0% found this document useful (0 votes)
59 views15 pages

15 Malware and Its Types

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
59 views15 pages

15 Malware and Its Types

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Introduction of Malware

and Its Types

1
Introduction to Malware
Malware is any piece of software which is intended to cause harm to
your system or network. Malware is different from normal programs in
a way that most of them have the ability to spread itself in the network,
remain undetectable, cause changes/damage to the infected system or
network, persistence.
They have the ability to bring down the machine’s performance to
knees and can cause a destruction of the network.
Consider the case when the computer becomes infected and is no
longer usable, the data inside becomes unavailable – these are some of
the malware damage scenarios.

2
Malware Attacks examples

Below are some of the malware attacks in the history:


1. Melissa(1999)
2. My Doom(2004)
3. Stuxnet (2010)
4. Wannacry (2017)

For more details visit:


https://www.greycampus.com/blog/information-security/i
ntroduction-to-malware-definition-attacks-types-and-
analysis
3
Types of Malware

4
Contd….

A virus is the most common type of malware that can execute


itself and spread by infecting other programs or files.
A worm can self-replicate without a host program and typically
spreads without any human interaction or directives from the
malware authors.
A Trojan horse is designed to appear as a legitimate software
program to gain access to a system. Once activated following
installation, Trojans can execute their malicious functions.
Spyware is made to collect information and data on the device
and user, as well as observe the user's activity without their
knowledge. 5
Contd….

Ransomware is designed to infect a user's system and encrypt its


data. Cybercriminals then demand a ransom payment from the
victim in exchange for decrypting the system's data.
A rootkit is a type of malware which not only effects the software
but may also effect the hardware and is difficult to detect.
A backdoor virus or remote access Trojan (RAT) secretly creates
a backdoor into an infected computer system that enables threat
actors to remotely access it without alerting the user or the
system's security programs.

6
Contd….

Adware is used to track a user's browser and download history


with the intent to display pop-up or banner advertisements that
lure the user into making a purchase. For example, an advertiser
might use cookies to track the webpages a user visits to better
target advertising.
Keyloggers, also called system monitors, are used to track nearly
everything a user does on their computer. This includes emails,
opened webpages, programs and keystrokes
For more information visit:
https://medium.com/@b31shmc/introduction-to-malware-
7a54956da66d
7
Keylogger

8
Virtual Key board

9
Virtual Keyboard

10
How to Detect Malicious Software
• There is a degradation of system performance
• New folders and files on the system
• Unknown processes running in the task manager
• Scan for suspicious ports
• Scan for suspicious registry entries
• New programs in the startup section
For more information Visit:
https://clutch.co/it-services/resources/5-signs-of-malware-infection-
and-how-to-get-rid-of-it
11
Countermeasures: or prevention using Malware
• Turn on the firewall
• Use updated Anti-virus, IDS (Intrusion Detection system)
• Shut down unnecessary ports
• Scan for the process running periodically
• Run anti-spyware anti-adware
• Do not open files which look suspicious
• Do not open emails from unknown users or suspicious
attachments

12
Contd…

• Do not Open flash drives(Pen drives) before scanning it with


anti malware apps
• Never download and install software from the Internet
unless you are certain it is from a trusted source.
• Don’t trust cracked or hacked software as they often
contain malware, Trojans.
• Install or update security patches of the system software(OS
or Firmware)

13
Most Popular Antimalware/Antivirus software

14
Thanks

15

You might also like