0% found this document useful (0 votes)
24 views3 pages

Prefinal Task Performance - Taro

This document discusses different types of malware including adware, spyware, ransomware, trojan horses, and rootkits. It provides examples of specific malware programs for each category like Appearch and DollarRevenue for adware, CoolWebSearch and keyloggers for spyware, Cryptolocker and Jigsaw for ransomware, backdoors and Tiny Banker for trojan horses, and ZeroAccess and Flame for rootkits. The document also summarizes an article about malware targeting gamers on the Discord platform, the impact of these attacks, and challenges Discord faces in addressing the abuse of its platform.

Uploaded by

Josielyn Tars
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views3 pages

Prefinal Task Performance - Taro

This document discusses different types of malware including adware, spyware, ransomware, trojan horses, and rootkits. It provides examples of specific malware programs for each category like Appearch and DollarRevenue for adware, CoolWebSearch and keyloggers for spyware, Cryptolocker and Jigsaw for ransomware, backdoors and Tiny Banker for trojan horses, and ZeroAccess and Flame for rootkits. The document also summarizes an article about malware targeting gamers on the Discord platform, the impact of these attacks, and challenges Discord faces in addressing the abuse of its platform.

Uploaded by

Josielyn Tars
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Josielyn L.

Taro
CpE 701

Pre-Final Task Performance 1


Part I.
 Adware
1. Appearch – is an adware program that acts as a browser hijacker. Usually bundled with
other free software, it inserts so many ads into the browser that it makes surfing next-to-
impossible (www.softwarelab.org).
2. DollarRevenue – is one of the first major adware programs to affect millions of computers
worldwide. It would install a browser toolbar on the affected computer to track the internet
searches performed on the computer. On top of that, the program would also show
deceptive ads, both on-page and in the form of pop-up windows (www.softwarelab.org).
 Spyware
1. CoolWebSearch - This program would take advantage of the security vulnerabilities in
Internet Explorer to hijack the browser, change the settings, and send browsing data to its
author (www.softwarelab.org).
2. Keyloggers - are spyware programs that record the keystrokes typed on a keyboard
connected to an infected computer. While hardware-based keyloggers record each
keystroke in real time, software-based keystroke loggers collect periodic screenshots of the
currently active windows. This, in turn, allows them to record passwords (if they are not
encrypted on-screen), credit card details, search histories, email and social media
messages, as well as browser histories (www.softwarelab.org).
 Ransomware
1. Cryptolocker - is known for encrypting the user’s files and requires a payment later to open
it. Comodo creates a shadow version of the hard drive to immediately protect the important
files from cryptolocker. It tricks the malware that it has infected the files, when in fact it has
only encrypted the shadow version (comodo.com).
2. Jigsaw - is another one of those ransomware examples that’s already rendered useless by
Comodo AdvancEd Endpoint Protection. Jigsaw is capable of encrypting and deleting files.
It encrypts the files first and deletes it after an hour if the user fails to pay the ransom
(comodo.com)
 Trojan Horse
1. Backdoor - It gives malicious users remote access over the infected computer. They can do
whatever they want such as sending, receiving, launching and deleting files, displaying data
and rebooting the endpoint (comodo.com).
2. Tiny Banker - which allowed attackers to steal sensitive financial information. Researchers
in the Center for Strategic and International Studies Security Group identified 'Tinba' in 2012
after two dozen major U.S. banks were infected (comodo.com).
 Rootkit
1. ZeroAccess - kernel mode rootkit that went on to infect more than 2 million computers
around the world. Rather than directly affecting the functionality of the infected computer,
this rootkit silently downloads and installs malware on the infected machine and makes it
part of a worldwide botnet used by hackers to carry out cyber-attacks. Despite a few serious
attempts to destroy it, ZeroAccess remains active to this day (softwarelab.org).
2. Flame - a rootkit that was primarily used for cyber espionage in the Middle East. Affecting
the whole of the computer’s operating system, Flame has the ability to monitor network
traffic, capture screenshots and audio from the computer, and even log keyboard activity.
Although the culprits are still unknown, research revealed that 80 servers across three
continents were used to access the infected computers (softwarelab.org).
Part II.
a. The title of the article is “Malware slingers step up efforts to target gamers on Discord”.
b. The writer of the article is John Leyden.
c. The article was published on February 10, 2021.
d. The article was found on this link: https://portswigger.net/daily-swig/malware-slingers-step-
up-efforts-to-target-gamers-on-discord
e. This kind of attack is possible to prevent by using preventive measures in the side of the
gamers and avoiding unknown files which might be a form of malware. There are no ways to
prevent malware attacks but there are reliable ways to detect and block attacks, thus
protecting your systems from being infected by malicious software. First is to install anti-
virus and anti-spyware software. Use secure authentication methods by requiring strong
passwords. Keep software updated to safeguard your system from malware. A hacker only
needs an open door to infiltrate your business. Limit the number of possible entryways by
restricting application privileges on your devices. Allow only the application features and
functions that are absolutely necessary to get work done.
f. The impact of the attack to the environment of Discord is extensive. Multiple categories
of malware are being served through the CDN service, from ransomware to information
stealers and crypto-miners. Zscaler said it has caught more than 100 unique malicious
samples from Discord in zscaler cloud over the last two months alone. The attack usually
starts with spam emails in which prospective marks are lured with legitimate-looking
templates into downloading next-stage payloads. Malware-tainted files are disguised as
cracked software or gaming software in order to target gamers – an attractive target for
miscreants because they typically use high specification PCs. The tactic is not new and has
been observed in many other campaigns in the past using Discord as malware hosting
platform.
g. The company of discord, who was attacked, could not cope with the consequences as of
now, since their platform doesn’t have a report abuse button corresponding to shared file
but does have a web link to report abuse which is not so user friendly like other cloud
services.

You might also like