MALWARE
MALWARE
► INTRODUCTION TO MALWARE
► TYPES OF MALWARE
► PREVENTIONS
► IDENTIFICATION OF MALWARE
► REMOVAL OF MALWARE
INTRODUCTION OF MALWARE:
Types:
1. File infector virus
Effect the files and program.
2. Boot sector virus
Corrupt the operating system.
3. Radiate virus
O.S files program will be effected.
4. Macro virus
found in spread sheet files.
5. Multipartite virus
Both O.S and files will be infected.
6. Overwrite virus
Delete data and replace data.
7. polymorphic virus
it is file infector and though to detect.
Preventions from virus:
1. Firewall Protection
2. Regular Software Updates
3. Safe Browsing Practices
4. Email Security Measures
5. Avoiding Suspicious Downloads
6. User Education and Awareness
Worms:
► Worms are similar to viruses, but they can spread across networks and
systems without needing to attach themselves to other files. They can cause
significant damage by consuming network bandwidth or overloading servers.
► A virus needs a host program to run but worms can run by
themselves. After a worm affects a host, it is able to spread very
quickly over the network.
Types of worms:
1.Email Worms: Spread through email attachments and exploit vulnerabilities in
email systems.
2.Internet Worms: Exploit vulnerabilities in network services and spread over
the internet.
3.File-sharing Worms: Infect systems through shared files and folders on
networks.
4.Instant Messaging Worms: Propagate through instant messaging platforms
and exploit user contact lists.
5.Network Worms: Target vulnerabilities in network protocols to replicate and
spread.
6.Memory Resident Worms: Reside in a computer's memory, allowing
continuous operation and rapid spreading.
7.Macro Worms: Exploit macro capabilities in applications like Microsoft Word
to infect documents.
8.Mass Mailer Worms: Propagate by sending copies of themselves to a
large number of email addresses.
9.Blended Threat Worms: Combine multiple attack methods, making
them more versatile and challenging to detect.
10.Polymorphic Worms: Change their code to avoid detection by
antivirus programs, making them more resilient.
Preventions:
11. Antivirus Software
12. Firewall Protection
13. Regular Software Updates
14. Email Filtering
15. Network Segmentation
16. User Education and Awareness
17. Strong Access Controls
18. Safe File Sharing Practices
Trojan :
► Named after the famous Trojan horse, these types of malware disguise
themselves as legitimate software or files. Once installed, they can give
hackers unauthorized access to your system or steal sensitive information.
TYPES OF TROJAN:
1.Remote Access Trojans (RATs): Enable unauthorized remote access to a
computer, giving attackers control over the infected system.
2.Data Sending Trojans: Steal sensitive information from the infected
system and transmit it to the attacker, compromising data security.
3.Destructive Trojans: Designed to delete, modify, or corrupt files on the
infected computer, causing damage or disruption.
4.Downloader Trojans: Focus on downloading and installing additional
malware onto the compromised system, expanding the attack.
5.Proxy Trojans: Turn infected computers into proxies, allowing attackers to
use them as intermediaries to hide their identity and location.
PREVENTION FROM TROJAN:
1. Antivirus Software
2. Firewall Protection
3. Regular Software Updates
4. Email Filtering and Caution
5. Avoiding Suspicious Downloads
6. User Education and Awareness
Ransomware:
► This type of malware encrypts your files and demands a ransom in exchange
for the decryption key. It can be incredibly disruptive and can lead to data
loss if not handled properly.
Preventions:
● Regular backup
● Update Software
● Use Antimalware
● Email Security
● Monitor Network training(https)
Disadvantages:
● Financial problem
● Loss of Data
● Business Disruption
● Reputation Damage
● Time and resources to cover
Types of ransomware:
● Locker ransomware
● Crypto ransomware
● Scareware ransomware
● Doxware ransomware
● Mobile ransomware
● Maze ransomware
● Samsam ransomware
Spyware:
► Spyware is designed to monitor your activities without your knowledge or
consent. It can track your online behavior, capture keystrokes, and even
record your passwords and personal information.
Preventions:
● Enable automatic Update
● Use strong Password
● Use Antimalware
● Download software from secure source
● Regularly scan your computer
Disadvantages:
● Unauthorized Data collection
● Privacy invasion
● Resources consumption
● System slow down
● Security compromise
● Altered browser setting
● Unwanted advertisement
Types of Spyware:
● Tracking Cookies
● System monitoring
● Emails spyware
● SMS spyware
● Screen capturing
Adware:
► Adware displays unwanted advertisements on your computer, often in the
form of pop-ups or banners. While it may not be as harmful as other types of
malware, it can be annoying and impact your browsing experience.
Preventions:
● Install ad blocking Extensions
● Use strong Password
● Install reputational Antimalware
● Read End user licence agreement
● Be caution with online ads
Disadvantages:
● Unwanted Advertisement
● Browser Performance Degradation
● Resources consumption
● System slow down
● Browser Hijacking
● Altered browser setting
● Unwanted advertisement
Rootkits:
► A rootkit modifies the OS to make a backdoor. Attackers then
use the backdoor to access the computer distantly. Most rootkits
take advantage of software vulnerabilities to modify system files.
Preventions:
● Use reputational antivirus software
● Enable Automatic updates
● Regularly scan your system
● Read End user licence agreement
Disadvantages:
● Difficult to detect
● Unauthorized access
● System slow down
● System instability
● Data exfiltration
● Legal consequences
Types of rootkit:
● Memory based rootkit
● Bootkit rootkit
● Hardware rootkit
● Application rootkit
Logic bomb: