Evolution of Malware Group 3 NEWTON
Evolution of Malware Group 3 NEWTON
Evolution of
Malware
what is it and how does it work?
What is
Malware?
Malware, short for “Malicious Software”, refers to any
software specifically designed to disrupt, damage, or
gain unauthorized access to computer systems,
networks, or data developed by cybercriminals aka
“hackers”.
history
malware with its quick spread through
systems. 'Reaper' was created to hunt and
destroy Creeper- one of the first examples of
an “anti-virus” program.
4 Main types of
Trojan horses
Malware
Ransomware
Spyware
Computer Worms are standalone
malware programs that
Trojans
virus
replicate themselves and
spread across computer
networks, often without Trojans disguise themselves
requiring user interaction. as legitimate software or files
They exploit security to trick users into
Viruses attach themselves to vulnerabilities to downloading and executing
executable files and replicate propagate and can cause them. Once activated, Trojans
when the infected file is significant damage by can perform various
executed. They can spread malicious actions, such as
consuming network
throughout a computer system stealing sensitive information,
bandwidth or exploiting
and may also infect other installing other malware, or
system resources.
computers via infected files or granting unauthorized access
network connections. to the system.
Worms
Ransomware Spyware
Ransomware encrypts files or Spyware secretly monitors user
locks users out of their systems activity, collects sensitive
and demands payment (usually information (such as
in cryptocurrency) for decryption keystrokes, passwords, and
or restoration of access. browsing habits), and sends it
Ransomware attacks can cause to a remote server without the
data loss, financial loss, and user's consent. It is often used
operational disruptions for for surveillance, identity theft, or
individuals and organizations. targeted advertising purposes.
How does malware
spread?
Since its birth more than 30 years ago,
malware has found several methods of attack.
They include email attachments, malicious
advertisements on popular sites (malvertising),
fake software installations, infected USB
drives, infected apps, phishing emails and
even text messages.
How can we avoid malware
attacks?
here are ways to protect yourselves from malware:
E-TECH
GROUP 3 PRESENTATION