Chapter 2
Chapter 2
Short for Malicious Software, malware is any code that can be used
to steal data, bypass access controls, or cause harm to, or
compromise a system. Below are a few common types of malware:
Spyware – This malware is design to track and spy on the user.
Spyware often includes activity trackers, keystroke collection, and
data capture. In an attempt to overcome security measures,
spyware often modifies security settings. Spyware often bundles
itself with legitimate software or with Trojan horses.
Adware – Advertising supported software is designed to
automatically deliver advertisements. Adware is often installed
with some versions of software. Some adware is designed to only
deliver advertisements but it is also common for adware to come
with spyware.
Bot – From the word robot, a bot is malware designed to
automatically perform action, usually online. While most bots are
harmless, one increasing use of malicious bots are botnets. Several
computers are infected with bots which are programmed to quietly
wait for commands provided by the attacker.
Ransomware – This malware is designed to hold a computer
system or the data it contains captive until a payment is made.
Ransomware usually works by encrypting data in the computer
with a key unknown to the user. Some other versions of
ransomware can take advantage of specific system vulnerabilities
to lock down the system. Ransomware is spread by a downloaded
file or some software vulnerability.
Scareware – This is a type of malware designed to persuade the
user to take a specific action based on fear. Scareware forges pop-
up windows that resemble operating system dialogue windows.
These windows convey forged messages stating the system is at
risk or needs the execution of a specific program to return to
normal operation. In reality, no problems were assessed or
detected and if the user agrees and clears the mentioned program
to execute, his or her system will be infected with malware.
Rootkit – This malware is designed to modify the operating system
to create a backdoor. Attackers then use the backdoor to access
the computer remotely. Most rootkits take advantage of software
vulnerabilities to perform privilege escalation and modify system
files. It is also common for rootkits to modify system forensics and
monitoring tools, making them very hard to detect. Often, a
computer infected by a rootkit must be wiped and reinstalled.
Virus - A virus is malicious executable code that is attached to
other executable files, often legitimate programs. Most viruses
require end-user activation and can activate at a specific time or
date. Viruses can be harmless and simply display a picture or they
can be destructive, such as those that modify or delete data.
Viruses can also be programmed to mutate to avoid detection.
Most viruses are now spread by USB drives, optical disks, network
shares, or email.
Trojan horse - A Trojan horse is malware that carries out malicious
operations under the guise of a desired operation. This malicious
code exploits the privileges of the user that runs it. Often, Trojans
are found in image files, audio files or games. A Trojan horse differs
from a virus because it binds itself to non-executable files.
Worms – Worms are malicious code that replicate themselves by
independently exploiting vulnerabilities in networks. Worms
usually slow down networks. Whereas a virus requires a host
program to run, worms can run by themselves. Other than the
initial infection, they no longer require user participation. After a
host is infected, the worm is able to spread very quickly over the
network. Worms share similar patterns. They all have an enabling
vulnerability, a way to propagate themselves, and they all contain a
payload.
Worms are responsible for some of the most devastating attacks
on the Internet. As shown in Figure 1, in 2001 the Code Red worm
had infected 658 servers. Within 19 hours, the worm had infected
over 300,000 servers as shown in Figure 2.
Man-In-The-Middle (MitM) – MitM allows the attacker to take
control over a device without the user’s knowledge. With that level
of access, the attacker can intercept and capture user information
before relaying it to its intended destination. MitM attacks are
widely used to steal financial information. Many malware and
techniques exist to provide attackers with MitM capabilities.
Man-In-The-Mobile (MitMo) – A variation of man-in-middle,
MitMo is a type of attack used to take control over a mobile device.
When infected, the mobile device can be instructed to exfiltrate
user-sensitive information and send it to the attackers. ZeuS, an
example of an exploit with MitMo capabilities, allows attackers
quietly to capture 2-step verification SMS messages sent to users.
Symptoms of Malware
Phishing
Vulnerability Exploitation
DoS
DDoS
SEO Poisoning