Malware Analysis
Malware Analysis
Rahul Kumar
Assistant Professor SoCS
MALWARE
Malware is an executable binary that is malicious in nature.
Malware’s can be used by attackers to perform variety of malicious actions
like Spying on the target using Keyloggers or RAT’S, they can also delete your data or
encrypt your data for “Ransom”.
•Determine how the system was infected by malware and define if it was a
DATA MANAGMENT
1.Threat Detection: Malware analysis enables the detection of previously unknown threats, allowing
organizations to proactively defend against attacks.
2.Improved Security: By understanding the behavior of malware, organizations can improve their
security measures and reduce the risk of infection.
3.Understanding of Attack Techniques: Malware analysis provides insight into the methods and
techniques used by attackers, allowing organizations to better prepare for and defend against future
attacks.
4.Early Detection: By analyzing malware early in its lifecycle, organizations can mitigate the impact
of an attack and reduce the time required to recover from it.
5.Forensics: Malware analysis can provide valuable information for forensic investigations and can
aid in the prosecution of attackers.
Antivirus software (computer protection software) is a program(s) that is created to search, detect,
prevent and remove software viruses from your system that can harm your system. Other harmful
software such as worms , adware, and other threats can also be detected and removed via antivirus. This
software is designed to be used as a proactive approach to cyber security, preventing threats from
entering your computer and causing issues. Most antivirus software operates in the background once
While you may believe that your computer is safe as long as you don’t visit questionable websites,
hackers have far more sophisticated methods of infecting your computer, which is why you need a
powerful antivirus to stay to secure your data and system. The implications of a virus getting into your
computer might be fatal. Viruses can cause a wide range of malicious behavior. They can crash your
device, monitor your accounts, or spy on you through your webcam. So, always use antivirus software.
virus will be able to defeat antivirus protection. The antivirus software will be ineffective unless
•No customer care service: There will be no customer service provided unless you pay for the
premium version. If an issue arises, the only method to solve it is to use forums and knowledge
resources.
Spyware entering the system is very dangerous and therefore proper knowledge of them can
save a lot of trusted information from being accessible to third-party. Spywares are classified
on the basis of the function they perform. There are different types of Spyware, which can
•Adware: It is a type of Spyware that keeps track of the user’s activity and gives
advertisements based on the tracked activity of the user.
•Tracking Cookies: It is a type of Spyware that tracks a user’s activity and supplies the same
to third parties.
stalk the user. It tracks the movement of the user and sends the same to the
third party.
•System Monitor: It is a type of Spyware that monitors and keep a track of the
the user and cause data theft. The most common type of phishing attack
information that they think should be kept private. The original logo of the
email is used to make the user believe that it is indeed the original email.
But if we carefully look into the details, we will find that the URL or web
These are the impacts on the user upon affecting the Phishing Attacks. Each person has their
own impact after getting into Phishing Attacks, but these are some of the common impacts that
•Financial Loss: Phishing attacks often target financial information, such as credit card numbers
and bank account login credentials. This information can be used to steal money or make
and date of birth, which can be used to steal an individual’s identity and cause long-term harm.
•Damage to Reputation: Organizations that fall victim to phishing attacks can suffer damage to their
reputation, as customers and clients may lose trust in the company’s ability to protect their
information.
business operations, as employees may have their email accounts or computers compromised, leading
•Spread of Malware: Phishing attacks often use attachments or links to deliver malware, which can
sense of urgency in order to trick victims into providing personal information quickly.
Be cautious of emails or messages that ask for personal information and make sure to
•Poor grammar and spelling: Phishing attacks are often created quickly and carelessly
and may contain poor grammar and spelling errors. These mistakes can indicate that the
real websites. Here are some of the ways mentioned through which you can
identify which websites are real and which ones are fake. To distinguish
between a fake website and a real website always remember the following
points:
protect yourself from online threats. So, when you first see a website link, always check the
beginning of the website. That means if a website is started with https:// then the website is
secure because https:// s denotes secure, which means the website uses encryption to transfer
data, protecting it from hackers. If a website uses http:// then the website is not guaranteed to be
safe. So, it is advised not to visit HTTP websites as they are not secure.
•Check the domain name of the website: The attackers generally create a website whose
closely, we can see that it’s a fake website as the spelling of Amazon is wrong, that is amazon is
•Check for the available web pages: A fake website does not contain the entire web pages that are
present in the original website. So when you encounter fake websites, then open the option(links)
present on that website. If they only display a login page, then the website is fake
Well, it’s essential to use Anti-Phishing tools to detect phishing attacks. Here are some of the
•Anti-Phishing Domain Advisor (APDA): A browser extension that warns users when they
visit a phishing website. It uses a database of known phishing sites and provides real-time
attacks. Users can submit phishing reports and check the status of suspicious websites.
signatures. When the system detects suspicious traffic, it blocks it from entering the network.
Types of IPS
1.Network-Based IPS: A Network-Based IPS is installed at the network perimeter and monitors all traffic
2.Host-Based IPS: A Host-Based IPS is installed on individual hosts and monitors the traffic that goes in
IPS Technology Type Types of Malicious Activity Detected Scope per Sensor Strengths
malicious transactions and sends immediate alerts when it is observed. It is software that
checks a network or system for malicious activities or policy violations. Each illegal
activity or violation is often recorded either centrally using a SIEM system or notified to
an administration. IDS monitors a network or system for malicious activity and protects a
computer network from unauthorized access from users, including perhaps insiders. The
intrusion detector learning task is to build a predictive model (i.e. a classifier) capable of
connections’.
•Network Intrusion Detection System (NIDS): Network intrusion detection systems (NIDS) are
set up at a planned point within the network to examine traffic from all devices on the network. It
performs an observation of passing traffic on the entire subnet and matches the traffic that is passed
on the subnets to the collection of known attacks. Once an attack is identified or abnormal behavior
is observed, the alert can be sent to the administrator. An example of a NIDS is installing it on the
subnet where firewalls are located in order to see if someone is trying to crack the firewall.
(PIDS) comprises a system or agent that would consistently reside at the front end of a server,
controlling and interpreting the protocol between a user/device and the server. It is trying to secure the
web server by regularly monitoring the HTTPS protocol stream and accepting the related HTTP
protocol. As HTTPS is unencrypted and before instantly entering its web presentation layer then this
system would need to reside in this interface, between to use the HTTPS.
1.Signature-based Method: Signature-based IDS detects the attacks on the basis of the
specific patterns such as the number of bytes or a number of 1s or the number of 0s in the
network traffic. It also detects on the basis of the already known malicious instruction
sequence that is used by the malware. The detected patterns in the IDS are known as
signatures. Signature-based IDS can easily detect the attacks whose pattern (signature) already
exists in the system but it is quite difficult to detect new malware attacks as their pattern
malware attacks as new malware is developed rapidly. In anomaly-based IDS there is the
use of machine learning to create a trustful activity model and anything coming is
compared with that model and it is declared suspicious if it is not found in the model. The
signature-based IDS as these models can be trained according to the applications and
hardware configurations.