0% found this document useful (0 votes)
23 views13 pages

Malware Software

Uploaded by

Tenukhang limbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views13 pages

Malware Software

Uploaded by

Tenukhang limbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 13

Malicious Software

Software that is designed to damage,


Destroys, to the targeted systems is Malicious
Software.
Malicious Software is also Known as

Malware
Presented By: Group G
Bhawana Shrestha
Nova Limbu
Nilima Magar
Bibek Katwal
Pratik Thebe Limbu
Importance of Understanding Protection against Threats: Knowledge about different types of
Malicious Software malware viruses, worms, trojans, ransomware, etc. is essential to
identify, prevent, and mitigate their impact on systems.
Understanding their characteristics helps in developing robust
cybersecurity strategies to protect against such threats.

Risk Mitigation: Awareness of malware helps individuals and


organizations assess and mitigate risks associated with cyber
attacks. It allows for the implementation of appropriate security
measures and proactive steps to minimize vulnerabilities.

Financial Loss Prevention: Cyber attacks through malware can


result in financial losses for individuals and businesses.
Understanding the nature of these threats helps in minimizing
the financial impact by preventing attacks or having effective
recovery plans in place.
Recent Malware Attack
Colonial Pipeline ransomware attack
- The Colonial Pipeline ransomware attack occurred in
May 2021 and was one of the most impactful cyber
attacks in recent years, highlighting vulnerabilities in
critical infrastructure and supply chains.

Target:
Colonial Pipeline, which operates a
major fuel pipeline system supplying
gasoline, diesel, and jet fuel to the
Impact:
Colonial Pipeline was forced to shut down its
operations temporarily to contain the breach
and investigate the attack's extent. The
pipeline closure disrupted fuel supplies,
leading to fuel shortages and panic buying in
several states along the East Coast.
East Coast of the United States.
Types Of Malware

Virus Trojan Horse


A computer virus is a type of malicious A Trojan horse is a type of malicious software
software designed to replicate itself and disguised as legitimate software, allowing
spread to other computers, often unauthorized access or causing harm once
causing damage or disrupting normal installed on a computer or device.
system functions.

Adware
Spyware Adware is software that displays unwanted

Spyware is a form of malicious software


Ransomware advertisements or redirects a user's browser to
promotional content, often bundled with other
designed to secretly gather information about programs or downloads.
Ransomware is a type of malicious software that
a person or organization by monitoring their
encrypts files or locks a user out of their system,
activities on a computer or device without
demanding payment (ransom) for decryption or
their consent.
restoration of access.
SPYWARE
Also known as Zbot, Zeus is a notorious spyware that targets
Windows-based systems. It's designed to steal sensitive information
Zeus like banking credentials and personal data by logging keystrokes and
capturing screenshots.

This complex piece of malware was a combination of


spyware and a worm. Flame could collect extensive
Flame information, including audio recordings, screenshots, and
keyboard activity.

Initially a worm, Conficker also had spyware traits. It


Conficker could disable security services, making infected systems
vulnerable to other malicious activities.
RANSOMWARE
In May 2017, WannaCry made headlines as it rapidly spread across the
globe, affecting hundreds of thousands of computers. It exploited a
WannaCry vulnerability in Microsoft Windows and demanded ransom payments in
Bitcoin. WannaCry demonstrated the potential for widespread and
destructive ransomware attacks.

CryptoLocker emerged in 2013 and was one of the early examples of


ransomware. It encrypted files on infected systems and demanded
CryptoLocker payment in Bitcoin for the decryption key. It's estimated that
CryptoLocker infected hundreds of thousands of computers before law
enforcement efforts took it down.

Locky, first observed in 2016, used phishing emails to distribute malicious


attachments. Once activated, it encrypted files and demanded a ransom.
Locky Locky was one of the early ransomware strains to gain widespread
attention.
ADWARE
In 2015, Superfish, a piece of adware pre-installed on certain Lenovo laptops,
gained attention for injecting third-party advertisements into users' web
browsers. The adware also posed a security risk by using a vulnerable
Superfish method of SSL decryption, potentially exposing users to man-in-the-middle
attacks.

Genieo is an adware program that targets macOS users. It often comes


bundled with other software and may change browser settings, such as the
Genieo default search engine. Genieo displays personalized ads based on the user's
browsing habits.

Vonteera is adware that typically infiltrates a user's system through software


bundling. Once installed, it injects unwanted ads into websites, creating a
Vonteera disruptive browsing experience. Vonteera may also track users' online
activities for targeted advertising.
Trojan Horses
These Trojans create a backdoor entry point on the infected system, allowing
BackDoor remote access and control by attackers.
Trojan Once installed, they enable hackers to perform various malicious activities
without the user's knowledge.

Downloaders are designed to download and install additional malware onto


Downloader the infected system. They often appear harmless but secretly fetch and
execute malicious code, leading to the installation of more dangerous
Trojan malware.

This type of Trojan pretends to be legitimate antivirus software.


Keylogger It deceives users by displaying false security alerts or warnings about non-
existent threats, prompting them to pay for a "full version" to remove the
Trojan fake infections.
How Malware Attacks

Delivery and Execution and Action and


Initial Access Establishment Impact
Malware is delivered through
Carrying out specific tasks as
various channels such as The malware code is executed, designed by the attacker, which
phishing emails, malicious enabling it to perform its intended might include stealing sensitive
attachments, compromised malicious actions like data theft, data, encrypting files, launching
websites, or infected USB encryption of files (in ransomware further attacks, or using the
drives. attacks), system control, or compromised system for larger-
establishing connections with scale cyberattacks.
command-and-control servers.
How to Be Safe From Malware

Keep software updated


Use Reputable antivirus software
Use Strong Passwords

Educate YourSelf
Enable FIrewall
Be aware of Public Wi Fi
Download Software from Trusted Website only
3
Future Challenges
he utilization of AI and machine learning by
AI and Machine
cybercriminals can create self-adaptive malware that learns
Learning in
Malware and adjusts its behavior to evade detection systems more
effectively.

The proliferation of Internet of Things (IoT) devices expands


IoT
the attack surface. Many of these devices have weaker security
Vulnerabilities measures, making them easier targets for malware attacks.

Malicious actors might focus on compromising software supply


Supply Chain
chains, injecting malware into widely used software updates or
Attacks components, leading to large-scale infections.
Infographics
You can add and edit some infographics to your presentation to show your data in a visual way.

● Choose your favourite infographic and insert it in your presentation using Ctrl C
+ Ctrl V or Cmd C + Cmd V in Mac.
● Select one of the parts and ungroup it by right-clicking and choosing
“Ungroup”.
● Change the color by clicking on the paint bucket.
● Then resize the element by clicking and dragging one of the square-shaped
points of its bounding box (the cursor should look like a double-headed arrow).
Remember to hold Shift while dragging to keep the proportions.
● Group the elements again by selecting them, right-clicking and choosing
“Group”.
● Repeat the steps above with the other parts and when you’re done editing,
copy the end result and paste it into your presentation.
● Remember to choose the “Keep source formatting” option so that it keeps the
design. For more info, please visit Slidesgo School.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy