

    About Us

    Our Company

    Company Overview

    Investors

    Our Efforts

    Public Policy

    Join Us

    Careers

    Life at McAfee

    Our Teams

    Our Locations

    Resources

    Stay Updated

    McAfee Blog

    Reports and Guides

    McAfee Labs

    McAfee on YouTube

    Prevent Spam and Phishing

    Learn More

    Learn at McAfee

    What is Antivirus?

    What is a VPN?

    What is Identity Theft?

    Press & News

    McAfee Newsroom

    Why McAfee

    Support

    Help

    Customer Support

    FAQs

    Contact Us

    Activation

    Activate Retail Card

    My Account Login

    • Support
      • Help

        • Customer Support
        • FAQs
        • Contact Us
      • Activation

        • Activate Retail Card
      • My Account Login

      This site in other countries/regions:

      ASIA PACIFIC

      Australia - English

      New Zealand - English

      Singapore - English

      Malaysia - English

      Philippines - English

      India - English

      Indonesia - English

      대한민국 - 한국어

      日本 - 日本語

      中国 - 简体中文

      香港特別行政區 - 繁體中文

      台灣 - 繁體中文

      EUROPE

      Česká Republika - Čeština

      Danmark - Dansk

      Suomi - Suomi

      France - Français

      Deutschland - Deutsch

      Ελλάδα - Ελληνικά

      Ireland - English

      Magyarország - Magyar

      ישראל - עברית

      Italia - Italiano

      Nederland - Nederlands

      Norge - Bokmål

      Polska - Polski

      Portugal - Português

      Россия - Русский

      España - Español

      Sverige - Svenska

      Suisse - Français

      Schweiz - Deutsch

      Türkiye - Türkçe

      العربية - العربية

      United Kingdom - English

      LATIN AMERICA

      Argentina - Español

      Brasil - Português

      Chile - Español

      Colombia - Español

      México - Español

      Perú - Español

      NORTH AMERICA

      United States - English

      Canada - English

      Canada - Français

      What is malware and how cybercriminals use it | McAfee (2)

      Malware is a catch-all term for any type of malicious software designed to harm or exploit any programmable device, service or network. Cybercriminals typically use it to extract data that they can leverage over victims for financial gain. That data can range from financial data, to healthcare records, to personal emails and passwords—the possibilities of what sort of information can be compromised have become endless.

      Stay safe

      What is malware and how cybercriminals use it | McAfee (3)

      Why do cybercriminals use malware?

      Malware encompasses all types of malicious software, including viruses, andcybercriminals use it for many reasons,such as:

      • Trickinga victim into providing personal data for identity theft

      • Stealingconsumer credit card data or other financial data

      • Assumingcontrol of multiple computers to launch denial-of-service attacks against other networks

      • Infectingcomputers and usingthem to mine bitcoin or other cryptocurrencies

      How does malware spread?

      Since its birth more than 30 years ago, malware has found several methods of attack. They include email attachments, malicious advertisem*nts on popular sites (malvertising), fake software installations, infected USB drives, infected apps, phishing emails and even text messages.

      Types of malware?

      Unfortunately, there is a lot of malware out there, but understanding the different types of malware is one way to help protect your data and devices:

      Viruses

      A virus usually comes as anattachmentin an email that holds a virus payload,orthe part ofthemalware that performs the malicious action. Once the victim opens the file, the device is infected.

      Ransomware

      One of the most profitable, and therefore one of the most popular,types of malwareamongst cybercriminals is ransomware. This malware installs itself onto a victim’s machine, encrypts their files, and then turns around and demands a ransom (usually in Bitcoin) to return that data to the user.

      Scareware

      Cybercriminals scare us into thinking that our computers or smartphones have become infected toconvincevictimsto purchase a fake application. In a typical scareware scam, you might see an alarming message while browsing the Web that says “Warning: Your computer is infected!” or “You have a virus!”Cybercriminals use theseprograms and unethical advertising practices to frighten users into purchasing rogue applications.

      Worms

      Wormshave the ability tocopy themselves from machine to machine, usually by exploiting some sort of security weakness in a software or operating system anddon’trequire user interactionto function.

      Spyware

      Spyware is a program installed on your computer, usually without your explicit knowledge, that captures and transmits personal information or Internet browsing habits and details toitsuser. Spyware enablesits usersto monitor all forms of communications onthe targeted device. Spyware is often used by law enforcement, government agencies and information security organizations to test and monitor communications in a sensitive environment or in an investigation. But spyware is also available to consumers, allowingpurchasersto spy on their spouse, children and employees.

      Trojans

      Trojans masquerade as harmless applications, tricking users into downloading and using them. Once up and running, they then can steal personal data, crash a device, spy on activities or even launch an attack.

      Adware

      Adware programs push unwanted advertisem*nts at users and typically display blinking advertisem*nts or pop-up windows when you perform a certain action. Adware programs are often installed in exchange for another service, such as the right to use a program without paying for it.

      Filelessmalware

      Filelessmalware is a type of malicious software that uses legitimate programs to infect a computer.Filelessmalware registry attacks leave no malware files to scan and no malicious processes to detect. It does not rely on files and leaves no footprint, making it challenging to detect and remove.

      What is malware and how cybercriminals use it | McAfee (4)

      How do I know I’ve been infected with malware?

      The most common signs that your computer has been compromised by malware are:

      • Slow computer performance

      • Browser redirects, orwhenyour web browser takes you to sites you did not intend to visit

      • Infectionwarnings, frequently accompanied by solicitations to buy something to fix them

      • Problems shutting down or starting up your computer

      • Frequent pop-up ads

      The more of these common symptoms you see, the higher the likelihood your computer has a malware infection. Browser redirects and large numbers of pop-up warnings claiming you have a virusarethe strongest indicators that your computerhas beencompromised.

      How can I protect myself from malware?

      Even though there are a lot of types of malware out there, the good news is, there are just as many ways to protect yourself from malware. Check out these top tips:

      Protect your devices

      • Keep your operating system and applications updated. Cybercriminals look for vulnerabilities in old or outdated software, so make sure you install updates as soon as they become available.

      • Never click on a link in a popup. Simply close the message by clicking on “X” in the upper corner and navigate away from the site that generated it.

      • Limit thenumberof appson your devices. Only install apps you think you need and will use regularly. And if you no longer use an app, uninstall it.

      • Use a mobile security solutionlikeMcAfee®Security, available forAndroidandiOS. As malware and adware campaigns continue to infect mobile applications, make sure your mobile devices are prepared for any threat coming theirway.

      • Don’tlend out your phoneor leave your devices unattendedfor anyreason,andbe sure to checktheirsettings and apps. If your default settings have changed, or a new app has mysteriously appeared, it might be a sign that spyware has been installed.

      • If you don’t already have comprehensive security protection on all your devices, then try outMcAfee® Total Protection, which protects all your PCs, Macs, tablets and smartphones from online threats while safeguarding your data and identity.

      Be careful online

      • Avoid clicking on unknown links. Whether it comes via email, a social networking site or a text message, if a link seems unfamiliar, keep away from it.

      • Be selective about which sites you visit. Do your best to only use known and trusted sites, as well as using a safe search plug-in likeMcAfee®WebAdvisor, to avoid any sites that may be malicious without your knowing.

      • Beware of emailsrequesting personal information. If an email appears to come from your bankand instructs you to click a link and reset your password or access your account, don't click it. Go directly to your online banking site and log in there.

      • Avoid risky websites, such as those offering free screensavers.

      Pay attention to downloadsand other software purchases

      • Only purchase security software from a reputable company via their official website or in a retail store.

      • Stick to official app stores. While spyware can be found on official app stores, they thrive on obscure third-party stores promoting unofficial apps. By downloading apps for jailbroken or rooted devices, you bypass built-in security and essentially place your device’s data into the hands of a stranger.

      • When looking for your next favorite app, make sure you only download something that checks out. Read app reviews, utilize only official app stores,and if something comes off as remotely fishy, steer clear.

      • Do not open an email attachment unless you know what it is, even if it came from a friend or someone you know.

      Perform regular checks

      • If you are concerned that your device may be infected, run a scan using the security software you have installed on your device.

      • Check your bank accounts and credit reports regularly.

      With these tips and some reliable security software, you’ll be well on your way to protecting your data and devicesfrom all kinds of malware.

      ASIA PACIFIC

      Australia - English

      New Zealand - English

      Singapore - English

      Malaysia - English

      Philippines - English

      India - English

      대한민국 - 한국어

      日本 - 日本語

      中国 - 简体中文

      香港特別行政區 - 繁體中文

      台灣 - 繁體中文

      EUROPE

      Česká Republika - Čeština

      Danmark - Dansk

      Suomi - Suomi

      France - Français

      Deutschland - Deutsch

      Ελλάδα - Ελληνικά

      Ireland - English

      Magyarország - Magyar

      ישראל - עברית

      Italia - Italiano

      Nederland - Nederlands

      Norge - Bokmål

      Polska - Polski

      Portugal - Português

      Россия - Русский

      España - Español

      Sverige - Svenska

      Suisse - Français

      Schweiz - Deutsch

      Türkiye - Türkçe

      العربية - العربية

      United Kingdom - English

      LATIN AMERICA

      Argentina - Español

      Brasil - Português

      Chile - Español

      Colombia - Español

      México - Español

      Perú - Español

      NORTH AMERICA

      United States - English

      Canada - English

      Canada - Français

      What is malware and how cybercriminals use it | McAfee (2024)
      Top Articles
      Google Analytics  |  Google for Developers
      Bonds 101: Generating Income From Bonds | PIMCO
      English Bulldog Puppies For Sale Under 1000 In Florida
      Katie Pavlich Bikini Photos
      Gamevault Agent
      Pieology Nutrition Calculator Mobile
      Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
      Hendersonville (Tennessee) – Travel guide at Wikivoyage
      Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
      Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
      Craigslist Dog Kennels For Sale
      Things To Do In Atlanta Tomorrow Night
      Non Sequitur
      Crossword Nexus Solver
      How To Cut Eelgrass Grounded
      Pac Man Deviantart
      Alexander Funeral Home Gallatin Obituaries
      Energy Healing Conference Utah
      Geometry Review Quiz 5 Answer Key
      Hobby Stores Near Me Now
      Icivics The Electoral Process Answer Key
      Allybearloves
      Bible Gateway passage: Revelation 3 - New Living Translation
      Yisd Home Access Center
      Home
      Shadbase Get Out Of Jail
      Gina Wilson Angle Addition Postulate
      Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
      Walmart Pharmacy Near Me Open
      Marquette Gas Prices
      A Christmas Horse - Alison Senxation
      Ou Football Brainiacs
      Access a Shared Resource | Computing for Arts + Sciences
      Vera Bradley Factory Outlet Sunbury Products
      Pixel Combat Unblocked
      Movies - EPIC Theatres
      Cvs Sport Physicals
      Mercedes W204 Belt Diagram
      Mia Malkova Bio, Net Worth, Age & More - Magzica
      'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
      Teenbeautyfitness
      Where Can I Cash A Huntington National Bank Check
      Topos De Bolos Engraçados
      Sand Castle Parents Guide
      Gregory (Five Nights at Freddy's)
      Grand Valley State University Library Hours
      Holzer Athena Portal
      Hello – Cornerstone Chapel
      Stoughton Commuter Rail Schedule
      Nfsd Web Portal
      Selly Medaline
      Latest Posts
      Article information

      Author: Roderick King

      Last Updated:

      Views: 6491

      Rating: 4 / 5 (71 voted)

      Reviews: 86% of readers found this page helpful

      Author information

      Name: Roderick King

      Birthday: 1997-10-09

      Address: 3782 Madge Knoll, East Dudley, MA 63913

      Phone: +2521695290067

      Job: Customer Sales Coordinator

      Hobby: Gunsmithing, Embroidery, Parkour, Kitesurfing, Rock climbing, Sand art, Beekeeping

      Introduction: My name is Roderick King, I am a cute, splendid, excited, perfect, gentle, funny, vivacious person who loves writing and wants to share my knowledge and understanding with you.