intial post + 2 responses, see attached.
What are the top five computer malware infections in the last year? How could they be avoided? Please use outside research to back up what you say and be sure to cite your sources.
The top five malwares in the last year was Emotet, Kovter, Ryuk, Zeus, and Dridex. These can be avoided by some of these steps. Step 1, you can protect your computer by running anti virus and antimalware software like Bitdefender or Norton. These programs can block malware from being installed and can remove it if it does get into your computer. Step 2, back up your files because some malwares can delete or corrupt data on your drives. Preparing for possibility of data loss is much easier and cheaper than attempting to recover data after a malware attack. Step 3, avoid suspicious links because most malwares require you to click something to download and install it. These links are often disguised as something they are not. Step 4, shop from home and try to avoid shopping when connected to a public Wi-Fi network or when using a public computer, such as a library computer. Public computers and Wi-Fi networks are at a slightly greater risks for hacking, which could put your information at risk.
https://resources.infosecinstitute.com/topic/top-6-malware-strains-to-watch-out-for/
https://edu.gcfglobal.org/en/internetsafety/how-to-avoid-malware/1/
According to CIS (Center for Internet Security), who keeps a monthly track of the top 10 malwares each month, the following 5 seem to keep showing up month after month:
1. Shlayer which is a downloader and dropper for MacOS Malware
2. CoinMiner which is a cryptocurrency minner that uses Windows Management Instrumentation (WMI)and EternalBlue to spread across a network.
3. Agent Tesla is a RAT that exfiltrates credentials logs keystrokes and takes screenshots of infected computers.
4. NanoCore, which is a RAT spread via malspam as a malicious Excel XLS spreadsheet. It can accept commands to download and execute files, visit websites, and add registry keys for persistence.
5. Gh0st is also a RAT. It is used to control infected endpoints and creates a backdoor to allow an attacker to take complete control of the computer.
How to avoid? Firewalls, anti-virus and anti-malware programs are all good starts. From there, be aware of your browsing habitats by making sure you are visiting reputable sites, watch out for spam emails and be aware of popups. All these are used to spread Malware. It is also always a good idea to keep your computer systems and browsers up to date.