How to Prevent Malware Attacks

 

Malware is probably the cyberthreat non-cyber security professionals know best. Its visibility is due to its success: Malware is a ubiquitous and ever-evolving danger to computers, networks, and organizations worldwide. In 2019, experts identified around 150,000 new malware variants. By 2020, that number jumped to 270,000. The threat posed by malware grows every year, so security teams must learn the latest on how to prevent malware attacks.  

This article will explain what malware is, review the different types of malware, provide some recent examples of malware attacks, and give you an up-to-date list of malware prevention tips.

Jump to a section…

What Is Malware?

What Types of Malware Are There?

Examples of Malware Attacks: Ransomware

How to Prevent Malware Attacks

Putting Malware Prevention Techniques into Action

What Is Malware?

Malware is malicious software used by cybercriminals to disrupt, damage, or exploit an endpoint or network. Malware can be used to steal or destroy data, encrypt information, spam users, spy on users, extort money, take over a system, or change how a system works. Malware can access computers or networks using various methods, including infected email attachments, advertisements, applications, and websites. 

Before we dive into the ways to prevent malware, let us look at the different types of malware.

Back to top

What Types of Malware Are There?

The list below covers the significant categories of malware that all cybersecurity professionals should know. 

Viruses: The classic form of malware, viruses function much like their biological namesake. They can infect an endpoint, proliferate throughout the system, and change how it works. They can also multiply and spread from system to system in a network. 

Worms: Worms behave much like viruses, infecting, multiplying, and spreading through network endpoints. Unlike viruses, they do not need to be attached to a program or activated by a user to metastasize — an attribute that makes them particularly destructive.    

Ransomware: This increasingly popular malware uses encryption to block legitimate users from being able to access their systems, devices, or information. The attacker will only return control to the rightful users only if their demands are met. To add pressure, cybercriminals often threaten to destroy or release the data.  

Spyware: This is malicious software that can steal data and monitor user activity, like specific keystrokes. Spyware can also tap into computer cameras and microphones. The data gathered using spyware could be valuable or could help break into the system — for example, when log-in information is stolen.

Adware: While not as dangerous as the other types of malware on this list, adware can cause a high degree of frustration. Once adware infects a computer, the user’s online activity data is compromised and used to force the user to view advertisements.  

Trojans: Like the battle strategy of legend, trojans disguise themselves as something a user wants, like a software update, to gain access to a system. This can open the gates to additional cyber attacks like ransomware or spyware.  

Rogueware: Much like trojans, rogueware lures users into comprising their systems through a ruse. In this case, the counterfeit is a malware alert. Once the user clicks on this notice, the device is infected. 

Back to top

Examples of Malware Attacks: Ransomware

As we mentioned above, the use of ransomware in malware attacks has snowballed in recent years. Statista reports that there were 304M ransomware attacks in 2020 — up from 184M in 2017. Here are a few ransomware attacks that have grabbed headlines: 

Ransomware attacks have become adept at disabling the security software running inside target endpoints. This was particularly notable in the Hades cases, where the malicious actors knocked out both the antivirus and the endpoint detection & response (EDR) software that was in place. As we will cover later in this article, this is an important reason why it is essential to include edge protections in your security stack that are unable to be corrupted by infected endpoints. 

Back to top

How to Prevent Malware Attacks

Cyber security professionals should use security software, strong password practices, multi-factor authentication, employee education, and microsegmentation technologies to protect their organization from the spread of malware. They should also enforce safe browsing and email client use, keep IT systems and software up to date, and eliminate unused programs. Malware prevention is a full-court press, requiring several elements working in tandem to maximize protection.

Now, let us take a look at each of these malware prevention best practices in turn. 

Use security software: While not the whole solution, security software is an essential layer of your malware defense. Use antivirus, anti-malware, anti-ransomware, and other anti-exploit software to help detect threats and protect your network and each of its components from the initial infection of a malware attack. You should have tools to safeguard your browsers, endpoints, servers, and the entire network from compromise. 

Use strong passwords and secure authentication: Make sure you employ best practices for password construction. Passwords should be longer than eight characters and use various letters, numbers, cases, and symbols. Your password should be unique and refreshed regularly. They also shouldn’t be recorded anywhere that is discoverable. Because managing all this data can be a headache, considering using a password manager to keep your credentials organized. 

Also, because even the most robust password can be stolen, use multi-factor authentication to add another layer of security so that privilege escalation can be protected against during the initial stages of a malware compromise. 

Educate your users: While not necessarily part of the security team, every user on your network plays a vital role in protecting the organization from cybercrime. The only way users can fill those shoes is if they are cybersecurity literate. Your users should learn common cyber threats, cybersecurity best practices, important trends, warning signs, and how to report something they find suspicious. By holding regular training sessions that cover these vital topics, you effectively multiply the size of your security force.  

Enforce safe browsing and email: You can neutralize much of the threat malware poses by making sure users follow safe browsing practices and keep an eye out for strange-looking emails. Make certain users scrutinize any emails they receive, looking for unfamiliar email addresses, unusual formatting or spelling in the text, or odd requests — like sharing confidential information. Users should apply equal scrutiny when it comes to internet use. They should never connect to a public wifi network or visit any website that doesn’t have “HTTPS” in the URL.    

Maintain up-to-date software in use and look for shadow IT: Make sure to install any new version of whatever software, systems, browsers, etc., you use almost immediately. As updates often include new security features and fewer vulnerabilities, failing to do so is opening your network up to attack. The other components of this strategy is to make sure you remove any technologies that are no longer in use as older software often has numerous vulnerabilities, and look for shadow IT (those technologies used outside of IT’s control) to further reduce the likelihood of compromise. 

Implement edge microsegmentation: As we noted above in our review of recent ransomware attacks, relying on endpoint security software alone to prevent the spread of malware through networks is not enough: Implementing edge microsegmentation adds a physical layer of defense using hardware, which cannot be bypassed or corrupted by an infected endpoint. By dividing a network into nodes and physically insulating nodes from each other, edge microsegmentation also optimizes threat containment so as to prevent the malware from spreading in the later stages of a compromise.

The Byos µGateway uses edge microsegmentation and hardware-enforced isolation to maximize the defensibility of each endpoint in your network. Affording features like lateral movement prevention, ransomware killswitch, and protection from exploits often found on Wi-Fi networks outside IT’s control, the µGateway is a comprehensive containment solution for the rampant spread of malware within today’s networks. 

Back to top

Putting Malware Prevention Techniques into Action

We hope this article has given you a thorough overview of how to prevent malware attacks. The networks of cybercriminals who create malware are constantly ideating and testing new attack methods. It is crucial for security professionals to adopt a holistic approach to building, maintaining, and evolving their cyber defenses. 

One of the newest and most powerful pieces of that arsenal is security hardware like the Byos µGateway. This patented solution secures endpoints on networks you don’t own and can’t trust, isolating them from malware that are leveraging the network to spread. Ready to learn more? Get started.

Back to top

How to Protect Against Rogue Access Points on Wi-Fi

How to Prevent a Man-in-the-Middle Attack