Unit 2 Malicious Software
Unit 2 Malicious Software
What is Malware?
Malware is software that gets into the system without user consent to steal the
user’s private and confidential data, including bank details and passwords. They
also generate annoying pop-up ads and change system settings. Malware includes
computer viruses, worms, Trojan horses, ransomware, spyware, and other
malicious programs. Individuals and organizations need to be aware of the
different types of malware and take steps to protect their systems, such as using
antivirus software, keeping software and systems up-to-date, and being cautious
when opening email attachments or downloading software from the internet.
Malware is designed to harm and exploit your computer or network. It can steal
sensitive information like passwords and credit card numbers, disrupt your
system’s operations, and even allow attackers to gain unauthorized access to your
device. Some types of malware, such as ransomware, encrypt your files and
demand payment to unlock them, while spyware monitors your activities and
sends the information back to the attacker. Additionally, malware can spread to
other devices on the same network, making it a significant threat. Protecting your
devices with up-to-date antivirus software and being cautious about your open
links and attachments can help mitigate these risks.
Types of Malware
Once the traps are set, users can easily infect their own systems by opening email
attachments, downloading executable files, visiting websites or clicking on web
advertisements (malvertising). If any such sources are hiding a virus, the user's
computer will often become infected. Viruses can also spread through infected
removable storage devices, such as USB flash drives.
Computer Virus Life Cycle
File Virus:
This type of virus infects the system by appending itself to the end of a file. It
changes the start of a program so that the control jumps to its code. After the
execution of its code, the control returns back to the main program. Its execution
is not even noticed. It is also called a Parasitic virus because it leaves no file intact
but also leaves the host functional.
Boot sector Virus:
It infects the boot sector of the system, executing every time system is booted
and before the operating system is loaded. It infects other bootable media like
floppy disks. These are also known as memory viruses as they do not infect the
file systems.
Polymorphic Virus:
A virus signature is a pattern that can identify a virus(a series of bytes that make
up virus code). So in order to avoid detection by antivirus a polymorphic virus
changes each time it is installed. The functionality of the virus remains the same
but its signature is changed.
Encrypted Virus:
In order to avoid detection by antivirus, this type of virus exists in encrypted form.
It carries a decryption algorithm along with it. So the virus first decrypts and then
executes.
Stealth Virus:
It is a hidden computer virus, which specifically attacks operating system
processes. It usually hides itself in partitions, files or boot sectors and is capable of
going unnoticed during antivirus or anti-malware scans, i.e., it can avoid detection
intentionally.
Macro Virus:
Macro viruses are embedded in files, collectively with Microsoft Word or Excel
files. They use the macro language in those files to infect and propagate to other
documents even as opened.
Multipartite Virus:
This type of virus is able to infect multiple parts of a system including the boot
sector, memory, and files. This makes it difficult to detect and contain.
Armored Virus:
An armored virus is coded to make it difficult for antivirus to unravel and
understand. It uses a variety of techniques to do so like fooling antivirus to
believe that it lies somewhere else than its real location or using compression to
complicate its code.
Directory Virus:
This virus is also called called File System Virus or Cluster Virus. It infects the
directory of the computer by modifying the path that is indicating the location of
a file.
Companion Virus:
This kind of virus usually use the similar file name and create a different extension
of it. For example, if there’s a file “Hello.exe”, the virus will create another file
named “Hello.com” and will hide in the new file.
Symptoms of a Computer Virus:
There are many warning signs or symptoms which show that a computer is
infected with a virus, some of which are as follows:
Slow computer performance: The machine may work slowly, e.g., it will
take more time to open or shut down the computer or while opening a file,
document, computer application, etc. The operating system and internet
speed may get slow.
Frequent pop-ups: A virus may cause unusual frequent pop-ups on your
window.
Hard Drive issue: The hard drive may exhibit unusual high activity even
when it is not in use. It may cause unwanted changes to your hard drive
and may freeze or crash this device.
Frequent crashes: One may experience frequent sudden system crashes
while playing games, watching videos, or doing some other work using the
infected system. A blue screen appears when it crashes.
Unknown programs: Unwanted programs may open or start automatically
when you start your computer. You can see these programs in your
computer's list of active applications. Sometimes, the window shuts down
unexpectedly without any reason.
Unusual activities: Your machine may perform differently, such as you may
not be able to log into your accounts, to delete the corrupt files, and Blue
Screen of Death (BSOD) may appear frequently, and more. Furthermore,
the hardware, software, or OS may start malfunctioning leading to crashing
the system abruptly.
Impaired security solutions: Sometimes, security measures taken by you,
such as antivirus may not work smoothly due to virus attack on your
computer.
Network issue: Sometimes, you experience high network activity even if
you are not connected to the internet and vice versa.
Unnecessary advertisement: We often see advertisements while browsing,
but if you see them even when you are not browsing, it may indicate a virus
on your computer.
Display problems: You may experience different colors in your display if
your computer is affected by a virus.
Affected Applications: Some viruses are developed to affect specific
applications. Consequently, some applications may not work on your
computer if it is infected.
Blocked by Antivirus Sites: An antivirus site may deny access to a computer
that is infected by a virus.
Dialog Boxes: Many dialog boxes keep appearing suddenly on your screen.
Printer Issues: A printer attached to an infected computer may print
documents without getting any command or in an inappropriate manner.
Changed Homepage: Your home page may get changed without any effort
from your side. For example, you may see a new toolbar on your screen,
and you may be redirected to a different web address instead of the page
visited by you initially.
Strange messages: One may see strange messages on a computer screen
such as error messages.
Denial of service (DOS) is a network security attack, in which, the hacker makes
the system or data unavailable to someone who needs it. Hacker tries to make a
network, system, or machine unavailable by flooding it with fake requests or
traffic. This prevents real users from accessing it, causing anything from
slowdowns to complete shutdowns.
DoS attacks can have severe consequences for businesses and users alike. Here
are some impacts of DoS attacks:
There are several measures businesses can take to prevent DoS attacks, including:
Implementing DDoS protection solutions that can detect and mitigate DoS
attacks in real time.
Ensuring their website and network infrastructure is up-to-date with the
latest security patches.
Using strong authentication mechanisms, such as multi-factor
authentication, to prevent unauthorized access to the network.
Monitoring network traffic to detect unusual patterns and take immediate
action to prevent potential attacks.