0% found this document useful (0 votes)
8 views36 pages

Malware Introduction

Malware, a combination of 'malicious' and 'software', is designed to harm computers and steal information without the owner's consent. It has evolved since the 1970s, with various types including viruses, worms, Trojans, ransomware, spyware, adware, scareware, and rootkits, each with specific methods of operation and impact. Protection against malware involves personal vigilance and the use of robust antivirus software to safeguard systems.

Uploaded by

rachel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views36 pages

Malware Introduction

Malware, a combination of 'malicious' and 'software', is designed to harm computers and steal information without the owner's consent. It has evolved since the 1970s, with various types including viruses, worms, Trojans, ransomware, spyware, adware, scareware, and rootkits, each with specific methods of operation and impact. Protection against malware involves personal vigilance and the use of robust antivirus software to safeguard systems.

Uploaded by

rachel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 36

MALWARE

WHAT IS MALWARE???
MALWARE

 The word MALWARE comes form the combination of Malicious and Software.

 In Spanish, ‘MAL’ is a prefix that means, ‘BAD’ , making the term ‘bad ware’.

 This is software that is specifically designed to gain access or damage a


computer without the knowledge of the owner.

 Mainly designed to transmit information about your web browsing


habits to the third party.
PURPOSE

 To hurt others and make money, usually by affecting important information adversely.

 Stealing, encrypting or deleting sensitive data.

 Altering or hijacking core computing functions.

 Monitoring users’ computer activity without their permission.

 To steal personal, financial, or business information from individuals &


govs.
HISTORY

 People first started writing malware in the 1970s and early 1980s. They were written as
experiments or pranks for fun.

 ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage
- but did foretell the future of malware with its quick spread through systems. ‘Reaper’
was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’
program.

 Term ‘malware’ coined in 1990.

 Use of malware increased in the early 2000s.

 Experts believe that 31.5% of the world's computers have some type of
malware installed today.
HOW DOES MALWARE WORK ?

 Delivered physically to a system through a USB flash drives or external hard


drives.
 Drive-by-Downloads via the Internet.

 Spam E-mails and Phishing Attacks.

 Bundled with other software.

 Accessing hacked or compromised webpages.


5 STAGE OF MALWARE ATTACK

ENTRY

EXECUTION DISTRIBUTION

INFECTION EXPLOIT
TYPES OF MALWARE
1.Viruses
2.Worms
3.Trojan Horse
4.Ransomware
5.Spyware
6.Adware
7.Scareware
8.Rootkit
VIRUSES

 A computer virus is a program, script, or macro designed to cause damage, steal


personal information, modify data, send e-mail, display messages, or some combination
of these actions.
 May do nothing on your machine or destroy all your files.
 Seek to use your machine as launching point to infect other machine.
 VIRUS enters your device via attached images ,greeting ,Audio /video file etc.
TYPES OF VIRUSES

VIRUS

Macro virus Time bomb virus

Boot sector virus Logic bomb virus


WORMS

 Like a virus but they are self-contained programs (they don’t need a host).
 Copy themselves from machine-to-machine.
 Scan for other vulnerable machines.
 Can cause slowness or even block network transmissions.
 They attack the weakened points in a network.
TROJAN HORSE
WHAT IS TROJAN HORSE ??

 In computing, a Trojan horse is a program that appears harmless, but is, in


fact, malicious. Unexpected changes to computer settings and unusual
activity, even when the computer should be idle, are strong indications that a
Trojan is residing on a computer.
 A Trojan horse may also be referred to as a Trojan horse virus, but that is technically
incorrect. Unlike a computer virus, a Trojan horse is not able to replicate itself, nor can
it propagate without an end user's assistance. This is why attackers must use
social engineering tactics to trick the end user into executing the Trojan. Typically, the
malware programming is hidden in an innocent-looking email attachment or free
download. When the user clicks on the email attachment or downloads the free
program, the malware that is hidden inside is transferred to the user's computing
device. Once inside, the malicious code can execute whatever task the attacker
designed it to carry out.
TYPES OF TROJAN
Remote Access Trojans

Data Sending Trojans

Destructive Trojans

TROJAN Proxy Trojans

FTP Trojans

Security software disabler Trojans

Denial-of-service attack (DoS) Trojans


RANSOMWARE

 RANSOMWARE is a type of malware which is


widely classified as a Trojan.
 It restricts access to or damages the computer for
the purpose of extorting money from the victim.

 It also has the capability to encrypt a user’s files , display different


threat messages , and force the user to pay ransom via an online
payment system.

 Originated in Russia,2005-06. Crypto-ransomware in 2013.


SPYWARE
WHAT IS SPYWARE

 Spyware is a program that get installed without the user’s permission.

 It’s monitors the user’s activities on the internet and transmit the
information to the third party
TYPES OF SPYWARE

Tracking cookies

SPYWARE
System monitors

Commercial Cell
Phone Spyware

keylogger
ADWARE

 Software where advertising banners are displayed while any program is running.

 It automatically downloads to your device while browsing any website.

 It is used by companies for marketing purposes.


SCAREWARE

 Scareware is a type of malware designed to trick victims into purchasing


and downloading useless and potentially dangerous software.

 Scareware, which generates pop-ups that resemble Windows system


messages, usually purports to be antivirus or antispyware software,
a firewall application or a registry cleaner. The messages typically
say that a large number of problems -- such as infected files -- have
been found on the computer and the user is prompted to purchase
software to fix the problems.
ROOTKIT
 It is a computer program designed to provide continued privileged access to a
computer while actively hiding its presence.

 Originally, a rootkit was a collection of tools that enabled administrator-level


access to a computer or network.

 Once a rootkit has been installed, the controller of the rootkit has the
ability to remotely execute files and change system configurations on
the host machine.

 A rootkit on an infected computer can also access log files and


spy on the legitimate computer owner’s usage.
PROTECTION AGAINST MALWARE

 The two most effective ways to fight against malware are: Personal vigilance and protective
tools.

 Malware security protection provides that second vital layer of protection for your
computer or network.

 A robust antivirus software package is the primary component of technological


defenses that every personal and business computer system should have.

 No protection is absolute. But a combination of personal awareness and


well-designed protective tools will make your computer as safe as it can be.

You might also like