"So much malware, what do I do?"

"So much malware, what do I do?"

Malware is the common term covering all malicous programs written with the intent of obtaining data and corrupting a system.

Below is a list of the different variants you need to be aware of:

Macro viruses 

Written in macro language such as VBS (Visual Basic Scripting). Macro Viruses are usually platform independent since many apps allow macro programs to be embedded in documents. Programs may run automatically once a document is opened (word, excel), then the VBS scripts will begin to make their way into your system.

Stealth Viruses

A computer virus whichy stealthily hides its modifications. It tries to trick antivirus software by intercepting its request to the OS and provide false information.

Polymorphic viruses

This type of virus produces a variety of altered operational copies of itself. It is possible for there to be no identical parts between two different infected copies. This makes it very difficult to detect directly using signatures and anti-virus software.

Self-garbling viruses

Attempts to hide antivirus software by modifying its code to not match pre-defined antivirus signatures.

Bots & Zombie

Collection of hacked devices under commanded control of a hacker. Compromised machines may be part of a bot network or a zombie.


A virus that spreads from one machine to another on a network.

Root Kits

The worst software based malware. Usually embedded into the kernel of the ODS therefore can conceal itself completely from the OS.

Firmware Rootkits 

The Worst of the worst. Within your hard drives firmware chip, you may have some malware. Formatting your drive and re-installing the OS will not shift it. This type of malware is NSA, GCHQ standard. However, podcasts and papers have been produced on how to counter it. IT Specialists of note may have taken the time to learn how to remove it.

Key Loggers

Logs your key strokes and what you type into your browser.

Trojan Horses 

Appear to be one thing but are in fact malware. If you download a piece of software, a trojan acts as the software but has malware attached.

Remote Access Tool (RAT) 

Malicious programs that run on your system allowing intruders to access your systems remotely. Similar to remote admin tools but hackers are using them. These can be bought and also downloaded.


Cyber criminals often combine different types of malware to launch a multi-faceted attack on your systems. The ability to recognise various attack methods is as important as the technology you choose to protect your business infrastructure. Here's some strategies a hacker might use against you which are worthy of knowing.


Mitesh Patel

Managing Director

Mitesh Patel