Malware is short for Malicious software. It can be any program or software that is designed to harm your computer. There are many different kinds of Malware including viruses, trojan horses, worms, and exploits.
- Threat intelligence feeds updated every 5 minutes
- Data delivery using industry standard specifications (STIX, TAXII)
- Experience developing and operating automated malware analysis systems
- Active monitoring of OSINT
- Feeds verified internally as well as by vetted community members
- API delivery to seamlessly integrate into your existing solutions
- Custom threat feeds to fit the needs of your specific organization
If your server is compromised there can be many consequences including loss of customer data, website defacement and loss of intellectual property. Attackers often use hacked web servers to set up fraudulent Phishing sites, send spam or launching other attacks such as Distributed Denial of Service (DDOS).
If your hacked website is infected with Malware you run the risk of being blacklisted by Google, who are constantly scanning the web to identify suspicious activity. If any such activity is detected, Google will actually try to stop people from visiting your site by displaying a large warning page.
“We take aggressive manual action to protect people from security threats online, including Malware and viruses. This includes removing pages from our index, putting up interstitial warning pages and adding notices to our results page to indicate that, this site may harm your computer.” -Google
Attackers use a number of different methods. Some of these include vulnerabilities in your Content Management System (CMS) or blogging platform (ie. WordPress, Joomla), weak FTP credentials, vulnerabilities in dynamic code (such as PHP) and SQL injections.
If you have suffered an incident, generally a forensic analysis of your server and log files will be necessary to determine the exact nature of the breach.