Course Content
Knowledge check & certification
0/1
Cybersecurity 101

🧨
Module 3 · Lesson 3.2
Malware & Ransomware risks
Malware steals, spies, and disrupts. Ransomware locks systems to force payment. Safe habits + fast reporting reduce impact.
Always watching. Always protecting.

🧠
In plain language

Malware is harmful software that can steal information, spy on activity, or disrupt systems.
Ransomware is malware that encrypts files/systems and demands payment.

If something looks suspicious, stop and report immediately. Early reporting reduces spread and recovery time.

🦠
Malware
Steals, spies, disrupts, or creates hidden access.
🔒
Ransomware
Encrypts and locks access to force payment and pressure.
🚨
Fast reporting
Helps contain spread and reduces downtime.

🦠
Malware
Steal • Spy • Disrupt
What it does
Steals data, spies on activity, disrupts systems, or creates hidden access.
Common signs
  • Device suddenly slow or unstable
  • Unexpected popups or installs
  • Unusual logins or account activity
Response: Stop and report. Don’t troubleshoot beyond approved steps.
🔒
Ransomware
Encrypt • Lock • Pressure
What it does
Encrypts files/systems and demands payment. May also threaten to leak data.
Common signs
  • Files won’t open or extensions change
  • Ransom note appears
  • Sudden mass file changes
Response: Report immediately. Rapid containment reduces spread and recovery time.
🧩
How infections typically happen
  • Malicious attachments or links
  • Unapproved software downloads
  • Compromised websites
  • Infected USB devices
  • Credential theft followed by unauthorized access

If something creates urgency, slow down and verify before you click.

Why it matters
  • Operational downtime can delay response and support
  • Data exposure creates compliance and contractual risk
  • Customer trust is hard to earn and easy to lose

🕵️
Spot the infection vector
Choose the most likely way malware entered in each scenario.
Scenario A

You receive a vendor “invoice” email with a .zip attachment and urgent language.

A) Malicious attachment download
B) USB infection
C) Physical break-in
Scenario B

You install a free “file converter” from an unknown site. Your device becomes slow and ads appear.

A) Unapproved software install
B) Secure company update
C) Correct MFA approval
Scenario C

You receive repeated MFA prompts you didn’t initiate. Later, you see unusual account activity.

A) MFA fatigue / credential attack
B) Printer malfunction
C) Monitor brightness issue
Tip: If you’re unsure, treat it as suspicious, stop, and report.

Answer key
Scenario A: A) Malicious attachment download
Urgent messages with compressed attachments are a common malware delivery method.
Scenario B: A) Unapproved software install
Unknown “free tools” frequently bundle malware or adware. Use approved software only.
Scenario C: A) MFA fatigue / credential attack
Repeated prompts you didn’t initiate can indicate an unauthorized access attempt.
Remember: Don’t troubleshoot beyond approved steps. Stop and report immediately.

💬
Quick scenario
You open an attachment and your device freezes. Files become inaccessible.
Correct response: Stop activity and report immediately using the approved process. Follow IT/Security instructions.

Key takeaway

Malware and ransomware can spread quickly. Safe habits reduce risk — and fast reporting reduces impact and recovery time.

If you suspect malware: Stop. Report. Follow IT/Security guidance.

Always watching. Always protecting.