Module - III Fcs
Module - III Fcs
What is malware?
Malware, or malicious software, is any program or file that's intentionally harmful to a computer, network or
server.Types of malware include computer viruses, worms, Trojan horses, ransomware and spyware. These
malicious programs steal, encrypt and delete sensitive data; alter or hijack core computing functions; and
some way. Depending on the type of malware and its goal, this harm might present itself differently to the user
or endpoint. In some cases, the effect of malware is relatively mild and benign, and in others, it can be
disastrous.
Malware can typically perform the following harmful actions:
● Data exfiltration. Data exfiltration is a common objective of malware. During data exfiltration, once a system is infected with malware,
threat actors can steal sensitive information stored on the system, such as emails, passwords, intellectual property, financial information
and login credentials. Data exfiltration can result in monetary or reputational damage to individuals and organizations.
● Service disruption. Malware can disrupt services in several ways. For example, it can lock up computers and make them unusable or
hold them hostage for financial gain by performing a ransomware attack. Malware can also target critical infrastructure, such as power
record keystrokes, access web cameras and microphones and capture screenshots.
● Identity theft. Malware can be used to steal personal data which can be used to impersonate victims, commit fraud or gain access to
additional resources. According to the IBM X-Force Threat Intelligence Index 2024, there was a 71% rise in cyberattacks using stolen
known as cryptojacking.
● System damage. Certain types of malware, such as computer worms, can damage devices by corrupting the system files, deleting data
or changing system settings. This damage can lead to an unstable or unusable system.
How do malware infections happen?
Malware authors use a variety of physical and virtual means to spread malware that infects devices and networks, including the
following:
● Removable drives. Malicious programs can be delivered to a system with a USB drive or external hard drive. For
example, malware can be automatically installed when an infected removable drive connects to a PC.
● Infected websites. Malware can find its way into a device through popular collaboration tools and drive-by downloads,
which automatically download programs from malicious websites to systems without the user's approval or knowledge.
● Phishing attacks. Phishing attacks use phishing emails disguised as legitimate messages containing malicious links or
attachments to deliver the malware executable file to unsuspecting users. Sophisticated malware attacks often use a
command-and-control server that lets threat actors communicate with the infected systems, exfiltrate sensitive data and
even remotely control the compromised device or server.
How do malware infections happen?
● Obfuscation techniques. Emerging strains of malware include new evasion and obfuscation techniques designed to fool
users, security administrators and antimalware products. Some of these evasion techniques rely on simple tactics, such as
using web proxies to hide malicious traffic or source Internet Protocol (IP) addresses. More sophisticated cyberthreats
include polymorphic malware that can repeatedly change its underlying code to avoid detection from signature-based
detection tools; anti-sandbox techniques that enable malware to detect when it's being analyzed and to delay execution
until after it leaves the sandbox; and fileless malware that resides only in the system's RAM to avoid being discovered.
● Software from third-party websites. There are instances where malware can be downloaded and installed on a system
concurrently with other programs or apps. Typically, software from third-party websites or files shared over peer-to-peer
networks falls under this category. For example, a computer running a Microsoft operating system (OS) might end up
unknowingly installing software that Microsoft would deem as a potentially unwanted program (PUP). However, by
checking a box during the installation, users can avoid installing unwanted software.
Types of malware
Types of malware
● Virus. A virus is the most common type of malware that can execute itself and spread by infecting other programs or files.
● Worm. A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors.
● Trojan horse. A Trojan horse is designed to appear as a legitimate software program to gain access to a system. Once activated
knowledge.
● Ransomware. Ransomware infects a user's system and encrypts its data. Cybercriminals then demand a ransom payment from
that lets threat actors remotely access it without alerting the user or the system's security programs.
Types of malware
● Adware. Adware tracks a user's browser and download history with the intent to display pop-up or banner
advertisements that lure the user into making a purchase. For example, an advertiser might use cookies to track the
webpages a user visits to better target advertising.
● Keyloggers. Keyloggers, also called system monitors, track nearly everything a user does on their computer. This
includes writing emails, opening webpages, accessing computer programs and typing keystrokes.
● Logic bombs. This type of malicious malware is designed to cause harm and typically gets inserted into a system
once specific conditions are met. Logic bombs stay dormant and are triggered when a certain event or condition is
met, such as when a user takes a specific action on a certain date or time.
● Exploits. Computer exploits take advantage of existing vulnerabilities, flaws or weaknesses in a system's hardware
or software. Instead of depending on social engineering tactics to execute, they exploit technical vulnerabilities to
gain unauthorized access and perform other malicious activities such as executing arbitrary code inside a system.
Email Attachments and Phishing
Attackers often use phishing emails to trick users into downloading and executing malicious files.
📌 How it Works:
● Cybercriminals send fake emails pretending to be from legitimate sources (banks, companies, or government agencies).
● These emails contain malicious attachments (PDFs, Word documents, ZIP files, or executables) that install malware when
opened.
● Some phishing emails include links leading to fake login pages designed to steal credentials.
● Example: A fake email from "PayPal" requesting urgent account verification with an infected attachment.
📌 How it Works:
● Attackers inject malicious code into legitimate websites, infecting visitors through drive-by downloads (malware installs automatically without user
interaction).
● Users download software, movies, or games from untrusted sources, which may include hidden malware.
● Some websites use exploit kits to take advantage of software vulnerabilities (e.g., outdated browsers, Flash, or Java).
● Example: A user searching for free software downloads unknowingly installs a Trojan-infected version.
● Fake Software Updates – Pop-ups claiming your browser or Flash Player is outdated.
● Malvertising (Malicious Ads) – Ads on legitimate sites leading to infected downloads.
● Bundled Software – Freeware containing hidden malware or adware.
● Exploit Kits – Automatically exploit system vulnerabilities when a user visits a compromised page.
✅ Prevention:
✔ Avoid downloading software from unofficial sources.
✔ Use browser extensions to block malicious ads and scripts.
✔ Keep your OS, browsers, and plugins up to date.
✔ Scan downloaded files with antivirus software before opening.
Antivirus Software: Overview, Limitations, and Choosing the Right On e
Antivirus software is a cybersecurity tool designed to detect, prevent, and remove malware from computers, networks, and mobile
devices. It uses various techniques to identify and neutralize threats.
🛠 Example: If you download a suspicious file, the antivirus will scan it before execution, checking for known threats or unusual
behavior.
Antivirus Software: Overview, Limitations, and Choosing the Right On e
🚫 1. Inability to Detect Zero-Day Attacks – New malware variants (zero-day threats) may go undetected until antivirus databases
are updated.
🚫 2. Performance Impact – Some antivirus programs can slow down system performance, especially on older devices.
🚫 3. Cannot Prevent Social Engineering Attacks – Phishing attacks and scams rely on tricking users rather than malware infection.
🚫 4. Limited Against Fileless Malware – Some advanced malware operates in system memory, making traditional file-based
scanning ineffective.
🚫 5. Over-Reliance on Signatures – If a virus signature is not in the database, the antivirus may fail to detect it.
🚫 6. False Positives – Some legitimate programs may be mistakenly flagged as malware.
🔎 Solution: Combine antivirus with other security measures like firewalls, intrusion detection systems, and endpoint security
solutions.
Antivirus Software: Overview, Limitations, and Choosing the Right On e
1. Security Features:
✔️Real-time protection
✔️Firewall integration
✔️Ransomware protection
✔️Email and web filtering
✔️Heuristic and behavior-based detection
💻 2. System Performance:
✔️Choose a lightweight antivirus that doesn’t slow down your device.
🌐 4. Compatibility:
✔️Ensure the antivirus is compatible with your OS (Windows, macOS, Linux, Android, iOS).
Antivirus Software & Malware: Key Considerations
Considerations for Home and Business Use
Choosing the right antivirus depends on whether it's for home or business use.
📌 Best for Home Users: Windows Defender (built-in), Bitdefender Free, Avast Free, Kaspersky Security Cloud.
✅ Advanced Threat Protection – Defends against ransomware, zero-day attacks, and phishing.
✅ Multi-Device Protection – Covers multiple endpoints, including workstations and servers.
✅ Centralized Management – IT teams can manage security across all devices remotely.
✅ Data Loss Prevention – Prevents unauthorized access to sensitive business data.
✅ Compliance Requirements – Meets security regulations (e.g., GDPR, HIPAA).
✅ 24/7 Support – Essential for businesses to minimize downtime in case of attacks.
📌 Best for Businesses: Bitdefender GravityZone, Norton Small Business, Kaspersky Endpoint Security, McAfee Total Protection for Business.
Steps to Install Antivirus Software
nstalling antivirus software is essential for protecting your system from malware and cyber threats. Follow these steps to install and configure your antivirus
properly:
● Select a trusted antivirus program (e.g., Windows Defender, Bitdefender, Kaspersky, Norton, McAfee, Avast).
● Decide between a free or paid version based on your needs.
● Ensure it is compatible with your operating system (Windows, macOS, Linux, Android, iOS).