VECTOR

WHAT

HOW

Trojans

Trojans are a staple attack vector. Trojans are malware that disguises themself as useful software.

Teens may download games or entertainment from free distributors and unknowingly infect their devices. To improve performance, the teen may also alter the home router’s configuration settings, which inadvertently downgrades security or weakens firewalls. WFH devices are commonly configured to block downloads, but the impact of a successful intrusion over the home network is immense.

Worms

Worms are one of the most destructive malware. Worms are able to travel over networks without any action by users on devices.

Without any actions by the teen, a teen’s device infected with a worm can allow the worm to migrate to the home router. Thereafter it can travel over the home network onto a WFH device, infecting a corporation. While corporate VPNs attempt to keep connections mostly private, worms and viruses often are able to infiltrate systems before the transport layer of the OSI model.

Adware

Adware is a common malware and generally low impact. A downloaded trojan may run adware, displaying ads and using up device resources. WFH devices are commonly configured to block adware.

A teen incentivized by a time-based shopping deal can act rashly. For example, a lightning deal on a hot sneaker at a deep discount. The link may be forwarded to a parent to purchase the product, and by chance, if the parent is on work hours, the link may be opened on a WFH device. This link can compromise the device and the corporate network.

Spyware

Spyware is a high-impact malware that is difficult to trace. Spyware may run in the background of a device, storing and transmitting all user input. A keylogger can capture usernames and passwords when typed in.

A teen’s personal device infected with spyware could be used to capture network traffic and compromise a WFH device, capturing corporate login information. Although the WFH device is likely protected by the use of a VPN, sometimes the VPN can be offline and expose the device to spyware that originated on a different device within the home network.

Macro Virus

Macro Viruses are viruses that infect a device when viewing or editing a text or photo. Macro Viruses are most common in applications like Microsoft Word and Excel.

A teen looking for homework or test answers may open up a text document and inadvertently infect his device. A teen may also receive a fake email with a document that appears to be from school and forward it to a parent’s WFH device, which will launch a macro virus when that document is opened.