Crimeware: What it is, common examples, and how to protect yourself

Crimeware

Crimeware is an umbrella term for malware used to make money: ransomware, banking trojans, password stealers, botnets, spyware, and more. You’ll hear “malware” more often - same crowd, different label. 

Why it matters

Crimeware aims for cash and data. That means drained accounts, stolen identities, locked files (ransom), hijacked social profiles, and business downtime.

How it shows up

  • Phishing & fake pages that grab logins

  • Malicious installers/updates and cracked software

  • Drive-by ads and rogue extensions

  • Weak remote access (RDP/VPN) and unpatched apps

Signs to watch

  • Sudden MFA prompts, unknown logins, or new rules in email

  • Ransom notes, missing files, or changed extensions

  • High CPU/GPU, fans roaring when idle; odd network spikes

  • Security tools disabled or updates failing

If you suspect crimeware (first steps)

  1. Disconnect from the network.

  2. Scan and quarantine with trusted anti-malware; reboot and scan again.

  3. From a clean device, change passwords and enable MFA.

  4. Check accounts, bank/cards, and email forwarding rules; alert your bank/IT.

Prevent it

  • Install software/extensions only from official sources.

  • Keep OS, browsers, and apps updated; patch internet-facing services fast.

  • Use a password manager + unique passwords + MFA.

  • Train your team/family to spot phishing; consider DNS filtering/EDR.

  • Keep offline, tested backups in case of ransomware.

    Glossary (A–Z)

    All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
      • Related Articles

      • EDR (Endpoint Detection and Response)

        What it is EDR is your always-on security team for laptops and servers. It watches what’s happening on each device, spots attacks in progress, and helps you respond fast - quarantine, investigate, and clean up. For details on capabilities and use ...
      • NDR (Network Detection And Response)

        What it is Network Detection and Response (NDR) watches live network traffic to spot and investigate suspicious behavior in real time. Instead of relying on signatures, it analyzes patterns and anomalies to catch threats moving across your ...
      • XDR (Extended Detection and Response)

        What it is XDR is a security system that watches your company’s devices, email, cloud, and network together and connects the dots. Instead of separate tools, XDR pulls all the signals into one place, spots attacks faster, and can auto-block bad ...
      • Data Execution Prevention

        What it is Data Execution Prevention (DEP) is a Windows safety net that stops code from running in places it shouldn’t—like the stack or heap. If malware tries to execute from those memory areas, Windows blocks it and shuts the app down instead of ...
      • Data Breach Prevention

        Why it matters Breaches drain money, trust, and time. Strong basics turn scary “what ifs” into non-events: a phish gets ignored, a stolen password is useless, a lost laptop holds only encrypted gibberish. The short, smart checklist MFA everywhere: ...