Malware

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Malware

 Stands for Malicious Software


 Cause Damage to
 Computer
 Server
 Client
 Network
 Types of malware
 VIRUS
 WORMS
 TROJAN HORSES
 PHISHING
 RANSOMWARE
 SPYWARE
 ADWARE
 ROUGUE SOFTWARE
 WIPER
 SCAREWARE
 VIRUS :

 Founder- Fred Cohen


 Vital Information Resource Under Seize
 Replicate with the help of human involvement.
 First VIRUS is Creeper in 1971 by Bob Thomas
 First Boot sector /Indian Virus was Brain in 1986 by Amjad Farooq Alvi
 Virus Executes only by human Action.
 VIRUS which stay in RAM & Deploy in RAM is called Resident Virus.
 VIRUS deploy in RAM, but not stay in RAM is called Non Resident Virus.
 Application Software Virus is called Macro Virus.
 VIRUS which changing type & Signature is called Polymorphic Virus.

 WORMS :

 Write Once Read Many


 Founder is Robert Morris
 Nature of Worms is self Replicating.
 Run Independently.

 TROJAN HORSE :

 Trojan is a type of malware.


 Pretend to be useful but actually not.
 Can take control of your computer.
 Sendingh,receiving,launching and deleting files and rebooting the computer.

 PHISHING :

 Clone website.
 Hack Username & Passward.
 Hack Login Credentials.
 Fake Webpage & Website.
 Not Start with HTTP/S.
 RANSOMWARE :

 Designed to deny access to a computer system or data.


 Demand for Ransom.
 Encrypts files.
 First Ransomware is AIDS/PC Cyborg.
 Exam. Of Ransomware :
 Locky-2016
 WannaCry-2017(150 Countries)
 Bad Rabbit-2017
 Ryuk-2018

 SPOOFING : (चकमा दे ना)

 IP Address.
 Address Resolution Protocol.
 Domain Name System.
 Emails from false sender.

 SNIFFING: (सूँघना )

 Capturing all the packets (Sniffers).


 Tapping phone wires.
 We can protect by using VPN.

 SPYWARE:

 Monitoring online behaviour .


 Type of Adware(POPUP).
 Tracking Cookies.
 Comes from Freeware/Shareware.
 Example: Keyloggers, Rootkits, Web Beacons.
 KEYLOGGERS:
o Also Called a keystroke Logger.
o Type of surveillance technology.
o Used to monitor and record each keystroke.
 ROOTKITS:
o Gain administrative access to your computer.
o Root means Super User & Kit means Grant attacker super user
abilities.
 WEB BEACONS:
o Track who visited web page.
o It is a transparent Graphic image placed on a sebsite.
o Used with Cookies.
o Also Called : Web Bug, Pixel Tag, Clear GIF .

 DDOS ATTACK:

 Distributed Denial Of Service.


 Hacker hacks into the system once the network is down.
 Botnets are created on user’s computers.
 Flood the bandwidth.

 SKIMMING DEVICE:

 Skimming Devices Attack.


 Steal bank details is through attaching ‘skimming’ devices in ATM machines.
 Readingh informationl from the magnetic strip on the back of the card when it is
inserted into the machine.

 ROGUE MALWARE:

 Type of internet fraud.


 Mislead user that there is VIRUS on computer.
 Convince user to pay for a fake malware removal tool.
 These tool install malware on user’s computer.

 WIPER MALWARE:

 Destructive in nature.
 Not to gain monetary benefits.
 Aim is to wiping entire Hard Disk.
 Prevent by Regular Backup.

 SCAREWARE:

 Scareware = Rogue Software + Ransomware


 Popup advertisement “ Your computer may be infected with harmful spyware
programs.” Immediate removal may be required . To scan, click “Yes” below.

 TIME BOMB Vs LOGIC BOMB ?

 TIME BOMB :
It is a virus program that performs an activity on a particular date.
 LOGIC BOMB:
It is a destructive program that performs an activity when a certain action has
occurred.
 MULTIPARTITE VIRUS :

 It Infect both files/Macro Infector and Boot Sectors.


 Infect Computer Multiple times.
 Example – Flip Multipartite Virus & Invader Multipartite Virus.

 CYBER STALKING:

 Online Stalking.
 Stalk or harass an individual, group, or organization.
 It may include false accusations, defamation.

You might also like