0% found this document useful (0 votes)
8 views6 pages

Malware

Uploaded by

Pawan Agnihotri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views6 pages

Malware

Uploaded by

Pawan Agnihotri
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Malware

 Stands for Malicious Software


 Cause Damage to
 Computer
 Server
 Client
 Network
 Types of malware
 VIRUS
 WORMS
 TROJAN HORSES
 PHISHING
 RANSOMWARE
 SPYWARE
 ADWARE
 ROUGUE SOFTWARE
 WIPER
 SCAREWARE
 VIRUS :

 Founder- Fred Cohen


 Vital Information Resource Under Seize
 Replicate with the help of human involvement.
 First VIRUS is Creeper in 1971 by Bob Thomas
 First Boot sector /Indian Virus was Brain in 1986 by Amjad Farooq Alvi
 Virus Executes only by human Action.
 VIRUS which stay in RAM & Deploy in RAM is called Resident Virus.
 VIRUS deploy in RAM, but not stay in RAM is called Non Resident Virus.
 Application Software Virus is called Macro Virus.
 VIRUS which changing type & Signature is called Polymorphic Virus.

 WORMS :

 Write Once Read Many


 Founder is Robert Morris
 Nature of Worms is self Replicating.
 Run Independently.

 TROJAN HORSE :

 Trojan is a type of malware.


 Pretend to be useful but actually not.
 Can take control of your computer.
 Sendingh,receiving,launching and deleting files and rebooting the computer.

 PHISHING :

 Clone website.
 Hack Username & Passward.
 Hack Login Credentials.
 Fake Webpage & Website.
 Not Start with HTTP/S.
 RANSOMWARE :

 Designed to deny access to a computer system or data.


 Demand for Ransom.
 Encrypts files.
 First Ransomware is AIDS/PC Cyborg.
 Exam. Of Ransomware :
 Locky-2016
 WannaCry-2017(150 Countries)
 Bad Rabbit-2017
 Ryuk-2018

 SPOOFING : (चकमा दे ना)

 IP Address.
 Address Resolution Protocol.
 Domain Name System.
 Emails from false sender.

 SNIFFING: (सूँघना )

 Capturing all the packets (Sniffers).


 Tapping phone wires.
 We can protect by using VPN.

 SPYWARE:

 Monitoring online behaviour .


 Type of Adware(POPUP).
 Tracking Cookies.
 Comes from Freeware/Shareware.
 Example: Keyloggers, Rootkits, Web Beacons.
 KEYLOGGERS:
o Also Called a keystroke Logger.
o Type of surveillance technology.
o Used to monitor and record each keystroke.
 ROOTKITS:
o Gain administrative access to your computer.
o Root means Super User & Kit means Grant attacker super user
abilities.
 WEB BEACONS:
o Track who visited web page.
o It is a transparent Graphic image placed on a sebsite.
o Used with Cookies.
o Also Called : Web Bug, Pixel Tag, Clear GIF .

 DDOS ATTACK:

 Distributed Denial Of Service.


 Hacker hacks into the system once the network is down.
 Botnets are created on user’s computers.
 Flood the bandwidth.

 SKIMMING DEVICE:

 Skimming Devices Attack.


 Steal bank details is through attaching ‘skimming’ devices in ATM machines.
 Readingh informationl from the magnetic strip on the back of the card when it is
inserted into the machine.

 ROGUE MALWARE:

 Type of internet fraud.


 Mislead user that there is VIRUS on computer.
 Convince user to pay for a fake malware removal tool.
 These tool install malware on user’s computer.

 WIPER MALWARE:

 Destructive in nature.
 Not to gain monetary benefits.
 Aim is to wiping entire Hard Disk.
 Prevent by Regular Backup.

 SCAREWARE:

 Scareware = Rogue Software + Ransomware


 Popup advertisement “ Your computer may be infected with harmful spyware
programs.” Immediate removal may be required . To scan, click “Yes” below.

 TIME BOMB Vs LOGIC BOMB ?

 TIME BOMB :
It is a virus program that performs an activity on a particular date.
 LOGIC BOMB:
It is a destructive program that performs an activity when a certain action has
occurred.
 MULTIPARTITE VIRUS :

 It Infect both files/Macro Infector and Boot Sectors.


 Infect Computer Multiple times.
 Example – Flip Multipartite Virus & Invader Multipartite Virus.

 CYBER STALKING:

 Online Stalking.
 Stalk or harass an individual, group, or organization.
 It may include false accusations, defamation.

You might also like