Destructive malware is malicious code that is designed to destroy data. Destructive malware impacts the availability of critical assets and data, presenting a direct threat to an organization’s daily operations.

Common functions of malware include:

Overwhelming System Resources

Running Malicious Adware

Running Spyware

Running Ransomware

Creating Backdoors

Disabling Security Functions

Creating Botnets

Sources of Malware

Removable Media-  Boot Sector Virus  ie;Elk Cloner from floppy disk or USB drive

Documents and Executables- doc, exe files. Don’t share. Must be opened

Internet Downloads- Trojan Horses. nly download from recognizable vendors

Network Connections- Worms. Exploit a known security issue. Always use firewalls and patches

Email-Social Engineering  Love Bug Worm  .vbs

Drive-By Downloads-Visited website. Always know where you’re going

Pop-Ups- ie..Scareware

Malicious Advertisements-Banner ads directing to drive by download site ad blocking software

How to Avoid Malware

System Back-Up-CD, Flash drives, Cloud

Firewall Controls incoming requests, not outgoing

Install Software Patches update known weaknesess

Anti-Virus Software-Analyzes lines of code

User Education-End users should be taught how to identify possible malware