The term malware stands as a sentinel, guarding the gates of the digital world in the realm of cybersecurity. Malware, short for malicious software is a predominant and menacing presence that threatens the very essence of our interconnected lives.

All types of malware are the chameleons of the cyber domain, constantly evolving, adapting, and taking on new forms to infiltrate, disrupt, or compromise computer systems, networks, and devices. Understanding the intricate taxonomy of malware is paramount in the ongoing battle against cyber threats.

 Types of Malware

In this comprehensive exploration, we will dissect the myriad types of malware, peeling back the layers of their complexities, and arming you with knowledge to defend against these insidious digital adversaries.

Understanding Types of Malware

In the ever-evolving landscape of cybersecurity, understanding the intricate world of different types of malware is essential. Malware takes various forms, with the most common ones being

  • Viruses
  • Worms
  • Trojans
  • Ransomware
  • Bots or Botnets
  • Adware
  • Spyware
  • Rootkits
  • Fileless Malware
  • Malvertising

Although the ultimate objective of a malware attack typically remains consistent, involving gaining access to personal data or causing device harm for financial gain, the tactics for delivering these threats can vary significantly.

In certain cases, attackers may even employ a combination of these types of malware varieties. Effective protection against malicious software begins by familiarizing oneself with these diverse types of malware.

In this section, we will provide an overview of these 10 prevalent types of malware and address critical questions associated with them.

What is Malware?

Malware, short for malicious software, refers to software programs specifically crafted by cyber attackers with the intention of either gaining unauthorized access to a computer or network or causing damage to it, typically without the knowledge of the victim.

In simple terms, malware encompasses any software designed with the purpose of inflicting harm. The extent of the harm inflicted varies depending on the specific type of malware involved.

This highlights the importance of not only comprehending the overarching concept of malware but also delving into the distinct characteristics and implications associated with each type of malware, as well as their potential impact on their targets.

What are the different types of malware?

Despite a global decrease of 39 percent in malware incidents in 2020, the landscape of malware remains dynamic, with ongoing evolution and adaptation. Some types of malware have even amalgamated over time, sharing attack techniques.

These techniques include employing logic bombs—pre-configured attacks that may be triggered by victims, utilizing phishing and social engineering strategies to directly distribute malware, and targeting mobile devices with mobile malware.

Here are the most prevalent categories of malware that one should be able to identify:

Adware malware

Adware, as the name implies, falls under the category of malware with a distinct focus on advertising. Also referred to as advertising-supported software, adware specializes in displaying unwanted advertisements on a user’s computer, often in the form of intrusive pop-up ads, while simultaneously monitoring the user’s online activities.

While adware may ostensibly aim at marketing and advertising, it can take a sinister turn when these ads collect user data with malicious intent. This data collection may involve selling the gathered information to third parties or exploiting it for nefarious purposes such as identity theft or credit card fraud.

Of note, the prevalence of mobile adware, which pertains to adware on mobile devices, has surged in recent times and is frequently contracted through the downloading of third-party applications.

In summary, the consequences of adware encompass:

  • Annoyance: Adware is primarily recognized for being an intrusive and irritating presence on a user’s device.
  • Luring Users to Malicious Sites: It can redirect users to harmful or malicious websites, posing additional risks.
  • Installing Spyware: Adware may incorporate spyware components, enabling covert data monitoring.
  • Sharing User Data with Third Parties: Some adware variants share user data with external parties, raising concerns about privacy and security.

A notable instance of adware is “Fireball,” which surfaced in 2017. This adware managed to infect approximately 250 million devices through browser hijacking, clandestinely tracking victims’ web activities, and underscoring the insidious nature of adware-driven data collection.

Malware Viruses

Viruses are specific types of malware, often manifest as lines of code discreetly embedded within applications, programs, or systems, and intriguingly, they are initiated by the very individuals who fall victim to them.

In many ways, viruses mirror biological viruses in that they necessitate a host, typically a device, to survive. These malicious entities remain inactive until they are triggered to launch an attack, which can occur when users unknowingly download email attachments, often in the form of .exe files, denoting “executable” files.

Once activated, the virus begins to replicate itself, disseminating copies of its malicious code from one computer to another, causing widespread havoc. The capabilities of malware viruses encompass various malicious actions:

  • Seizing Applications: Viruses can take control of applications, rendering them inoperative or manipulating their functions.
  • Sending Infected Files: They have the ability to send infected files to the contact lists of the compromised device, propagating the infection further.
  • Stealing Data: Malware viruses are notorious for pilfering sensitive data, including personal and financial information.
  • Launching DDoS Attacks: They can initiate Distributed Denial of Service (DDoS) attacks, overwhelming websites or networks with traffic to render them inaccessible.
  • Initiating Ransomware Attacks: Viruses can serve as a gateway for ransomware attacks, encrypting files and demanding a ransom for their release.

Examples of Types of Malware Viruses

  • A notable real-world example of a malware virus is the “ILOVEYOU” virus, which made a significant impact in the year 2000. It spread across millions of computers globally, enticing users to click on an attachment titled “LOVE-LETTER-FOR-YOU.TXT.vbs” within an email with the subject line “ILOVEYOU.” This incident serves as a stark reminder of the destructive potential of malware viruses.
  • A computer worm is a specific form of Trojan horse malware that distinguishes itself from traditional viruses by its capacity to propagate autonomously, without the need for user intervention. Once it infiltrates a system, a worm can independently spread from one computer to another, moving through networks and devices without any human involvement or action.
  • Stuxnet is an exceptionally sophisticated computer worm initially crafted with the specific purpose of targeting Iran’s nuclear facilities. However, over time, it has undergone mutations and inadvertently spread to other industrial and energy-producing facilities, making it a notable and complex cyber threat with far-reaching implications beyond its original target.
  • SQL Slammer is a notorious worm that specifically targets unpatched Microsoft SQL 2000 servers. This worm had a profound impact on the internet landscape, causing a widespread denial of service on numerous internet hosts and significantly impeding overall internet traffic. SQL Slammer earned notoriety for its rapid propagation, infecting a substantial portion of its 75,000 victims in a mere ten minutes.
  • Tinba is a Trojan malware that targets end-user devices with the intent of compromising and pilfering funds from the victims’ financial accounts. This Trojan was first identified in 2012 and initially wreaked havoc on thousands of computers primarily located in Turkey. Tinba is notorious for its financial fraud capabilities and its capacity to infiltrate and exploit the security of financial systems.
  • CryptoLocker is a ransomware strain notorious for its capability to encrypt files on Windows-based computers and subsequently demand a ransom payment from victims in exchange for the decryption key. This malicious software made its debut on the Internet in 2013 and primarily targeted computers running the Windows operating system. CryptoLocker exemplifies the pernicious nature of ransomware, holding users’ data hostage until a ransom is paid for its release.
  • Shlayer is a type of Trojan virus known for its nefarious activities, primarily spreading adware and potentially unwanted applications (PUAs). This malware is notorious for promoting counterfeit search engines, often leading to deceptive online experiences and undesirable consequences for affected users.
  • Welchia also recognized as the Welchia worm or Nachi, operates as a Nematode that serves a unique purpose in the realm of malware. Unlike most malicious software, Welchia does not harbor malicious intent; instead, its mission revolves around the removal of the Blaster worm and the rectification of vulnerabilities that enable the existence of such worms. Despite its non-malicious objectives, Welchia is known to have the unintended consequence of slowing down computers and networks. This worm was initially reported on August 18, 2003, marking its emergence in the cybersecurity landscape.
See Also:  Signs of Malicious Advertising: How to Avoid Falling Victim

Worm malware

Worms, a class of malware akin to malware viruses, possess the distinctive trait of self-replication. What sets them apart, however, is their ability to duplicate autonomously, devoid of any human interaction. Moreover, worm malware does not rely on a host, eliminating the need to attach itself to software programs for destructive purposes.

Worms find their passage through various avenues, including exploiting software vulnerabilities, masquerading as attachments in emails or direct messages, or infiltrating via removable media.

When these gateways are accessed, they may lead to a malevolent website link or an automatic download of the computer worm. Once nestled within the system, the worm operates surreptitiously, infecting the host device or even entire networks unbeknownst to the user.

The capabilities of worm malware encompass a range of malicious actions:

  • Deleting or Modifying Files: Worms can manipulate or erase files on the infected system.
  • Stealing Data: They have the potential to pilfer valuable data, compromising the user’s privacy.
  • Installing Backdoors for Hackers: Worms can create clandestine entry points for hackers, facilitating unauthorized access.
  • Launching DDoS Attacks: Initiating Distributed Denial of Service (DDoS) attacks is within their arsenal, aiming to overwhelm networks or websites.
  • Initiating Ransomware Attacks: Worms can serve as a conduit for ransomware attacks, encrypting files and demanding a ransom for their release.
  • Creating Botnets: They have the capability to assemble botnets, which are networks of compromised machines under remote control.
  • Infecting Many Computers Simultaneously: Worms excel at rapid, widespread infections, capable of infiltrating numerous computers in a short span.

An illustrative example of worm malware is the “SQL Slammer” from 2003. Renowned as one of the fastest-spreading worm malware, SQL Slammer exploited a vulnerability in Microsoft’s SQL Server software. Remarkably, it took a mere 10 minutes to proliferate and wreak havoc on thousands of servers, highlighting the disruptive potential of worm-based cyber threats.

Malvertising

Malvertising, distinct from adware, constitutes a form of malware that originates from advertisements displayed on legitimate websites. Adware, on the other hand, is malware that is already present on a device. Both malvertising and adware leverage online advertising as a vector for their malicious activities.

Victims can inadvertently fall prey to malvertising by interacting with an infected ad, which cybercriminals may even pay to display on websites. Alternatively, individuals can become victims of malvertising when they visit a website hosting a corrupted ad, leading to a drive-by download without their consent or knowledge.

In summary, malvertising has the potential to:

  • Result in Ransomware Attacks: Malvertising campaigns can lead to ransomware attacks, wherein victims are extorted for a ransom to regain access to their compromised systems.
  • Steal Data: Some malvertising instances involve data theft, and compromising user information.
  • Result in Credit Card Fraud: Malvertising schemes may lead to credit card fraud, endangering users’ financial security.

An illustrative example of malvertising is the “The media” incident from 2016. Esteemed news sites like The New York Times, BBC, AOL, and others unwittingly served Malvertisements to their readers, setting off campaigns aimed at hijacking computers and demanding ransoms. This event underscores the susceptibility of even reputable websites to malvertising attacks, emphasizing the importance of robust cybersecurity measures.

Bots or botnets

At times, bots may assume the role of a “spider,” essentially acting as programs that roam the internet, scouring for vulnerabilities in security systems ripe for exploitation. This kind of hacking can occur automatically, akin to a robotic operation.

Botnets, a distinct category of malware, gain access to devices through malicious code. In certain scenarios, botnets can directly infiltrate devices, sometimes even allowing cybercriminals to assume remote control over them.

Ultimately, bots or botnets have the capability to:

  • Launch DDoS Attacks: They can orchestrate Distributed Denial of Service (DDoS) attacks, overwhelming target websites or networks with excessive traffic to disrupt their operation.
  • Record Activity: Bots and botnets are proficient at logging user activities, including keystrokes, webcam usage, and capturing screenshots.
  • Send Phishing Emails: They can hijack a victim’s device to dispatch phishing emails, potentially luring other unsuspecting victims into cyberattacks.
  • Grant Hackers Remote Control: Perhaps most alarmingly, bots and botnets can provide hackers with remote access and control over compromised devices.

An example of a botnet is “Mirai,” which emerged in 2016. This particular botnet attack targeted Internet of Things (IoT) devices and subsequently harnessed them to launch DDoS attacks, underscoring the potential scale and disruptive capabilities of botnet-driven cyberattacks.

Fileless malware

Fileless malware represents a distinctive category of malware that leverages the software, applications, and protocols already inherent in device operating systems to establish and execute malicious operations. In essence, Fileless malware earns its name from its distinctive characteristic: it requires no files to be downloaded, existing solely in the device’s memory rather than as distinct files.

See Also:  List of the Best 10 Free Virtual Dollar Cards in Nigeria

Upon installation, Fileless malware capitalizes on legitimate scripts, discreetly carrying out malicious activities while the authentic programs continue to operate. This stealthy modus operandi renders Fileless malware exceptionally challenging to detect.

In summary, Fileless malware has the potential to:

  • Disrupt Antivirus Software: Fileless malware can interfere with antivirus software, impeding its effectiveness.
  • Steal Data: Its primary function often involves the surreptitious exfiltration of sensitive data.

An example of Fileless malware is “Astaroth,” which emerged in 2019. This Fileless malware operated as a sophisticated information-stealer, with a primary focus on Windows devices and specific countries, including Brazil, underscoring the evolving and region-specific nature of modern cyber threats.

Trojan malware

Trojans, aptly named after the legendary deception of the Trojan Horse, represent a category of malware that cunningly masquerades as legitimate software, applications, or files. Their primary objective is to dupe unsuspecting users into downloading and installing them, thereby unwittingly granting control of their devices.

Once infiltrated, a Trojan can execute its designated function, which might entail data damage, disruption, theft, or the infliction of other harmful actions on a user’s data or network. Referred to interchangeably as a Trojan horse or Trojan horse virus, Trojan malware is frequently disseminated through avenues such as email attachments, website downloads, or direct messages.

Similar to viruses, they do necessitate user interaction for deployment. In contrast to viruses, however, Trojans are not host-dependent and do not possess the capacity for self-replication.

The potential actions of Trojan malware encompass a range of malicious activities:

  • Deleting, Modifying, or Stealing Data: Trojans can manipulate or exfiltrate data, compromising the user’s information.
  • Spying on Users: They may clandestinely monitor user activities, breaching privacy.
  • Accessing Networks: Trojans can provide unauthorized access to networks, facilitating further cyberattacks.
  • Launching DDoS Attacks: Initiating Distributed Denial of Service (DDoS) attacks is within their capabilities, aimed at overwhelming networks or websites.
  • Taking Remote Control of Devices: Trojans can enable remote control over compromised devices, granting attackers significant control.

An example of Trojan malware is “ZeuS/Zbot,” which emerged in 2011 as a banking Trojan. It employed keystroke logging to surreptitiously capture user credentials and account balances, underscoring the insidious nature of Trojan attacks in the realm of cybersecurity.

Rootkits

Rootkits, a distinct form of malware, are engineered with the nefarious objective of providing cybercriminals with remote control over victims’ devices, frequently without the victims’ awareness.

These insidious programs are designed to remain concealed, making them highly adept at hijacking or subverting security software, and consequently, they can persist on a victim’s computer for extended periods, inflicting substantial damage.

The propagation of rootkits typically occurs through phishing attacks, malicious downloads, or attachments embedded in deceptive emails.

In summary, rootkits have the capability to:

  • Take Remote Control of Devices: Rootkits can grant cybercriminals the ability to remotely manipulate and control compromised devices.
  • Bestow Admin Access: They may elevate the privileges of attackers to admin-level access on the infected device, enabling them to exert significant control.
  • Spy on User Activity: Rootkits are adept at covertly monitoring and recording user activities, raising concerns about privacy breaches.

An illustrative example of a rootkit is “Zacinlo,” which emerged in 2012 and remained concealed until approximately 2017 when it was first detected.

This rootkit was particularly notorious for delivering adware and effectively disabling antivirus software on predominantly Windows-based devices, highlighting the potential harm posed by rootkits in the cybersecurity landscape.

Ransomware

Ransomware, as the name aptly suggests, represents a category of malware that arrives with a nefarious demand for payment. It operates by locking and encrypting a victim’s device or data and subsequently extorting a ransom in exchange for the restoration of access.

The mechanism behind ransomware typically involves victims inadvertently downloading this malicious software via email attachments or links from unfamiliar or untrusted sources. Once infiltrated, the malware may create a covert entry point for hackers to access the victim’s device.

Subsequently, it initiates the encryption of data, effectively rendering it inaccessible, and often leaves users locked out of their devices entirely. The only path to regain control is by complying with the ransom demand.

It’s worth noting that ransom payments in these cases are increasingly made in cryptocurrency, a practice sometimes referred to as crypto-malware.

In summary, ransomware possesses the potential to:

  • Hold Devices Hostage: Ransomware can effectively immobilize devices, preventing their normal use.
  • Render Data Inaccessible Through Encryption: It encrypts data, making it unreadable and inaccessible until a decryption key is provided, typically upon ransom payment.
  • Result in Financial Loss: Victims may suffer financial losses not only from the ransom itself but also from potential data loss or downtime.

An illustrative example of ransomware is the “WannaCry” attack from 2017. This ransomware campaign targeted thousands of computer systems worldwide, primarily those running Windows OS, and rapidly propagated within global corporate networks. Victims were compelled to pay a ransom in Bitcoin to recover their encrypted data, highlighting the global impact and financial consequences of ransomware attacks.

Spyware

Spyware stands as a category of malware renowned for its surreptitious infiltration of devices, typically without the owner’s awareness or consent. The primary motive behind spyware is to clandestinely observe internet activity, record login credentials and passwords, or gather sensitive data for potentially fraudulent purposes.

It’s worth noting that spyware encompasses a wide range of malicious software, including adware, trojan malware, and tracking cookies, all of which share the common trait of covertly collecting information. Keyloggers, a prevalent form of spyware, excel at tracking and logging keystrokes, capturing all typed information.

In essence, the ramifications of spyware encompass:

  • Breach of Personal Privacy: Spyware fundamentally breaches the user’s personal privacy, operating discreetly and without their consent.
  • Collection of Confidential Data: Spyware excels at acquiring sensitive information, often by covertly recording keystrokes or tracking online activities.
  • Data Theft: The information gathered by spyware can be exploited for data theft, potentially leading to identity theft or credit card fraud.

A notable case of spyware is “DarkHotel,” which emerged in 2014. This particular keylogger spyware was designed to target government and business leaders while they used hotel Wi-Fi networks, exemplifying the sophisticated and targeted nature of spyware-based cyberattacks.

How these Types of Malware are Injected into your Device

The distribution of malware is predominantly facilitated through email, with approximately 94% of malware being delivered via this channel. However, cybercriminals employ a variety of tactics to execute malware attacks, often combining multiple methods for increased effectiveness. Here are some common tactics employed by cybercriminals:

  • Man-in-the-Browser Attacks: In this method, attackers inject malware into a victim’s computer, which then discreetly embeds itself within the web browser without the user’s awareness. It functions to intercept and record data exchanged between the victim and specific targeted websites.
  • Exploiting Security Vulnerabilities: Cybercriminals manually search for vulnerabilities within devices and networks, taking advantage of security weaknesses to introduce malware.
  • Exploit Kits: These are prewritten sets of code used by cybercriminals to automatically seek out vulnerabilities in devices and subsequently inject malware through these security gaps.
  • Drive-By Downloads: Users unwittingly encounter drive-by downloads when they visit a malicious website hosting an exploit kit designed for malware attacks. These downloads occur without user consent or interaction.
  • Social Engineering: This tactic involves manipulating people’s emotions and psychology to persuade them to click malicious links, download malicious attachments, or divulge sensitive information, which can then be exploited for fraudulent purposes. Social engineering encompasses methods such as phishing (email-based manipulation), vishing (voice-based manipulation), and smishing (SMS-based manipulation).
See Also:  Offshore Big Data Security Compliance in the Post-GDPR Era

These diverse methods underline the adaptability of cybercriminals in their pursuit of spreading malware and emphasize the importance of robust cybersecurity practices to mitigate such threats effectively.

Prevention and Removal of Malware Infection

Combining a variety of malware prevention tactics is essential for effectively protecting your devices and data. Additionally, being aware of malware detection signs and knowing how to remove malware can further enhance your cybersecurity posture.

Here’s a comprehensive approach to malware prevention, detection, and removal:

Prevention:

  • Use Multi-Factor Authentication (MFA): Implement MFA or two-factor authentication to enhance account security. MFA adds an extra layer of verification, such as a code sent to your phone or a biometric scan, making it more challenging for cybercriminals to access your accounts.
  • Exercise Caution with Emails, Links, and Sites: Be vigilant when dealing with emails, links, and websites. Avoid opening email attachments from unknown sources, clicking on suspicious links, or engaging with advertisements that appear too good to be true. These could be phishing attempts leading to malware infections.
  • Adjust Spam Filters: Configure your email spam filters to their highest settings to filter out potential malicious content. This helps you avoid encountering harmful links, emails, or attachments right from the start.
  • Keep Software Updated: Regularly update your operating system, web browsers, applications, and plugins. Prompt updates patch security vulnerabilities that cybercriminals may exploit. Consider enabling automatic updates for added convenience.

Detection:

  • Know Warning Signs: Familiarize yourself with common warning signs of malware infections, including a sluggish or freezing device, unexpected program behavior, low storage space, excessive pop-ups, and unauthorized email activity. Detecting these signs early can help you respond promptly.
  • Use Antivirus Software: Employ reputable antivirus software that actively monitors and identifies potential malware threats. Antivirus software can provide real-time protection and assist in stopping cyber threats.

Removal:

  • Back-Up Files Regularly: Regularly back up your important files and data to a secure location. Having reliable backups ensures that you can restore your device quickly in case of data loss due to a malware infection.
  • Remove Malware: In the unfortunate event of a malware infection, research and follow the appropriate steps for malware removal on your specific device (e.g., Mac or PC). Each platform may have different procedures and tools for effective malware removal.

By combining these proactive prevention measures with vigilant detection and effective removal strategies, you can significantly reduce the risk of falling victim to malware and enhance your overall cybersecurity.

Conclusion

In the vast digital landscape where we navigate our daily lives, the term “malware” serves as a sentinel, ever vigilant and menacing. “Malicious software,” or malware, is an ever-evolving, adaptable, and pervasive threat that seeks to breach, disrupt, or compromise our interconnected world.

It has the power to infiltrate our computer systems, networks, and devices, endangering the very essence of our digital existence. This comprehensive exploration has unveiled the multifaceted world of malware, peeling back the layers of complexity that shroud these digital adversaries.

We’ve delved into the taxonomy of malware, revealing its various forms, behaviors, and potential impacts. Armed with this knowledge, you are better equipped to defend against the insidious forces of malware, safeguarding your digital assets and online presence.

As we continue to navigate the evolving cyber landscape, it is essential to remain vigilant, adopt best practices in cybersecurity, and stay informed about emerging threats. With awareness, prevention, and preparedness, we can fortify our defenses against the ever-present menace of malware and secure our digital future.

FAQs

What is malware?

Malware, short for malicious software, refers to software programs created with the intent to gain unauthorized access to a computer or network or cause harm to them, typically without the user’s knowledge. It encompasses various forms, each with its own specific objectives and methods.

What are the common types of malware?

Common types of malware include viruses, worms, trojans, ransomware, bots or botnets, adware, spyware, rootkits, Fileless malware, and malvertising. Each type has distinct characteristics and potential consequences.

How do cybercriminals distribute malware?

Cybercriminals employ various tactics, including phishing emails, exploit kits, drive-by downloads, social engineering, and more, to distribute malware. They often combine multiple methods to maximize their effectiveness in infecting devices and networks.

What are the signs of a malware infection?

Signs of a malware infection may include a slow or frozen device, unusual program behavior, low storage space, excessive pop-up ads, and unauthorized email activity. Detecting these signs early can help mitigate the impact of malware.

How can I prevent malware infections?

Preventing malware infections involves using multi-factor authentication, exercising caution with emails and links, adjusting spam filters, keeping software updated, and using reputable antivirus software. Regularly backing up important files is also crucial for quick recovery in case of an infection.

How do I remove malware from my device?

The process of removing malware varies depending on the specific type and platform (e.g., Mac or PC). Research the appropriate steps and tools for your situation, and consider seeking professional assistance if needed. Regularly updated antivirus software can also aid in malware removal.

Loading

Akinpedia is a passionate and knowledgeable author with a strong background in technology and business; he brings a wealth of expertise and insights to his writing.

With a keen eye for detail and a commitment to accuracy, Akinpedia ensures his articles are thoroughly researched and fact-checked. His dedication to providing reliable information shines through in every piece he writes.

Beyond his expertise, Akinpedia is a passionate advocate for the positive impact of technology on society and businesses. He believes in the power of innovation and strives to inspire readers to embrace technological advancements and harness them for growth and success.

When Akinpedia is not writing, he enjoys staying updated with the latest technological developments, attending industry conferences, and engaging in insightful discussions with fellow professionals. His continuous pursuit of knowledge ensures that his writing remains fresh, relevant, and impactful.
Akinpedia
Feel free to express and discuss your thoughts, feedback, or personal experiences by leaving your comments in the designated section provided below. Your input is valuable and contributes to the ongoing conversation surrounding the topic at hand.
Your comments allow for a richer exchange of perspectives and experiences, providing an opportunity for others to benefit from diverse viewpoints and opinions. Your contributions help create a more inclusive and engaging discussion platform for everyone involved.

Leave a Reply

Blogarama - Blog Directory