Malware Forensics Introduction
Malware Forensics Introduction
INTRODUCTION
MALWARE
• MALICIOUS SOFTWARE
• any program or file that is harmful to a computer
user.
• TYPES:-computer viruses, worms, Trojan horses and
spyware
• malicious programs can perform a variety of
functions such as stealing, encrypting or deleting
sensitive data, monitoring users' computer
activity,asking for randsomware,lock computer
system,talk to internet.
What does malware do?
• The term malware was first used by computer scientist and security researcher Yisrael
Radai in 1990. However, malware existed long before this.
• One of the first known examples of malware was the Creeper virus in 1971, which was
created as an experiment by BBN Technologies engineer Robert Thomas. Creeper was
designed to infect mainframes on ARPANET. While the program did not alter functions --
or steal or delete data -- it moved from one mainframe to another without permission
while displaying a teletype message that read, "I'm the creeper: Catch me if you can."
• Creeper was later altered by computer scientist Ray Tomlinson, who added the ability to
self-replicate to the virus and created the first known computer worm.
• The concept of malware took root in the technology industry, and examples of viruses
and worms began to appear on Apple and IBM personal computers in the early 1980s
before becoming popularized following the introduction of the World Wide Web and the
commercial internet in the 1990s. Since then, malware, and the security strategies to
prevent it, have only grown more complex.
MALWARE FORENSICS
• It is a way of finding, analyzing & investigating
various properties of malware to seek out the
culprits and reason for the attack.
• the method also includes tasks like checking
out the malicious code, determining its entry,
method of propagation, impact on the system,
ports it tries to use etc.
• investigators conduct forensic investigation
using different techniques and tools.
investigative & forensic methodologies