180 likes | 485 Views
Antnomy of Malware. Amruta Dubewar. What is Malware?. Origin of name Malware mal icious soft ware Malware is general term for any kind of unwanted software that is installed without your permission and damage to your computer Malware can be classified based on How they get executed
E N D
Antnomy of Malware Amruta Dubewar
What is Malware? • Origin of name Malware malicious software • Malware is general term for any kind of unwanted software that is installed without your permission and damage to your computer • Malware can be classified based on • How they get executed • How they spread • What they do
Types of Malware • Viruses • Worm • Trojan Horse • Spyware • Adware • Ransomware • Rootkit
Viruses • Virus attach themselves to other software program and during the execution of that program the virus code gets executed. • They are self-replicating computer programs • How virus gets into your system? • Social engineering • Exploit vulnerabilities
Effects of Viruses • Stealing hard disk space or CPU time • Access private information • Corrupt data • Spamming contacts • May require a complete OS reinstallation to fix.
Worms • Worm is a standalone computer program and it replicates itself in order to spread to other computers • It exploits security hole in software or the operating system. • It uses computer network to spread itself • Unlike a virus, it does not attach itself to an existing program
Effects of Worm • Major disruption by increasing network traffic • Networks of such machines used by attacker for sending junk email • Blackmail companies with threatened DoS attacks
Trojan Horse • Trojan horse is a very deceptive program, it appears harmless or even beneficial and trick users to install it • For example, might look like an Android app for new game • It does not have the ability to self replicate like viruses and worm. It spread through user interaction. • Unlike viruses, it does not attach itself to existing program.
Effects of Torjan Horse • Modify or delete files • Downloading and installing software • Modifications of registry • Use your computer as a part of Zombie Army or BOTNETS
Spyware • Spyware usually comes bundled with free software and automatically installs itself with the program • It gathersinformation about person without their knowledge and send it to another party
Effects of Sypware • Install additional software • Redirect Web browsers • Logging keystrokes • Change computer settings • Stability issues
Adware • Adware is advertising-supported software • It causes pop-up ads or banners to appear on your computer. • It downloads to your computer when you access certain Internet sites, install certain freeware
Rootkit • Rootkit hide the fact that an operating system has been compromised • Attacker obtain administrative access and install Rootkit • Rootkit are very difficult to detect • It allows the installation of hidden files, processes, hidden user accounts etc
Ransomware • It restricts access to the computer system and demands ransom to remove restriction. • It encrypt files or simply lock the system • It can be installed from an e-mail attachment, infected program or compromised website
Examples ILOVEYOU – 2000 • Attacked millions of Windows computers • It started spreading email message with the subject line "ILOVEYOU" and the attachment "LOVE-LETTER-FOR-YOU.txt.vbs". • Opening the attachment activated the visual basic script. • Damage MP3 files, overwriting image files and automatically send itself to all contact in a users address book.
Examples C-Brain: January 1986 • Damaged millions of personal computers. • Virus enters the machine memory once the PC is booted with the infected floppy. • It infect other floppy disk accessed while it is in memory • It slow down disk access and cause timeouts, make disks unusable and create data loss
Examples Code Red & Code Red II – July 2001 • The worm exploited a vulnerability that was found in machines running Windows 2000 and Windows NT. • The worm spread itself using buffer overflow vulnerability • It launch DoS attacks, deface web sites and install remote backdoor program
Ways To Avoid Malware • Use Antivirus software • Set up your computer for automatic software and OS updates • Disable Java Scripting and Flash in your web browser • Use Firewall software • Don't install or download unknown programs to your computer. • Never open an email from a stranger • Choose strong password for accounts • Use browser other than IE Explorer, such as Firefox or Opera