Report Incident
× Home Cybertech Africa 2023 2 DPO Rw-CSIRT Website About Rw-CSIRT Alerts Advisories About NCSA Documentation News & Events Topics Contact us Opportunities Privacy Policy

What is malware and how can your device get infected?

Kinyarwanda version
 
Malware refers to any malicious software developed by cybercriminals to steal data and corrupt, disrupt or destroy computers, systems and networks.
 
Some of the most common forms of malware are:
 
Virus
Malicious software attached to a document or file that can execute its code.
 
Worms
Malicious software that rapidly replicates and spreads to any device within the network.
 
Trojan Virus
Virus disguised as helpful software programs.
 
Spyware
Malicious software that runs secretly on a computer or phone and reports back to a remote user.
 
Adware
Used to collect data on your computer or phone usage and provide advertisements.
 
Ransomware
Gains sensitive information and encrypts the information before demanding a financial pay out.
 
Fileless malware
Malware that operates from a victim’s computer memory.
 

Here are four of the most common ways devices get infected and how to prevent them.
 
Downloads of malicious applications
You should not assume an app is completely safe because it is on an official app store.
 
If you are using Google Play Store, look for the ‘Verified by Play Protect’ text just under the app name as it installs. This runs a safety check for malware on the app you wish to download before it appears on your device.
 
When downloading from Apple’s App store, check ‘What’s New’ > ‘Version History’ to see its most recent updates. An application with many regular updates is much more likely to be safe than an application with none or significantly less versions.
 
Also read the app permissions before opening an application to determine whether the access seems malicious, and review the app description and contact info to see if this information is lacking or seems unofficial.
 
Using unknown USB flash drives
Cybercriminals use lost flash drives to trick people into plugging a compromised device into their computers and receiving malware.
 
If you find a USB flash drive at work, hand it into the appropriate authorities (security personnel or local IT department). If you are in public, hand the USB stick into the nearest lost and found.
 
As an additional best practice, install anti-malware/anti-virus software on your device so that it can scan for malware whenever a removable device is connected.
 
Phishing attacks
Pretending to be from a trusted institution and sharing phishing one of the most common ways cybercriminals infect devices with malware.
 
Scan every email you receive for suspicious signs that may indicate a phishing scam:
  • Spelling errors
  • Poor grammar
  • Urgency
  • Generic greetings like ‘Dear Customer’
  • Sender name not matching with the sender email address
  • Incorrect email address domain
 
Fraudulent websites
Fake websites, or impersonations of websites from famous brands or organizations, are likely to be filled with malware.
 
Instead of following links, where possible, search for the official domain by typing it into a search engine or typing manually into the address bar.
 
Installing end-point protection software or an antivirus will protect you from most of these threats as it will block you from accessing known malicious websites.

07 July 2022

© 2024 National Cyber Security Authority