Malware Virus Trojan Sniffing New
Malware Virus Trojan Sniffing New
Malwares are classified a in to various types below are the some of them
Backdoor: This type of Trojan allows access to a system through methods that the user is unaware of. It allows us
to access files and data via daemon processes running in the system
Exploit: This type deals with targeted program code which deals with vulnerabilities in the programs running in
the device, triggering certain changes and gaining access via the exploit code
Root-kit : They are mainly used to hide unscrupulous activities from being detected by security measures
employed in the system, or to maintain further access to the system by escalating the privileges gained by the
malicious programs.
Malware Propagation ways
There are alternative ways that malware can get into a system. Users should take care while interacting
with these methods. a number of these methods that are popularly wont to for the propagation of
malware are: -
Free Software: When software is accessible on the web for free of charge , it mostly contains additional
software and applications which can belong to the offering organization bundled later by any third
party to propagate this malicious software. most typical example of free software is like downloading
crack files usually contains additional malicious software, or sometimes it only contains a malware
File Sharing Service: File sharing services like torrent and Peer-to-peer file sharing services transfer the
file from multiple computers. During the transfer, the file are often infected, or any infected file may
additionally transfer with the transfer because there could also be a computer having low, or no
security policy.
Removable Media: Malware also can propagate through removable media like USB. Different advance
Removable media malware is introduced which may propagate through storage area of USB also as
through Firmware embedded within the hardware. aside from USB, External hard disc , CD, DVD also
can bring malware along side them.
Malware Propagation ways
Email Communication : In a corporation , email communication is that the most popularly- used
way of communication. Malicious software are often sent through email attachment, Email
containing malicious URL.
Not using Firewall and Antivirus: Disabling Security Firewalls and Anti-virus programs or not using
Internet security software also can allow the malicious software to be download on a system. Anti-
virus and Internet security Firewalls can block malicious software from downloading automatically
and alert upon detection.
Introduction of Virus
Cryptobit Ransomware
CryptoLocker Ransomware
CryptoDefense Ransomware
CryptoWall Ransomware
Police-themed Ransomware
Writing a Simple Virus Program
Creating a virus could be a simple process, although it depends upon the intention of the
developer what's his intention. High profiled developer prefers to style code from scratch.
the subsequent are some steps to make a basic virus which may perform a particular action
upon the trigger. to make a virus, you'll have a notepad application and bat2com application,
otherwise you can create using GUI based virus creating an application
When a user click on links and download the files from internet
without checking proper source
Opening infected email attachments
Installing pirated software's
Not updating and not installing new versions of plugins
Not running latest anti-virus program
Opening unwanted sites
Virus maker Tools
Virus Generating Tools:
Install Anti-virus application that detects and removes infections as they seem
Generate an anti-virus policies for safe computing and distribute it to the staff
Pay attention to instructions while downloading files or any programs from the web
Update the antivirus software regularly
Avoid opening attachments received from an unknown person as viruses may
spread via e-mail
Schedule regular virus scans for all drives after the installation of antivirus software
Possibility of viral infection may corrupt data, thus regularly maintain data backup
Do not accept disk or programs on faith them first employing a current version of
anti virus program
Trojans & Trojan Horse
Trojan Horse and Trojan are the malicious programs which
cheat from its actual actions. This term is really derived from a
Greek story of an excellent Trojan Horse . This horse had
soldiers hiding inside waiting to enter into the town . As this
Wooden Horse reached within the city, soldiers came out and
attacked the town .
A network or a system are often protected, or protected against most of the Trojans
if it's following the countermeasures to stop Trojan attacks. the subsequent are some
key countermeasure that are recommended to stop these attacks and protect your
system.
Adware. this sort of spyware tracks your browsing history and downloads, The
adware will display advertisements for an equivalent or related products or
services to entice you to click or make a sale . Adware is use to for marketing
purposes and may hang your computer.
Trojan. this type of malicious software disguises itself as legitimate software.
Trojan malware is controlled by third parties. It are often use to access
sensitive information like Social Security numbers and MasterCard information.
Tracking cookies. These track the user's web activities, like searches, history,
and downloads, for marketing purposes.
System monitors. this sort of spyware can capture almost everything you are
doing on your computer. System monitors can record all keystrokes, emails,
chat- room dialogs, websites visited, and programs run. System monitors are
often disguised as freeware.
Spyware Countermeasures