How To Spot Malware

Spot Malware Head Explode ImageOn the internet, Malware can come at you in a lot of different ways. Many of us hear the term but don’t know what it is or why it’s such a big problem. I was reminded of it this past weekend when my wife and I hosted a couple of friends for dinner. One of them has recently retired from the military and is going to school to get some IT certifications. While discussing cybersecurity, one of them made the point that so long as you have an up-to-date antivirus program, Malware is not a concern.

My head exploded, and I started a rant that my lovely wife politely suppressed with very little carnage. Of course, rather than putting an end to the topic, it grew into a conversation. Living with me, cybersecurity discussions are an ever-present and looming danger – because awareness is important.

So let’s talk about Malware and how to spot it.

What is Malware?

This is an important place to start. Malware is a common term used to describe many different types of malicious software, including ransomware, viruses, and worms. And herein lies the problem – because Malware is composed of many different things, no one antivirus program will be able to protect you against all of it.

At its most basic level, Malware is intentionally hostile. It invades, disables, and causes damage to computers, servers, mobile devices, and networks. So let’s take a look at these different types of malware and what they do.

What is Malware Image

• Ransomware – this category also includes adware, spyware, and phishing scams. The goal of the malicious code is to gather information about you, including the things you do online and personal and business data. No matter who you are, all of it has value.

• Viruses – nasty code designed to spread from device to device to damage or disable systems. Spread with the help of people, viruses are almost always shared by those who are unaware of the infection in the form of weblinks, download files, and thumb drives.

• Worms – very similar to viruses, worms tend to target networks, spreading rapidly through connected devices. The worst part, it only takes one person to infect the network, and then it spreads all on its own.

Everything about it is vicious, especially how prevalent it has become. This malicious code has been written for every popular technological device that uses software with one goal, to make money. Whether it’s by stealing data, forcing payment, or utilizing resources, there are a lot of ways that hackers can use malicious code to make money at our expense.

Signs of Infection

At this point, it is common knowledge that computers progressively get slower as they age. A build-up of cache, installing apps and programs, and using up storage space is a natural part of that cause. Other things, such as poorly coded programs and failed updates, can cause strange problems that may or may not affect your ability to use the device.

So how do you know if the problem is a technical issue or malware?

There are usually clues that will tell you whether or not to worry, and they aren’t subtle. So let’s take a look at six of the more egregious.

Malware Locked Out1. Ransomware Demands

Yes, I started with possibly the most obvious sign of malware infection. There are several ways for this type of attack to be carried out. The most vicious is when a hacker encrypts your data, putting a message on your screen demanding payment in exchange for the encryption key. A more common type is a pop-up warning. These supposedly come from some law enforcement or government agency and state that someone used your computer to look at porn, illegally download media, or send spam. Once they scare you with that, they demand that you pay a fine or threaten to send you to jail.

Devices infected with ransomware are challenging to clean, and paying the ransom will rarely provide any resolution. As far as the hackers are concerned, if you’ve paid once, you will pay again. That makes you a persistent target.

If you do fall victim to ransomware, report it immediately to CISA at

2. Scary Warnings

This is one that we see brought into the office quite often. Known as Scareware, these infections commonly come from phishing emails, fake websites, and legitimate websites that have been hacked. A fake antivirus program will then display made-up threats inside frightening warnings to get you to pay for upgrade tools that will fix the problem. Since none of it is real and hackers control it after you pay for the tool, the message will go away, and later another will pop up, later telling you to upgrade the tool again to fix the new problem.

This process goes on and on as long as you continue to pay. The best way to beat this is to get a good antivirus program, keep it updated, and go to it directly when you see something pop up. Never click on the links.

Malware Ads Popup3. Popup Ads

Most websites these days have some type of popup. The more common popups ask you to register for newsletters, provide reviews, leave comments, or legally notify you that they use cookies to track you. All of these are legitimate popups that will go away once you close them. However, some malicious websites run by hackers get an affiliate fee if you click one of the ads. For this reason, they will bombard you with ads. Some of these ads might be for legitimate companies, but many are fakes and will infect your computer with other kinds of malware.

If your computer suddenly starts running drastically slower, and you see lots of popups on every website, there’s a good chance malware has infected your computer.

4. Redirected Browser

Each time you open Chrome or Firefox or Safari, or whatever browser you like, it opens to a home page. Some people set specific home pages, and others simply leave it at the default. If that home page changes randomly, opens multiple tabs, or reverts after you make a change, there’s a good chance malware has infected your computer. Aside from potentially taking you to a fake page that will infect your computer with more malware, the most significant danger here is impersonation websites.

If you enter your credentials into a fake banking website, for example, there’s a pretty good chance you’re going to find the account emptied by cybercriminals.

5. Disabled System Tools

When you install software, open Task Manager to stop a malfunctioning program, or check update settings, you are using System Tools. There are several different tools that you might use based on your experience level. If you suddenly find yourself unable to use these tools, there’s a good chance malware has infected your computer. It seems like something out of science fiction, but some forms of malware will try to keep you from disabling them by taking away your access to the System Tools.

Malware Straneg Socila Media Posts Image6. Strange Social Media Posts

More and more malware is written for social media. Many of them are fake posts that include inflammatory language or outrageous political claims. By clicking on them, your social media account will start to propagate these to your friends and family. Many of these also include more malicious types of malware that can infect computers. People love to share things on social media, which makes this very difficult to defend against.

If you start getting responses to posts you didn’t make, there’s a good chance malware has infected your computer.

Mitigating the Damage

Many forms of malware rely on you to click on something. Even if you go to a fake or infected website, most of the time nothing is going to happen until you click on an infected link. And unfortunately, this is where antivirus often fails. Antivirus programs scan your system for installed threats, but they can’t always keep up with every click as you surf the internet. Some of these malware threats live in cookies or browser extensions and don’t actually install anything on your computer specifically to bypass the antivirus.

If you do find yourself facing one of these threats, close everything down and run a scan with your antivirus. Very often, that will take care of the problem. If not, start checking your finances to make sure nothing is being actively stolen and get some help to get the computer cleaned up.

5 1 vote
Article Rating
Notify of
Inline Feedbacks
View all comments