U A N L Facultad de Ciencias Fisico Matematicas
U A N L Facultad de Ciencias Fisico Matematicas
Worm
One of the most common types of malware, worms spread over computer networks by
exploiting operating system vulnerabilities. It’s a standalone program that replicates itself
to infect other computers, without requiring action from anyone.
Since they can spread fast, worms are often used to execute a payload, a piece of code that
can cause damage to a system. Payloads can delete files on a host system, encrypt data for
a ransomware attack, steal information, delete files, and create botnets.
Trojan
Trojan Horse, “Trojan”, enters your system disguised as a normal, harmless file or program
to trick users into downloading and installing malware. As soon as you install a Trojan, you
are giving cyber criminals access to your system. This allows the cybercriminal to steal data,
install more malware, modify files, monitor user activity, destroy data, steal financial
information, conduct denial of service (DoS) attacks on targeted web addresses, and more.
Trojan malware cannot replicate by itself, however, if combined with a worm, the damage
Trojans can have on users and systems is endless.
Ransonware
Ransomware is a type of malware that hold your data captive and demands payment to
release the data back to you. It restricts user access to the computer by either encrypting
files on the hard drive or locking down the system and displaying messages that are
intended to force the user to pay the attacker to release the restrictions and regain access
to the computer. Once the attacker is paid, your system and data will be back to its original
state.
Propagation of malware and cybercrime will continue to rise, and it’s important to protect
yourself and your business from malware by implementing safeguards and best practices in
computer use. The only way to stay protected or remove a malware infection is by using
anti-malware software, or antivirus.
Malware Analysis
Static Malware Analysis
Static malware analysis involves examining any given malware sample without running or
executing the code. This is usually done by determining the signature of the malware binary;
the signature is a unique identification for the binary file. Calculating the cryptographic hash
of the binary file and understanding each of its components helps determine its signature.
The executable of the malware binary file is loaded into a disassembler (for example, IDA)
and thus the machine-executable code gets converted to assembly language code. Thus, by
doing this reverse-engineering on a malware binary file, it’s rendered easy for a person to
read and understand. The analyst, by looking at the assembly language code, gets to
understand the malware better. A better idea can be formed about the functionalities that
it’s programmed to do and the potential impact it can have on any system and network.
Analysts use different techniques for static analysis; these include file fingerprinting, virus
scanning, memory dumping, packer detection, and debugging.
Malware Spreading
Malware can spread in any number of ways, but there are three vector classes that are of
particular interest to modern cybersecurity experts. These are the most common methods
by which users expose themselves to malware risks: