Understand why hackers create Malware like Worms, Trojan Horses, Virus

BPB Online
2 min readAug 24, 2021

--

Viruses, worms, Trojans, and bots are all part of a software called “malware.” Malware stands for “malicious software,” also known as malicious code or “malcode.” Besides these, Cyberstalking, Intellectual property theft, Salami attack, e-Mailbombing, Phishing, Identity theft, Spoofing, etc are some of the commonly used malware.

Virus is created and used to create and exploit vulnerabilities in computers in order to have unauthorized control and illegal access remotely. These are the malicious programs spread across the computers and networks and cause potential damages from corrupting software to ruining stored data. Computer virus spreads itself through removable media, downloads and attachments with e-mails and creates multiple copies of itself in the targeted system without the user’s knowledge.

Virus is required to be executed at least once to create its multiple copies and attaches itself with system files to initiate the replication process. A Worm is capable of replicating itself and does not require human efforts to cause damages. It sends multiple copies of its own computer-to-computer and does not attach itself to system files. Trojan Horse is malicious code but looks legitimate. It does not replicate itself and spreads across the network with human efforts such as opening an e-mail, downloading a file, and installing software. Indeed, viruses, worms, and Trojan Horses follow different approaches in their replication but work for common objectives.

These common objectives are as follows:

  • Generating irritating messages and popping up windows
  • Deleting, modifying, renaming, hiding, and replacing stored files
  • Depleting attached resources such as drives storages and network bandwidth
  • Overloading the whole network
  • Vulnerabilities creation and exploitation
  • Transferring controls to remote computers and criminals
  • Disrupting control and security settings
  • Damaging computer attached hardware resources
  • Damaging network resources

If you are interested in pursuing a career in cybersecurity then you should read the “Cybersecurity Fundamentals” book. This book starts from the basics of data and information, includes detailed concepts of Information Security and Network Security, and shows the development of ‘Cybersecurity’ as an international problem. Click on this link to get a Free Preview of Cybersecurity Fundamentals.

--

--

BPB Online
BPB Online

Written by BPB Online

Enabling IT Students, Professionals & Developers by creating a 360˚ learning experience — Books | eBooks | Video Tutorials | Articles

No responses yet