How and where do hackers hide malware?

 Did you ever wonder how hackers hide malware on your devices?


where do hacker hide malware:


Hacker can hide malware on different places. Some common places are 

  • Websites
  • Hiding in plain site
  • Email attachments
  • Social media links
  • Embed in Images
  • Social engineering
  • Fake apps
  • drive by downloads
  • Fake updates
  • IoT devices



Websites:

Hackers hide the malware on websites. They hide the code on the legitimate website when you visit the website the malware installs on your device.

Hiding in plain sites:

Hackers can often disguise the malware on the harmless file like images or documents, when you open the file, the malware installs on your device or harm your device.

Email attachments:

Hackers can also send malware in email attachments. This is often disguising as a harmless file. when you open the attachment file the malware install on your device.

Social media links:

Hackers also use the links to send you a malware. They spread links on the social media when user click the link the malware directly installs on user's device.

Embed in images:

Hackers also embed the malware on the images. They hide the malicious code on the image's code, when you download the image, it is also installed on your device.

Social engineering:

Hackers use social engineering to trick you send the malware. They may send you an email that send you by a legitimate company and give the link that will download malware on your computer.

Fake apps:

Fake or off-brand apps are another way to install malware on your device. They look like the legitimate apps when you install them the malware also install on your computer.

Drive by downloads:

Hackers also send you a malware by drive by downloads. In this hacker add malicious code on the websites when you visit the website its code installs on your computer.

Fake updates:

Hacker uses fake updates of the applications and programs when you try to update them u are actually the download and install the malware on your device.

IoT devices:

IoT devices are another target for the hackers they use them to gain access to your computer or other devices connected to it to send you a malware.



How do hackers hide their malware?


  • Compress packers
  • Obfuscation
  • Encryption

Compress packers:

a packer is a program that make the code smaller. the compress executable work at runtime. The act of compression changes the way the executable file looks. That mean the virus scanner cannot scan the virus because it cannot recognize the packer.

Obfuscation:

It is a technique use to make code difficult. it is often used to detect malware more difficult and analysis. Hackers often use it to make it difficult for anti-virus software to detect malware.

Encryption:

encryption is a key to data unreadable to anyone who don't have any decryption tool. Hackers use it to make more difficult to detect and analysis the malware.


How to stay protected from malware:

  • Never download and open attachments that send by unkown sender
  • Dont browse to pirate site to get paid softwares 
  • Keep your applications and OS update with latest version.
  • Avoid open unknown and suspicious links.
  • Keep your system equipped with a robust anti malware solution.

Comments