1 / 5

Malware hide inside an Antivirus

Malware is malicious software that is a cover-up term for viruses, worms, trojans, and other harmful computer programs hackers use this for destruction and gaining access to victimsu2019 sensitive information. In other words, the software is identified as malware based on its intended use,

6875
Download Presentation

Malware hide inside an Antivirus

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Malware hide inside an Antivirus -ICSS What do you mean by Malware? Malware is malicious software that is a cover-up term for viruses, worms, trojans, and other harmful computer programs hackers use this for destruction and gaining access to victims’ sensitive information. In other words, the software is identified as malware based on its intended use, rather than a particular technique or technology used to build it. So now you all will think what is the difference between Malware and Virus? So the Answer is very Clear, a virus is a type of malware, so all viruses are malware (but not every piece of malware is a virus).

  2. some of the significant malware released between 2000 and 2010: •2000 — ILOVEYOU Worm: Spreading by way of an email sent with the seemingly benign subject line, “ILOVEYOU,” the worm infected an estimated 50 million computers. Damages caused major corporations and government bodies, including portions of the Pentagon and British Parliament, to shut down their email servers. The worm spread globally and cost more than $5.5 billion in damages. •2001 — Anna Kournikova Virus: Emails spread this nasty virus that purported to contain pictures of the very attractive female tennis player, but in fact hid the malicious malware. •2003 — SQL Slammer Worm: One of the fastest spreading worms of all time, SQL Slammer infected nearly 75,000 computers in ten minutes. The worm had a major global effect, slowing Internet traffic worldwide via denial of service. •2004 — Cabir Virus: Although this virus caused little if any damage, it is noteworthy because it is widely acknowledged as the first mobile phone virus. •2005 — Koobface Virus: One of the first instances of malware to infect PCs and then propagate to social networking sites. If you rearrange the letters in

  3. “Koobface” you get “Facebook.” The virus also targeted other social networks like MySpace and Twitter. •2008 — Conficker Worm: A combination of the words “configure” and “ficker”, this sophisticated worm caused some of the worst damage seen since Slammer appeared in 2003. If anyone wants to inject malware into your system what will be the easiest way for him? The Answer will be they will pretend to be nice to you and say to you, “Hay! youdon’t have antivirus in your system someone can inject malware into your system so before they do that Install an Antivirus it will protect your System. If you don’t mind you can use my Antivirus for free”. It’s Human nature that whenever someone hears that this trusted person is giving something for free that too for their own good. In this situation when the victim trust and installs the antivirus which is embedded with malware the malware inside that get triggered and doesn’t let the antivirus software get installed. At this time you will not understand why this is happening. But you already become a victim of the attack. Advanced persistent threats can be described as malware that lies dormant and hidden from ordinary detection tools and incident response measures. APT seeks to not only persist, but discover and proliferate, elevate privileges, and remain undetected for as long as possible (Rass, et al., 2017).One way for the APT to remain undetected is by combining polymorphic actions with encryption. A polymorphic virus replicates itself

  4. and changes certain attributes every time it infects another program. One technique is encryption key changes, whereby each infected host has a unique encryption and decryption keys. This combination makes it almost impossible to keep updated signature matches in anti-virus software (Drew, et al., 2017).Sometimes an APT can persist within an environment for days, months, or years without being detected because it only sends encrypted data to its command and control structure when a certain criteria are met. Most APTs are delivered by social engineering campaigns, such as spear-phishing against certain employees or whaling against executives and other high value targets. How You can Protect yoursef from Such attack? Personal vigilance, and protective tools. One of the most popular ways to spread malware is by email, which may be disguised to look as if it is from a familiar company such as a bank, or a personal email from a friend. Be wary of emails that ask you to provide passwords. Or emails that seem to be from friends, but have only a message such as “check out this cool website!” followed by a link. Personal vigilance is the first layer of protection against malware, but simply being careful is not enough. Because business security is not perfect, even downloads from legitimate sites can sometimes have malware attached. Which means that even the most prudent user is at risk, unless you take additional measures. some of the ways are:-

  5. •The most Important thing is Never Never Never Download anything from an unknown Site. •If someone offers you a free Software never take from them and better search for their official site and Download from there. •Scan full system twice a week. This will help your system from Malware and other Different types of Attacks. for more details contact :Indiancybersecuritysolutions.com

More Related