Notes C8
Notes C8
Malware
Malware
1. Malware
2. Usage of Malware
3. Types of Malware
6. Symptoms
7. Anti-Malware Program
Malware
• A is software used or created to disrupt computer operation, gather sensitive information, or gain
access to private computer systems.
• It can appear in the form of code, scripts, active content, and other software.
• 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying
software
Usage of Malware
• Many early infectious programs, including the first Internet Worm, were written as experiments or
pranks.
• Today, malware is used primarily to steal sensitive personal, financial, or business information for the
benefit of others.
• Malware is sometimes used broadly against government or corporate websites to gather guarded
information, or to disrupt their operation in general.
• However, malware is often used against individuals to gain personal information such as social security
numbers, bank or credit card numbers, and so on.
Types of Malware
• Viruses
• Trojan horses
• Worms
Chapter 8
Malware
• Spyware
• Zombie
• Phishing
• Spam
• Adware
• Ransomware
Viruses
• A program or piece of code that is loaded onto your computer without your knowledge and runs
against your wishes.
• They can be merely annoying or they can be vastly destructive to your files.
• Examples of computer viruses are: – Macro virus – Boot virus – Logic Bomb virus – Directory virus –
Resident virus
Trojan Horses
• A Trojan Horse program has the appearance of having a useful and desired function.
• A Trojan Horse neither replicates nor copies itself, but causes damage or compromises the security of
the computer.
• A Trojan Horse must be sent by someone or carried by another program and may arrive in the form of
a joke program or software of some sort.
• Keylogging Trojans.
Chapter 8
Malware
Worms
• It uses a network to send copies of itself to other nodes (computers on the network) and it may do so
without any user intervention.
Spyware
• Spyware is a type of malware installed on computers that collects information about users without
their knowledge.
• The presence of spyware is typically hidden from the user and can be difficult to detect.
• Spyware programs lurk on your computer to steal important information, like your passwords and
logins and other personal identification information and then send it off to someone else.
Zombie
• Zombie programs take control of your computer and use it and its Internet connection to attack other
computers or networks or to perform other criminal activities.
Phishing
• Phishing (pronounced like the word 'fishing') is a message that tries to trick you into providing
information like your social security number or bank account information or logon and password for a
web site.
• The message may claim that if you do not click on the link in the message and log onto a financial web
site that your account will be blocked, or some other disaster.
Spam
• Spam is email that you did not request and do not want.
Adware
• Adware (short for advertising-supported software) is a type of malware that automatically delivers
advertisements.
• Common examples of adware include pop-up ads on websites and advertisements that are displayed
by software.
Chapter 8
Malware
• Often times software and applications offer “free” versions that come bundled with adware.
Ransomware
• Ransomware is a form of malware that essentially holds a computer system captive while demanding a
ransom.
• The malware restricts user access to the computer either by encrypting files on the hard drive or
locking down the system and displaying messages that are intended to force the user to pay the
malware creator to remove the restrictions and regain access to their computer.
• Malware is a program that must be triggered or somehow executed before it can infect your computer
system and spread to others.
• Here are some examples on how malware is distributed: a) Social network b) Pirated software c)
Removable media d) Emails e) Websites
Damages
1. Data Loss
• Many viruses and Trojans will attempt to delete files or wipe hard drives when activated, but even if
you catch the infection early, you may have to delete infected files.
2. Account Theft
• Many types of malware include keylogger functions, designed to steal accounts and passwords from
their targets.
• This can give the malware author access to any of the user's online accounts, including email servers
from which the hacker can launch new attacks.
3. Botnets
• Many types of malware also subvert control over the user's computer, turning it into a "bot" or
"zombie."
• Hackers build networks of these commandeered computers, using their combined processing power
for tasks like cracking password files or sending out bulk emails.
4. Financial Losses
• If a hacker gains access to a credit card or bank account via a keylogger, he can then use that
information to run up charges or drain the account.
Chapter 8
Malware
• Given the popularity of online banking and bill payment services, a hacker who manages to secrete a
keylogger on a user's system for a full month may gain access to the user's entire financial portfolio,
allowing him to do as much damage as possible in a single attack.
• Practice caution when working with files from unknown or questionable sources.
• Install firewall.
Symptoms
• Freezing or crashing
• Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off
antivirus and firewall programs)
Symptoms
• Emails/messages being sent automatically and without user’s knowledge (a friend receives a strange
email from you that you did not send)
• There seems to be a lot of network activity when you are not using the network
Anti-Malware Program
• Anti-Malware program is used to prevent, detect, and remove computer viruses, worms, trojan horses
and any other type of malware.
Antivirus Program
• “Antivirus" is protective software designed to defend your computer against malicious software.
• In order to be an effective defense, the antivirus software needs to run in the background at all times,
and should be kept updated so it recognizes new versions of malicious software.
• Norton Antivirus
• AVG • Kaspersky
• Avast!
• PC-Cilin
• McAffee
• Avira
Anti-Spyware Program
• Anti-spyware program is a type of program designed to prevent and detect unwanted spyware
program installations and to remove those programs if installed.
Anti-Spam Program
Malware Firewall
• A firewall blocks attempts to access your files over a network or internet connection. • That will block
incoming attacks.
• Your computer can become infected through shared disks or even from another computer on the
network.
• So you need to monitor what your computer is putting out over the network or internet also