Chapter 05
Chapter 05
FUNDAMENTALS
Chapter 05: Types of Computer Malware
1
NOTE: These are sample slides for the book. Full permission has been granted for
use of these slides for educational purposes. Instructors can modify any portion as
required.
Types of Computer Malware
Trojan
Introduction Viruses Rootkit Spyware
Horse
Scarewar Browser
Worms Adware
e Hijacker
2
Introduction
◦ The malware is a computer software program maliciously developed to install on
the computers without any consent of the users.
◦ The main objective of malware programs is to either establish the access to the
targeted computers without any permission of the user or to install the program
to create annoyance for the users.
◦ The annoyance can include pranks مقالب, data theft, data damage, computer
malfunction, service blockage, and spying on the users.
◦ In most of the cases, the malwares are installed on the targeted computers to
achieve different types of goals, which may include getting financial favor,
knowing the business strategies, sabotaging the governmental system, and many
others.
3
Introduction
◦ In certain cases, those programs are detected and named by the cyber
security companies.
◦ But all those programs fall under the major categories, which are very well
known in the field of computer security.
4
Introduction
The main types of malware software programs are explained below:
◦ Viruses
◦ Trojan Horse
◦ Rootkit
◦ Spywares
◦ Worms
◦ Adware
◦ Scareware
◦ Browser Hijacker
5
Viruses
◦ A computer virus is a malicious computer program, which is designed to alter the
computer functions, slow down the computer performance, and to damage the
valuable files on the computer drive.
◦ The virus are executable files when run on any machine by mistake or through
any trick, it will activate and will start altering the computer configurations and
the process, which are used for the smooth operation of the computers.
◦ The virus programs have the capability to copy into multiple files and thus,
overwhelm the computer processes and data storage.
6
Viruses
◦The main sources of virus propagation include:
7
Viruses
◦ The viruses are just programs in the form of executable files. They
don’t activate without running those executable files on your
computers.
◦ If you got a virus program on your computer, but it has not been
executed on your computer, your computer is not infected as yet.
8
Viruses
◦The objectives of spreading a virus many include:
9
Viruses
◦ That may include stealing data and selling it to the third party, or even
using that data for malicious financial transactions.
10
Viruses
The main symptoms of a virus infected computer may include the following:
11
Viruses
◦ The solution to the menace تهديدof computer virus is use updated antivirus
software from well-known antivirus software companies.
12
Viruses
We can save our computers from the attack of nasty مقرفviruses by
taking the following measures:
13
Viruses
─ Don’t use your credit cards on the websites that don’t comply االمتث ال
with the Payment Card Industry Data Security Standard (PCI-DSS)
guidelines for secure transactions.
─ Never insert flash cards or other storage devices to your computer
without scanning and knowing about the type of data.
─ Never open emails and their attachments from unknown people.
By following the above mentioned rules of thumb, you can save your
computer from the effect of computer viruses.
14
Trojan Horse
◦ Trojan horse is also a malicious computer program that may look very
meek and harmless وديع وغير ضار, but it can pave يمهدthe way for a
bigger attack on your computer and valuable data.
◦ It collects the information about the user behavior, credentials and
other activities on the computer silently and sends them to its command
and control center from where the other malicious attacks can originate.
◦ Hackers use Trojan to open the backdoor on your computer to access
your computer and establish control on your machine.
15
Trojan Horse
◦ The concept of the Trojan horse in the modern computer terminology
resembles 100% with the story of Trojan horse in the Greek mythology.
◦ The people of the Troy city would pull the Trojan to the city and the
soldiers hidden inside the Trojan horse would come out in the night and
would open the gates of the cities.
◦ They would call their fellow soldiers to come in and overrun the city to
conquer. 16
Trojan Horse
◦ The concept of Trojan horse in computer security is also same.
◦ They would sit on the computers and start spying, making changes in
credentials and doing other such malicious activities.
◦ The main objectives of Trojan horse are to spy on the user activities and
send back to its master control.
18
Trojan Horse
◦Generally recognized activities of a Trojan horse on an infected
computer include:
19
Trojan Horse
◦ There are numerous types of Trojan horses used in the modern
cybercrimes.
21
Spyware
◦ A few years back the NSA data snooping jolted the entire world.
◦ In that security surveillance the privacy of the online people all over the world
was compromised.
◦ The tougher laws and regulations were brought into force all over the world to
maintain the security and privacy of the online users.
◦ Thus, the privacy has not become matter of individuals only, but also a big
concern for all businesses and enterprises all over the world.
◦ At the initial stages, the attack of spyware is not even noticed, but slowly and
gradually the impact of the spyware unleashes on your system as well as
personally on you.
22
Spyware
The symptoms of a spyware attack on your computer may include the
following:
23
Spyware
A few important measures to reduce the impact of spyware are listed below.
25
Worms
◦ The main feature of a computer worms and viruses is that they replicate
themselves in order to spread to other computers on the network or through
other data transmission mediums.
◦ Computer worms are the types of malware software programs that replicate
on the computers to consume the majority portions of the computer
resources like bandwidth, hard disk, and memory.
◦ This worm was created to save the time of code creation on every single
machine individually. So that worm code replicated on all machines on the
network. It was not a maliciously intended code.
27
Worms
◦ So, the ratio of the servers that went down due to Morris worm was about
10% of the entire internet.
◦ The estimated cost of that worm attack was between $0.1 million and $10
million.
◦ After that worm attack many other worms were released on the internet
through different sources. A few very important worms are listed below:
─ Blaster worm
─ My Doom worms
─ Code Red worm
─ I LOVE YOU worm
─ CIH worm
28
Worms
The main points of a worm can be summarized as below:
─ Some errors related to the operating system and system files appear
─ The modified files disappear or don’t open
─ Firewall warnings may popup in certain cases
─ Strange icons or files appear on the desktop
─ Computer generates unknown errors in sounds, messages or even in
images
─ The performance of computers slows down
30
Worms
31
Worms
The worms can be prevented by using taking the following measures and
guidelines:
◦ Different tactics are used by the marketers to make their digital marketing
campaigns effective.
◦ The adware code uses different ways to propagate and find the suitable
targets so that the focused audience is figured out اكتشفfor a particular
product.
◦ You might have come across some annoying links and pages while browsing
the internet. When you click on those pages or links you are redirected to
another page that promotes a particular product or service.
─ Frequent redirects
─ Huge number of spam emails
─ Frequent popup windows of offers
─ Bombardment of product ads in browser
─ Heavy outgoing and incoming traffic
─ Slowdown of internet connection
35
Adware
◦ So, an adware is a software code that is used to force the users to see a
particular advertisement or promotional content on any website,
popup window or a commercial advertisement.
36
Adware
◦You can avoid adware or reduce them by taking the following
measures:
37
Adware
◦ This is very important to note that adware is normally not so
dangerous to damage your computer or valuable data; so,
don’t panic هلعat all.
38
Adware
◦ Hundreds of adware have been detected on the internet, a few very important
among those adware codes are listed below:
─ DeskAd adware
─ SpyTrooper adware
─ WebCake adware
─ WebSparkle adware
─ 1ClickDownloader adware
─ Aartemis search adware
─ AnyWhereMe toolbar adware
─ AllSearchApp adware
─ GetSavin adware
─ Hotspot Shield adware
39
Scareware خداع
◦ Scareware is a type of malware, which pops up in window with a serious warning
about any virus threat on your computer.
◦ But, in reality there is no threat or virus on your computer excepting that hoax
خدعة, which appeared on your screen.
◦ The alert looks very genuine from certain reputable حسن السمعةwebsites, but they
are not genuine websites.
◦ This message normally prompts حثthe users to download or call some numbers to
get help.
◦ The main objective behind the Scareware is sale fake and bogus products.
◦ The use of scareware has been also found in the entertainment pranks.
40
Scareware
Use of the Scareware:
(1) The hackers trick the users to input the credit card, personal, and bank
information on their website. Once you provide that information, your data has
been compromised for malicious financial uses.
(2) To force the user to download some free antivirus software to clean your
computer from those viruses that the website has detected. But, that free antivirus
is itself a dangerous software program, which can control your computer and start
damaging your system or stealing your data.
41
Scareware
The main objectives of spreading scare may include the following:
42
Scareware
You can avoid the impact of scareware by taking the following steps:
◦ The hackers use the social engineering tactics to force you follow the
instructions they give you.
◦ So, always use your common sense and remain calm and cool to deal
with the situation.
44
Browser Hijacker
◦ You might have been in the situation when the default settings of your
browser were changed. For example, your default search engine was
changes to a new one without getting permission from you.
◦ As we know that the browser is one of the core software tools that are
used to connect to a wide range of computer programs, web
applications, websites, and many other digital resources located on the
internet or even on the local networks.
◦ In some cases, you might have seen that some unknown plugins
اإلضافاتhave been installed and activated on your browser. Although
you have not downloaded or installed on your browser, but still they
are there and active.
46
Browser Hijacker
◦ Browser Hijacker malware is a certain malicious code.
◦ This code is used to pave the way for different kinds of cyberattacks on your
computer or to the other computers on your network.
◦ The main objective of browser hijacker software is to force the users to visit
certain websites for improving the volume of traffic on that particular website.
◦ When the traffic of a website is improved, the website gets higher revenue of
online advertisement.
47
Browser Hijacker
The browser hijacker malware can also be used for stealing personal
information, user accounts, and other information for financial benefits.
48
Browser Hijacker
You can save your browser from being hijacked by the browser hijacker
malware by taking the following measures:
49
Rootkit
◦ Rootkit الجذور الخفيةis a type of malware that gets the administrator level
privileges on the operating system of the computer without showing its
presence on the computer.
◦ The main feature of rootkit is that it hides from being detected easily but
maintains the control over the operating system to perform its designated
tasks on the system.
50
Rootkit
◦ As we know all applications on the computer including the antivirus, anti-
malware, and other security related applications use the application
programming interfaces or APIs provided by the operating system.
◦ A powerful rootkit gets control on those APIs and establishes the full
control on the system.
◦ The rootkit malware subverts the request sent to the operating system
51
from reaching to the desired API and responds with fake responses.
Rootkit
◦ Moreover, you request the operating system to start the antivirus or anti-
malware application to scan your computer; the request is interrupted
from reaching to the operating system. The rootkit interrupts the request
and sends you a fake response that the program you requested for is not
working at this time.
52
Rootkit
There are three main goals (objectives) of a rootkit on a computer as
mentioned below:
53
Rootkit
◦ There are numerous types of rootkits based on the objective and point of
attack on the systems.
─ Memory rootkits
─ Kernel rootkits
─ Bootkit rootkits
─ Firmware rootkits
─ Library rootkits
─ Application rootkits
54
Rootkit
◦ For a normal user of the computer, it may be very difficult to recognize that the
computer has been infected by the rootkits.
◦ If the computer shows the following symptoms, then you should suspect that the
computer has been infected by the rootkit attack.
55
Rootkit
─ Infected ُمصابdownloads
─ Unknown emails
─ Short text messages (SMS)
56
Rootkit
◦ It is very difficult to detect and remove the rootkit from your computer, once it has established the control over
the operating system APIs.
◦ Normally, the rootkit remains unnoticed on the machine and keeps doing its job.
◦ For remaining many days on the computer, the system becomes a rogue محتالmachine, and many malicious
programs start running on the machine. Those programs will be used for different malicious activities.
◦ You will find the behavior of operating system very irritating مزعجwith the passage of time. One day you will see
a cryptic blue screen of death and your computer will never load again normal.
◦ Now, you will have to re-install and configure your computer from the scratch.
57
Rootkit
But you can still take the following steps to avert تجنبfrom getting rootkits
control of your computer. Save
solve
58
Rootkit
─ Scan and clean flash or other data traveling devices before opening the files
─ Use the latest anti-rootkit tools with Security Technology and Response
(STAR) technology
─ Keep your anti-malware up to date
─ Keep operating system up to date
59
Rootkit
◦ Many new software tools have also been created by the major computer
security software providers like Norton, Avast, Panda, Kaspersky, and
others.
◦ All those tools are able to detect the rootkits if present on your computer.
They are also able to remove the nastiest forms of the rootkits on your
computer easily.
60
THANK YOU!
61