Malware & Viruses: What’s the Motivation

September 18, 2018 8:25 pm

Every few months, it seems like a new computer virus or other malicious attack becomes present on the web. Moreover, there are currently thousands of viruses and malware floating around on the Internet. Thinking about this, the thought of their origination crossed my mind – why do these things exist, and who’s behind it and why? Nobody looks to intentionally infect their computer with a virus or other damaging software, so why, then, would someone develop and upload a virus link to the Internet to be downloaded en masse by unsuspecting victims? Let’s take a look:

To Make Money

hacker stealing money

There are a number of ways by which a computer virus can generate money for the attacker. For example, an infection can mimic a virus removal software and “scan” your computer. Once the fake scan is complete, it will say that it has found viruses and will remove them if you purchase the full or premium version of the software. Unbeknownst to gullible users, the money goes straight to the attacker, and your computer is still infected. Moreover, it can be impossible to get your money back, especially if the attacker is elusive in his ways.

To Steal Information

data breach lock icon
data breach lock icon

Another reason why hackers push out attacks is to steal information, like credit card numbers, login credentials, lists of contacts, and other sensitive information. What they plan to do with this information is entirely up to them – they may hold it for ransom, they may use it for identity theft purposes, or they may use it for themselves to make purchases or sell to other people. Sometimes they will even hold your information and monitor you, waiting for the moment they think is right, or waiting until you reveal even more information over time.

To Cripple a Network or Server

Another common attack is called a Trojan, which infects potentially thousands of computers. What makes this attack stand out from others is that it can lay dormant for a time while it awaits a command from the attacker. Once the command is sent out, the trojan is activated on every infected computer and creates a system, called a botnet, that sends a little information from each computer to a server. However small the bits of information may seem, the sea of information hitting the server at once can overload it, effectively disabling it. The end game may be, for example, to disable a specific website until the owner/operator meets the attacker’s demands.

Some People Just Like To Watch the World Burn

chaos

Finally, in some cases, the attacker may just want to prove himself. Some people genuinely enjoy wreaking havoc, and infecting computers may give them an outlet to do so. In other cases, whitehat attackers may aim to do good by exposing vulnerabilities in computer software code and alerting the company so it can develop and roll out a fix or patch with a software update.
There are different motives behind every attack, and it’s worth it to know what drives attackers to infect computers. As a computer user, you can stay safe from attacks by installing antivirus and antimalware that regularly scans your computer and actively monitors the websites you visit for any malicious activity going on behind the scenes. 

Categorised in: , , , ,