0% found this document useful (0 votes)
47 views19 pages

Malware-Class 11

Uploaded by

cuteff24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views19 pages

Malware-Class 11

Uploaded by

cuteff24
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Malware

15

Topics to be discussed

• Viruses
• Spyware
• Adware
• Spamming
• PC intrusion
• Pharming
15

What is Malware
Malware (short for “malicious software”) is a file or code, typically delivered over a
network, that infects, explores, steals or conducts virtually any behavior an attacker
wants. And because malware comes in so many variants, there are numerous methods to
infect computer systems. Though varied in type and capabilities, malware usually has one
of the following objectives:
•Provide remote control for an attacker to use an infected machine.
•Send spam from the infected machine to unsuspecting targets.
•Investigate the infected user’s local network.
•Steal sensitive data
Virus
A computer virus is a type of malware that
attaches to another program (like a
document), which can replicate and spread
after a person first runs it on their system.
For instance, you could receive an email
with a malicious attachment, open the file
unknowingly, and then the computer virus
runs on your computer. Viruses are
harmful and can destroy data, slow down
system resources, and log keystrokes.
The terms “virus” and “malware” are often used interchangeably, but
they’re not the same thing. While a computer virus is a type of malware,
not all malware are computer viruses.
The easiest way to differentiate computer viruses from other forms of
malware is to think about viruses in biological terms. Take the flu virus,
for example. The flu requires some kind of interaction between two
people—like a hand shake, a kiss, or touching something an infected
person touched. Once the flu virus gets inside a person’s system it
attaches to healthy human cells, using those cells to create more viral
cells.
A computer virus works in much the same way:
1.A computer virus requires a host program.
2.A computer virus requires user action to transmit from one system to
another.
3.A computer virus attaches bits of its own malicious code to other files
or replaces files outright with copies of itself.

Viruses can’t spread without some sort of action from a user, like opening
up an infected Word document.
Worms
A worm is a type of malware or malicious
software that can replicate rapidly and
spread across devices within a network. As
it spreads, a worm consumes bandwidth,
overloading infected systems and making
them unreliable or unavailable. Worms can
also change and delete files or introduce
other malware.
Trojans
A Trojan, or Trojan horse, is a
type of malware that conceals its
true content to fool a user into
thinking it's a harmless file. Like
the wooden horse used to sack
Troy, the "payload" carried by a
Trojan is unknown to the user,
but it can act as a delivery vehicle
for a variety of threats.
Spamming

Spam is any kind of unwanted, unsolicited digital


communication that gets sent out in bulk. Often
spam is sent via email, but it can also be
distributed via text messages, phone calls, or
social media.
PC Intrusion

When someone tries to access any part of our


personal computer system then PC intrusion
occurs. Every Personal Computer (PC) which
is connected to the internet is a target of
hackers and cybercriminals.
Some softwares commonly used by hackers to
do PC intrusion are
1.Sweeper attack:-It sweeps all the
data from the system

2.Denial Of services:-This type


of attack eats up all the resources of
a system and the system or
applications come to a halt. Example
of such an attack is flooding a system
with junk mail.

3.Password guessing:- Most hackers


crack or guess passwords of system
accounts and gain entry into remote
computer system and they use it for
causing damages in one or another
form.
Adware

Adware in cyber security refers to a type


of malware that displays unwanted
advertisements on your computer or device.
Adware is commonly activated unknowingly when
users are trying to install legitimate applications
that adware is bundled with.
While sometimes, adware can be safe, some pop-
up windows intend to not only display
advertisements but also collect data and
information in order to target you with
customized adverts. In these cases, adware can
direct you to malicious websites and infected
pages through various advert links, putting you at
risk of computer viruses.
Spyware
Spyware (a portmanteau for spying software) is
any software with malicious behavior that aims to
gather information about a person or organization
and send it to another entity in a way that harms
the user by violating their privacy, endangering their
device's security, or other means. This behavior may
be present in malware and in legitimate software.
Websites may engage in spyware behaviors like web
tracking. Hardware devices may also be affected.
Spyware is frequently associated
with advertising and involves many of the
same issues. Because these behaviors are so
common, and can have non-harmful uses, providing
a precise definition of spyware is a difficult task.
Spam ware
Software that assists a spammer. Such
programs include harvesting emails randomly
from websites, maintaining the lists and
sending out the spam (unwanted
advertisements). The spam ware system may
also falsify the identifying header
information in the spam messages. The most
malicious spam ware is involved with hacking
into and turning the computers of
unsuspecting users into a botnet, so that
thousands of computers can periodically
mail an amount of spam small enough to go
unnoticed.
Pharming

Pharming is an attack technique that manipulates the


Domain Name System (DNS) to redirect a user’s
legitimate request to a fraudulent website without their
knowledge.
This deceptive technique is based on compromising
the DNS server or the user’s local host file, causing the
DNS queries to resolve to the attacker’s IP address
instead of the legitimate one. Since the DNS protocol’s
semantics don’t strictly define handling such
manipulations, different systems and browsers may
respond to it differently.
Some systems may silently redirect the user to
the fraudulent site, making the attack almost
invisible to an untrained eye.
The attacker abuses this behavior to steal
sensitive information, such as login credentials
or financial details, leading to serious
consequences like identity theft or financial
loss.
How to stay protected from them

1. Keep your system up to date


2. Use caution when downloading
files from internet(that is look for privacy
statements or SSL encryption of sensitive information.)
3. Be careful with email
4. Disable cookies,if possible
If you have become a victim of these attacks then follow
these thing.
• Take the computer offline
• Always have your important files on a backup drive
• Do not use the compromised system to contact
agencies as when you will be creating the new password
keylogger will also record the fresh password.
• Run antivirus. (Don’t trust free antivirus they are not
up to the power to always find the virus sometimes they
also get tricked)
Thank You
Made by-
Rishav
Ranjan
Class-11b

Credits for images to google baba


And for information credits goes to
• Webroot
• Imperva.com
• Geeksforgeeks
• mcafee

You might also like