1 / 18

Antnomy of Malware

Antnomy of Malware. Amruta Dubewar. What is Malware?. Origin of name Malware mal icious soft ware Malware is general term for any kind of unwanted software that is installed without your permission and damage to your computer Malware can be classified based on How they get executed

Download Presentation

Antnomy of Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Antnomy of Malware Amruta Dubewar

  2. What is Malware? • Origin of name Malware malicious software • Malware is general term for any kind of unwanted software that is installed without your permission and damage to your computer • Malware can be classified based on • How they get executed • How they spread • What they do

  3. Types of Malware • Viruses • Worm • Trojan Horse • Spyware • Adware • Ransomware • Rootkit

  4. Viruses • Virus attach themselves to other software program and during the execution of that program the virus code gets executed.  • They are self-replicating computer programs • How virus gets into your system? • Social engineering • Exploit vulnerabilities

  5. Effects of Viruses • Stealing hard disk space or CPU time • Access private information • Corrupt data • Spamming contacts • May require a complete OS reinstallation to fix.

  6. Worms • Worm is a standalone computer program and it replicates itself in order to spread to other computers • It exploits security hole in software or the operating system. • It uses computer network to spread itself • Unlike a virus, it does not attach itself to an existing program

  7. Effects of Worm • Major disruption by increasing network traffic   • Networks of such machines used by attacker for sending junk email • Blackmail companies with threatened DoS attacks

  8. Trojan Horse •  Trojan horse is a very deceptive program, it appears harmless or even beneficial and trick users to install it • For example, might look like an Android app for new game • It does not have the ability to self replicate like viruses and worm. It spread through user interaction. • Unlike viruses, it does not attach itself to existing program.

  9. Effects of Torjan Horse • Modify or delete files • Downloading and installing software • Modifications of registry • Use your computer as a part of Zombie Army or BOTNETS

  10. Spyware • Spyware usually comes bundled with free software and automatically installs itself with the program • It gathersinformation about person without their knowledge and send it to another party

  11. Effects of Sypware • Install additional software • Redirect Web browsers • Logging keystrokes  • Change computer settings • Stability issues

  12. Adware • Adware is advertising-supported software • It causes pop-up ads or banners to appear on your computer. • It downloads to your computer when you access certain Internet sites, install certain freeware

  13. Rootkit • Rootkit hide the fact that an operating system has been compromised • Attacker obtain administrative access and install Rootkit • Rootkit are very difficult to detect • It allows the installation of hidden files, processes, hidden user accounts etc

  14. Ransomware • It restricts access to the computer system and demands ransom to remove restriction. •  It encrypt files or simply lock the system • It can be installed from an e-mail attachment, infected program or compromised website

  15. Examples ILOVEYOU – 2000 • Attacked millions of Windows computers • It started spreading email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". • Opening the attachment activated the visual basic script. • Damage MP3 files, overwriting image files and automatically send itself to all contact in a users address book. 

  16. Examples C-Brain: January 1986 • Damaged millions of personal computers. • Virus enters the machine memory once the PC is booted with the infected floppy. • It infect other floppy disk accessed while it is in memory • It slow down disk access and cause timeouts, make disks unusable and create data loss

  17. Examples Code Red & Code Red II – July 2001 • The worm exploited a vulnerability that was found in machines running Windows 2000 and Windows NT.  • The worm spread itself using buffer overflow vulnerability • It launch DoS attacks, deface web sites and install remote backdoor program

  18. Ways To Avoid Malware • Use Antivirus software • Set up your computer for automatic software and OS updates • Disable Java Scripting and Flash in your web browser • Use Firewall software • Don't install or download unknown programs to your computer. • Never open an email from a stranger • Choose strong password for accounts • Use browser other than IE Explorer, such as Firefox or Opera

More Related