0% found this document useful (0 votes)
59 views33 pages

MALWARE

This document discusses different types of malware including viruses, worms, Trojans, ransomware, spyware, adware, rootkits, logic bombs, and keyloggers. It provides details on what each type is, examples of each, and recommendations for prevention. Types of malware are defined and categorized, with viruses, worms, and Trojans explained as programs that can self-replicate and spread. Ransomware encrypts files until payment is made while spyware and adware track users for advertising. Rootkits modify operating systems to enable remote access. Logic bombs activate on triggers to cause harm while keyloggers record keystrokes to steal passwords and data. The document advises keeping software updated, using strong unique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views33 pages

MALWARE

This document discusses different types of malware including viruses, worms, Trojans, ransomware, spyware, adware, rootkits, logic bombs, and keyloggers. It provides details on what each type is, examples of each, and recommendations for prevention. Types of malware are defined and categorized, with viruses, worms, and Trojans explained as programs that can self-replicate and spread. Ransomware encrypts files until payment is made while spyware and adware track users for advertising. Rootkits modify operating systems to enable remote access. Logic bombs activate on triggers to cause harm while keyloggers record keystrokes to steal passwords and data. The document advises keeping software updated, using strong unique
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 33

TOPIC:

► Presented by: Habiba Tanveer (22-Arid-4416)


Alina Kayani (22-Arid-4407)
Easham Naveed (22-Arid-4412)
CONTENTS:

► INTRODUCTION TO MALWARE
► TYPES OF MALWARE
► PREVENTIONS
► IDENTIFICATION OF MALWARE
► REMOVAL OF MALWARE
INTRODUCTION OF MALWARE:

► Malware is short for malicious software and refers to any


software that is designed to cause harm to computer systems,
networks, or users. Malware can take many forms. It’s
important for individuals and organizations to be aware of the
different types of malware and take steps to protect their
systems, such as using antivirus software, keeping software and
systems up-to-date, and being cautious when opening email
attachments or downloading software from the internet.
► Malware is a program designed to gain access to computer
systems, generally for the benefit of some third party, without
the user’s permission.
VIRUSES:
► These are programs that can replicate themselves and infect
other files on a computer. They often spread through infected
email attachments or downloaded files.
► Viruses can be harmless or they can modify or delete data.
Opening a file can trigger a virus. Once a program virus is
active, it will infect other programs on the computer.
Notes
● virus stand for (Vital Information Resources Under seize)
● it basically disturb the normal functionality
● It enters into the computer without the permission or knowledge of
the user

Types:
1. File infector virus
Effect the files and program.
2. Boot sector virus
Corrupt the operating system.
3. Radiate virus
O.S files program will be effected.
4. Macro virus
found in spread sheet files.

5. Multipartite virus
Both O.S and files will be infected.

6. Overwrite virus
Delete data and replace data.

7. polymorphic virus
it is file infector and though to detect.
Preventions from virus:
1. Firewall Protection
2. Regular Software Updates
3. Safe Browsing Practices
4. Email Security Measures
5. Avoiding Suspicious Downloads
6. User Education and Awareness
Worms:
► Worms are similar to viruses, but they can spread across networks and
systems without needing to attach themselves to other files. They can cause
significant damage by consuming network bandwidth or overloading servers.
► A virus needs a host program to run but worms can run by
themselves. After a worm affects a host, it is able to spread very
quickly over the network.
Types of worms:
1.Email Worms: Spread through email attachments and exploit vulnerabilities in
email systems.
2.Internet Worms: Exploit vulnerabilities in network services and spread over
the internet.
3.File-sharing Worms: Infect systems through shared files and folders on
networks.
4.Instant Messaging Worms: Propagate through instant messaging platforms
and exploit user contact lists.
5.Network Worms: Target vulnerabilities in network protocols to replicate and
spread.
6.Memory Resident Worms: Reside in a computer's memory, allowing
continuous operation and rapid spreading.
7.Macro Worms: Exploit macro capabilities in applications like Microsoft Word
to infect documents.
8.Mass Mailer Worms: Propagate by sending copies of themselves to a
large number of email addresses.
9.Blended Threat Worms: Combine multiple attack methods, making
them more versatile and challenging to detect.
10.Polymorphic Worms: Change their code to avoid detection by
antivirus programs, making them more resilient.
Preventions:
11. Antivirus Software
12. Firewall Protection
13. Regular Software Updates
14. Email Filtering
15. Network Segmentation
16. User Education and Awareness
17. Strong Access Controls
18. Safe File Sharing Practices
Trojan :
► Named after the famous Trojan horse, these types of malware disguise
themselves as legitimate software or files. Once installed, they can give
hackers unauthorized access to your system or steal sensitive information.
TYPES OF TROJAN:
1.Remote Access Trojans (RATs): Enable unauthorized remote access to a
computer, giving attackers control over the infected system.
2.Data Sending Trojans: Steal sensitive information from the infected
system and transmit it to the attacker, compromising data security.
3.Destructive Trojans: Designed to delete, modify, or corrupt files on the
infected computer, causing damage or disruption.
4.Downloader Trojans: Focus on downloading and installing additional
malware onto the compromised system, expanding the attack.
5.Proxy Trojans: Turn infected computers into proxies, allowing attackers to
use them as intermediaries to hide their identity and location.
PREVENTION FROM TROJAN:
1. Antivirus Software
2. Firewall Protection
3. Regular Software Updates
4. Email Filtering and Caution
5. Avoiding Suspicious Downloads
6. User Education and Awareness
Ransomware:
► This type of malware encrypts your files and demands a ransom in exchange
for the decryption key. It can be incredibly disruptive and can lead to data
loss if not handled properly.
Preventions:
● Regular backup
● Update Software
● Use Antimalware
● Email Security
● Monitor Network training(https)

Disadvantages:
● Financial problem
● Loss of Data
● Business Disruption
● Reputation Damage
● Time and resources to cover
Types of ransomware:
● Locker ransomware
● Crypto ransomware
● Scareware ransomware
● Doxware ransomware
● Mobile ransomware
● Maze ransomware
● Samsam ransomware
Spyware:
► Spyware is designed to monitor your activities without your knowledge or
consent. It can track your online behavior, capture keystrokes, and even
record your passwords and personal information.
Preventions:
● Enable automatic Update
● Use strong Password
● Use Antimalware
● Download software from secure source
● Regularly scan your computer

Disadvantages:
● Unauthorized Data collection
● Privacy invasion
● Resources consumption
● System slow down
● Security compromise
● Altered browser setting
● Unwanted advertisement
Types of Spyware:
● Tracking Cookies
● System monitoring
● Emails spyware
● SMS spyware
● Screen capturing
Adware:
► Adware displays unwanted advertisements on your computer, often in the
form of pop-ups or banners. While it may not be as harmful as other types of
malware, it can be annoying and impact your browsing experience.
Preventions:
● Install ad blocking Extensions
● Use strong Password
● Install reputational Antimalware
● Read End user licence agreement
● Be caution with online ads

Disadvantages:
● Unwanted Advertisement
● Browser Performance Degradation
● Resources consumption
● System slow down
● Browser Hijacking
● Altered browser setting
● Unwanted advertisement
Rootkits:
► A rootkit modifies the OS to make a backdoor. Attackers then
use the backdoor to access the computer distantly. Most rootkits
take advantage of software vulnerabilities to modify system files.
Preventions:
● Use reputational antivirus software
● Enable Automatic updates
● Regularly scan your system
● Read End user licence agreement

Disadvantages:
● Difficult to detect
● Unauthorized access
● System slow down
● System instability
● Data exfiltration
● Legal consequences
Types of rootkit:
● Memory based rootkit
● Bootkit rootkit
● Hardware rootkit
● Application rootkit
Logic bomb:

► A logic bomb is a malicious program that uses a trigger to


activate the malicious code. The logic bomb remains non-
functioning until that trigger event happens. Once triggered, a
logic bomb implements a malicious code that causes harm to a
computer. Cybersecurity specialists recently discovered logic
bombs that attack and destroy the hardware components in a
workstation or server including the cooling fans, hard drives,
and power supplies. The logic bomb overdrives these devices
until they overheat or fail.
Keylogger:

► Keylogger records everything the user types on his/her computer


system to obtain passwords and other sensitive information and send
them to the source of the keylogging program.
PREVENTIONS:
► Keep your software and operating system up to date. Regularly install updates
and security patches to protect against known vulnerabilities.
► Be cautious when clicking on links or downloading files. Avoid suspicious
websites and only download files from trusted sources.
► Use strong and unique passwords for all your accounts. Consider using a
password manager to help generate and manage secure passwords.
► Be wary of email attachments and links, especially from unknown senders. Don't
open attachments or click on links unless you're confident they're safe.
► Install reputable antivirus software and keep it updated. Regularly scan your
device for malware and follow the software's recommendations for removing any
threats
► Enable two-factor authentication whenever possible. This adds an extra layer of
security by requiring a second form of verification, such as a unique code sent to
your phone.
Backdoor:
► A backdoor bypasses the usual authentication used to access a
system. The purpose of the backdoor is to grant cyber criminals
future access to the system even if the organization fixes the
original vulnerability used to attack the system.
How To Know If Our Devices Are Infected With Malware:
The following are the most typical indications that malware has
compromised your computer:
1. Performing poorly on the computer by execution.
2. When your web browser directs you to a website you didn’t
intend to visit, this is known as a browser redirect.
3. Warnings about infections are frequently accompanied by offers
to buy a product to treat them.
4. Having trouble starting or shutting down your computer.
5. Persistent pop-up ads.
How To Remove Malware:

► As was already mentioned, a large number of security software


programs are made to both find and stop malware as well as to
eliminate it from infected systems.
► An antimalware tool that handles malware detection and
removal is Malwarebytes. Malware can be eliminated from
Windows, macOS, Android, and iOS operating systems. A user’s
registry files, currently running programs, hard drives, and
individual files can all be scanned by Malwarebytes. Malware
can then be quarantined and removed if it is found. Users
cannot, however, set automatic scanning schedules like they can
with some other tools.

You might also like