Home / News / That way it stays hidden

That way it stays hidden

116
Laptop with warning icon surrounded by viruses

If you’re old enough, you might remember a time when malware created pop-ups, deleted data, or even locked your computer. However, modern malware is much more stealthy and tries to minimize the impact on someone’s PC.




But why is new malware being developed to be hidden from the user, and what does it say about today’s cybercriminal world?


Why modern malware is more stealthy than old malware

“”>

Laptop with warning <a href=icon surrounded by viruses” src=”https://static1.makeuseofimages.com/wordpress/wp-content/uploads/2024/09/a-laptop-with-an-alert-icon-surrounded-by-viruses.jpg” style=”display:block;height:auto;max-width:100%;”/>
corridor / Shutterstock

While older malware typically focused on destroying data, that changed when cybercriminals learned that they could make money off of their creations. Why do random damage when you can use your skills to get extra income instead?

To maximize the amount of money malware can make for its owner, they are often designed to hide from the user. The longer malware stays on a PC, the more money it can make for its creator.


This is not to say that all money-making malware is designed to be silent. When a strain is designed to instill fear in the user, it often makes itself known very well. Examples include ransomware and fake antivirus scan results that make it clear that it wants you to pay. However, they will mostly try to remain undetected for as long as possible.

Cryptojacking

Cryptojacking malware wants to keep a low profile because it makes money for its developers. It sits on your PC and uses its resources to mine cryptocurrency, which is sent to the malware developer. The longer cryptojacking malware goes unchecked, the more money it makes.

Botnets

Botnet malware stays hidden because its owner sends commands to your computer. If unchecked, a computer “recruited” into the botnet can send spam emails or perform Direct Denial of Service (DDoS) attacks against services. As long as the malware remains on the computer, it is part of a larger botnet.


Theft of sensitive information

Some types of malware collect information from you. This includes keyloggers that sit quietly on your computer and transmit your keystrokes to cybercriminals or banking Trojans that aim to steal credentials for sensitive services. Everything from your credit card information to your account credentials is transmitted back, and if it’s not deleted, it can harvest as much as it wants.

How modern malware evades detection

and muhamad_khotibul<\/a> \/ Shutterstock”>

khunkornstudio and muhamad_khotibul / Shutterstock

Malware not being detected may sound strange, given that antivirus programs have never been better. However, cybercriminals use some tricks to bypass your defenses.

Using fileless malware

Fileless malware can bypass antivirus programs because they don’t place any files on your computer. Instead, everything runs in your computer’s memory (RAM), where the antivirus doesn’t look for it. From there, he can perform additional attacks without being caught.


Fileless malware can be difficult to detect and remove, so the best way to prevent infection is to pay more attention to common malware sources.

Impersonating legitimate apps

Cybercriminals sometimes create an app that appears to be legitimate. They copy the real app or find a popular service without an app and create a fake one. For example, a malicious Google Play Store app stole $70,000 by pretending to be an official app for a cryptocurrency service..

To avoid falling into the trap of a cybercriminal, see how to spot a fake Android app to better defend yourself.

Search for unsecured targets using an Internet connection

Sometimes cybercriminals don’t have to do anything fancy to spread their malware. With the rise of smart homes and Internet of Things (IoT) devices, we are seeing a flood of gadgets accessing the internet without a properly secured connection. Cybercriminals can then hijack these devices for their own use without being detected, such as using IoT botnets.


Always remember that your device’s connection to the Internet is bidirectional. If you buy an Internet-connected gadget, make sure it’s from a brand you trust. This goes double for any device that has the potential to invade your privacy if it falls into the wrong hands, such as smart home cameras. And if the thought of a hacker gaining access to your device gives you chills, it’s probably best to go for an alternative product that doesn’t connect to the internet, such as a gadget that runs on your local network.

Now that bad actors are using their abilities to make money, most malware is much more sneaky than its older counterparts. The best way to avoid dealing with a stealth virus is to make sure you don’t catch it in the first place, and with some knowledge you can protect yourself against these new strains.

Comments