0% found this document useful (0 votes)
24 views19 pages

Malwares

Uploaded by

Christo V M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views19 pages

Malwares

Uploaded by

Christo V M
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

MALWARES AND ITS

TYPES
WHAT IS A MALWARE ?

Malware is any software


intentionally designed to cause
disruption to a computer, server,
client, or computer network, leak
private information, gain
unauthorized access to
information or systems, deprive
access to information, or which
unknowingly interferes with the
user's computer security and
privacy.
TYPES OF MALWARE
1.WORM
2.TROJAN HORSE
3.SPYWARE
4.RANSOMWARE
5.BOTNET
6.KEYLOGGER
7.REMOTE ACCESS TROJAN
8.BACKDOOR
9.ROOTKITS
2. WORM
A worm can self-replicate without a host
program and typically spreads without any
interaction from the malware authors.
Most powerful malware.
What does a computer worm do?

1.Consume bandwidth
2.Delete files
3.Overload networks
4.Steal data
5.Open a backdoor
3. TROJAN HORSE
A Trojan horse is designed to
appear as a legitimate
software program to gain
access to a system. Once
activated following
installation, Trojans can
execute their malicious
functions.
4. SPYWARE
Spyware collects information
and data on the device and
user, as well as observes the
user's activity without your
knowledge. And forward it to a
third-party without your
consent. However, malicious
spyware is explicitly used to
profit from stolen data.
5. RANSOMWARE
Ransomware infects a user's system and encrypts
its data. Cyber criminals then demand a ransom
payment from the victim in exchange for
decrypting the system's data.

EXAMPLE FOR RANSOMWARE ATTACK


WannaCry: WannaCry was identified in May
2017 during a mass campaign affecting
organizations across the globe. WannaCry has
targeted healthcare organizations and utility
companies using a Microsoft Windows exploit
called EternalBlue.
8. BOTNET
A botnet is a group of Internet-connected
devices, each of which runs one or more
bots. Botnets can be used to perform
Distributed Denial-of-Service attacks,
steal data, send spam, and allow the
attacker to access the device and its
connection.

Network of compromised systems are


called botnet. Compromised computers
are called bots or zombies.

Used to attack :government


organizations, social networking
websites…

The king of botnet is Zeus botnet.


9. KEYLOGGER

keylogger is a computer
program,once it gets
affected in our computer
it can record all our key
strokes .It can be login
credentials.
10. REMOTE ACCESS TROJAN
A RAT (Remote Access Trojan) is malware an attacker uses to gain full
administrative privileges and remote control of a target computer. RATs are
often downloaded along with seemingly legitimate user-requested programs --
such as video games -- or are sent to their target as an email attachment via a
phishing email.

Once the host system is compromised, intruders use a backdoor to


control the host, or they may distribute RATs to other vulnerable
computers and establish a botnet.
11. BACKDOOR
A backdoor refers to any method by which
authorized and unauthorized users are
able to get around normal security
measures and gain high level user access
(aka root access) on a computer system,
network, or software application. Once
they're in, cybercriminals can use a
backdoor to steal personal and financial
data, install additional malware, and
hijack devices.
12. ROOTKITS

A rootkit is a type of malware


designed to give hackers access to
and control over a target device.
Although most rootkits affect the
software and the operating system,
some can also infect your computer’s
hardware and firmware. Rootkits are
adept at concealing their presence,
but while they remain hidden, they
are active.
SYMPTOMS 1.Your system slows down.
OF 2. Frequent freezing or crashing of the system.
MALWARE 3. Modified or deleted files.
4. New programs or desktop icons that you do
not recall installing/creating.
5. Programs running without your consent.
6. Programs closing without your consent.
7. Your screen is inundated with annoying
ads.
8. Changes in your security settings on the
system.
9. Browser links redirect to the wrong web
page.
10. Our default search engine has been
changed without you altering it.
HOW TO DETECT MALWARE???
● Users may be able to detect malware if they observe unusual activity such as a
sudden loss of disk space, unusually slow speeds, repeated crashes or freezes, or an
increase in unwanted internet activity and pop-up advertisements.

● Antivirus and antimalware software may be installed on a device to detect and


remove malware. These tools can provide real-time protection or detect and remove
malware by executing routine system scans.

● Windows Defender, for example, is Microsoft antimalware software included in the


Windows 10 operating system (OS) under the Windows Defender Security Center.
Windows Defender protects against threats such as spyware, adware and viruses.
Users can set automatic "Quick" and "Full" scans, as well as set low, medium, high
and severe priority alerts.
HOW TO REMOVE MALWARE???
As mentioned, many security software products are designed to detect and
prevent malware, as well as remove it from infected systems.
Malwarebytes is an example of an antimalware tool that handles detection and
removal of malware. It can remove malware from windows, macOS, android
and iOS platforms. Malwarebytes can scan a user's registry files, running
programs, hard drives and individual files. If detected, malware can then be
quarantined and deleted. However, unlike some other tools, users cannot set
automatic scanning schedules.
HOW TO PREVENT MALWARE
INFECTIONS???
● There are several ways users can prevent malware. In the case of protecting a personal
computer, users can install antimalware software.

● Users can prevent malware by practicing safe behavior on their computers or other
personal devices. This includes not opening attachments from strange email addresses
that may contain malware disguised as a legitimate attachment -- such emails may even
claim to be from legitimate companies but have unofficial email domains.

● Users should update their antimalware software regularly, as hackers continually adapt
and develop new techniques to breach security software. Security software vendors
respond by releasing updates that patch those vulnerabilities. If users neglect to update
their software, they may miss out on a patch that leaves them vulnerable to a
MALWARE RESPONSE PLAN
DOES MALWARE AFFECT MACS???
● Malware can affect Macs as well as Windows. Historically, Windows
devices are considered to be a larger target for malware than Macs, in
part because users can download applications for macOS through
the App Store.

● The company Malwarebytes reported in 2020 that for the first time
ever, malware on Macs is outpacing malware on PCs. This is in part
due to the popularity of Apple devices, drawing more attention from
hackers.
THANK YOU

You might also like