Cybersecurity Fundamentals TP
Cybersecurity Fundamentals TP
1. Select five (5) malware from the following: Spyware, Adware, Rootkit,
Ransomeware, Worm, Trojan Horse, or Backdoor
2. Search two (2) examples for each of the five malware you have selected. Add a short
description for each. Cite your reference. (5 points per example)
Part I
1. SPYWARE
3. TROJAN
• Ghost rat is a cyber computer software that the Ghost net operators used to
break into various sensitive computer networks using a Trojan horse for the
Windows platform it alludes to the software's capacity to function as a "Remote
Administration Tool."
• Twelve Tricks the Trojan randomly changes one random word in any of the first
sixteen sectors of the FAT, leading to a gradual corruption of the file system.
4. ROOTKITS
• firmware rootkit creates a permanent malware image in hardware, such as a
router, network card,hard disk, or the system BIOS, by using device or platform
firmware.
• Bootkit can infect startup code like the Master Boot Record , Volume Boot Record
or boot sector, and in this way can be used to attack full disk encryption systems
5. RANSOMWARE
• Ransomware targeting mobile operating systems has grown in popularity as
ransomware targeting PC platforms. Mobile ransomware payloads are often
blockers, as there is little motivation to encrypt data when it can be retrieved
simply via internet synchronization.
• Reveton its payload displays a warning purportedly from a law enforcement
agency claiming that the computer has been used for illegal activities, such as
downloading unlicensed software or child pornography.
Part II
1. Search for an article regarding a cybersecurity attack using malware. The article should
be published between 2016 and 2020, by a credible source.
2. Answer the following items based on the article you found.
PART II ANSWER
TITLE: Ransomware cybercriminals linked to Norsk Hydro attack fall prey to Europol swoop
https://portswigger.net/daily-swig/ransomware-cybercriminals-linked-to-norsk-hydroattack-fall-prey-to-
europol-swoop
How extensive was the impact of the attack to the environment where it happened?
• According to the European Union's law enforcement agency, 12 persons have been
targeted in connection with a professional, well-organized cybercrime that targeted over
1,800 victims in 71 countries. This includes a ransomware assault that disrupted the IT
systems of Norwegian industrial behemoth Norsk Hydro in 2019, according to
Norwegian authorities. Norsk Hydro was highly applauded for refusing to give in to the
hackers' demands, as well as its honesty in revealing the assault to its customers and the
general public, despite the event costing the firm an estimated $70 million in losses.
How did the person or company, who was attacked, cope with the consequences and effects
of the incident?
• The aluminum and renewable energy provider refused to pay the ransom despite having
to operate without computer systems for several weeks. But it was reported into the
high authority and most of these suspects are considered high value targets because
they are being investigated in multiple high profile cases in different jurisdictions, said
Europol article.