<

Malicious Software: Best Practices Against It

In Brief

Malicious software represents one of the greatest threats to the whole IT system, regardless of its size. All types of operating systems are at risk, and all administrations, municipalities and companies can succumb to it.

Since they first came into existence, cybercriminals have become significantly more sophisticated in the way they work and target their victims. Malicious software (also called as ‘malware’), which is one of their main tools, has naturally benefited from this. Nowadays, you will no longer find malicious software written for purely entertainment purposes. Currently, the most widely used malicious codes on the market are variations of the Trojan horse, which grant access to devices so they can be used either for illicit purposes or to steal confidential information.

Today, these malicious codes are primarily used to:

They present a large and omnipresent threat. Without preventative-, protective-, and curative measures, an entity risks being considerably impacted.

Infection Vectors

There are several ways to infect a computer. The most commonly used are as follows:

Impacts

As there are malicious codes all over the Internet, the chances of encountering one are extremely high (EBIOS threats, remote listening, software trap).

The impacts caused are usually:

Behavioural Measures

Whether the attack is targeted or opportunistic, a large number of malicious codes infiltrate their victims’ devices via infection vectors that play on human vulnerabilities.

Before publishing malicious software, its authors check to see if it can be detected via websites such as www.virtest.com.

The codes then often remain invisible to antivirus software for at least the first few days of the attack, which is enough time for the antivirus to collect the updated signatures. 

It is, therefore, vital for any organisation to train their employees and make them aware of the risks incurred by malicious codes and of commonly used infection vectors.

Preventing Infection

Infection with malicious codes can be prevented through responsible and careful behaviour when using email, removable devices, and when surfing the Internet.

Make sure you:

When surfing the Internet: 

When travelling or on business trips, make sure you: 

You should also remember that even equipment located within the organisation can be easily infected if ill-intentioned people gain access to it. (SMEs see: Infiltrating the premises and Insertion or removal of hardware and Use of unapproved software).

Minimise the Impacts

Each employee should know how to act in case of infection:  

Organisational Practices

To prevent infection by malicious codes, organisational measures must be implemented. Draft and enforce the following sectoral policies:

Technical Measures

In addition to behavioural and organisational measures, it is important to put in place technical measures to help prevent infections and reduce the impact of a potential infection.

The installation of the following technical measures is recommended:

Virus Removal

See: SOS – I think my computer is infected.