Unit-6 Malicious Software
Unit-6 Malicious Software
Unit-6 Malicious Software
Malicious Software
• Malicious software, also known as malware, is any software that is designed to
harm or exploit computer systems.
• There are many types of malware, including viruses, worms, Trojan horses,
ransomware, and spyware.
• Malware can be spread through a variety of means, including email attachments,
infected websites, and software downloads.
• Once it has been installed on a system, malware can perform a variety of harmful
activities, such as stealing sensitive information, disrupting system functions, or
holding data hostage.
• To protect against malware, it is important to keep computer systems and
software up to date with the latest security patches, use antivirus software, and
be cautious when opening email attachments or downloading software from the
internet.
• It is also a good idea to regularly back up important data to protect against the
possibility of data loss due to malware.
Advanced Persistent Threat
• Advanced: Combination of attack methods and tools
• Persistent: Continuous monitoring and interaction, “Low-and-slow”
approach
•Threat: Attacker is skilled, motivated, organized and well funded
• Sophisticated attack that tries to access and steal information from
computers
• Requirement: Remain invisible for as long as possible
• Targets
• .mil and .gov sites
• Department of Defense contractors
• Infrastructure companies
• CEOs or leaders of powerful enterprise or gov. agencies
Stages of an APT Attack
• Step 1: Reconnaissance:
• Research and identify targets
• Using public search or other methods
• Obtain email addresses or IM handles
• Step 2: Intrusion into the Network:
• Spear-phishing emails
• Target specific people
• Spoofed emails
• include malicious links or attachments
• Infect the employee's machine
• Gives the attacker a foot in the door
• Step 3: Establishing a Backdoor:
• Try to obtain domain admin credentials
• grab password hashes from network DCs
• Decrypt credentials to gain elevated user privileges
• Move within the network
• Install back doors here and there
• Typically install malware