SlideShare a Scribd company logo
1 of 20
WHAT IS MALWARE?
 Malware short for ‘malicious software’.
 Software programs designed to inflict damage or perform
other unwanted actions on a computer system.
 In Spanish, ‘mal’ is a prefix that means ‘bad’, making the
term ‘badware’.
 Common examples of malware
include viruses, worms, trojan horses and spyware.
 To hurt others and make money, usually by affecting important information
adversely.
 Stealing, encrypting or deleting sensitive data.
 Altering or hijacking core computing functions.
 Monitoring users’ computer activity without their permission.
 To steal personal, financial, or business information from individuals & govs.
PURPOSE
HISTORY
 People first started writing malware in the 1970s and early 1980s. They were written
as experiments or pranks for fun.
 ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause
damage - but did foretell the future of malware with its quick spread through systems.
‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an
‘anti-virus’ program.
 Term ‘malware’ coined in 1990.
 Use of malware increased in the early 2000s.
 Experts believe that 31.5% of the world's computers have some type of malware
installed today.
HOW DOES MALWARE WORK?
 Delivered physically to a system through a
USB flash drives or external hard drives.
 Drive-by-Downloads via the Internet.
 Spam E-mails and Phishing Attacks.
 Bundled with other software.
 Accessing hacked or compromised webpages.
5 STAGE MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOITINFECTION
EXECUTION
TYPES OF MALWARE
Virus Worm Trojan Rootkit Ransomware
VIRUS
 A virus is a piece of code written with malicious intention to harm a
computer or a computer system.
 A virus may effect in following ways :
• Deleting the existing files
• Corrupting the running application
• Harming the boot sector of the HDD
• Replication of files
• Engaging the CPU
VIRUS PHASES
TYPES OF VIRUSES
 Macro virus
 Boot sector virus
 Time bomb virus
 Logic bomb virus
Famous Viruses:
MyDoom
Melissa
Stuxnet
Melissa
WORM
 A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.
• It doesn't affect other files
• Rather copies itself to other network computers
• The worm will do this repeatedly
• Can cause slowness or even block network transmissions
 Worms exploit a computer's security
holes :
a. Out of date updates
b. No anti-virus
 They attack the weakened points in a
network.
 Worms can be very difficult to
quarantine.
Famous Worms:
• MSBlaster
• Sasser and Netsky
MSBlaster
TROJANS
 There are a wide variety of Trojan viruses on the Internet landscape that can
perform an array of tasks. Most Trojans are typically aimed at taking control of a
user’s computer, stealing data and inserting more malware on to a victim’s
computer.
• Backdoor Trojan (Eg:Storm Worm)
• Downloader Trojan
• Infostealer Trojan
• Remote Access Trojan
• Distributed Denial of Service (DDoS) Attack Trojan
ROOTKIT
 It is a computer program designed to provide continued
privileged access to a computer while actively hiding
its presence.
 Originally, a rootkit was a collection of tools that
enabled administrator-level access to a computer or
network.
 Once a rootkit has been installed, the controller of the
rootkit has the ability to remotely execute files and
change system configurations on the host machine.
 A rootkit on an infected computer can also access log
files and spy on the legitimate computer owner’s usage.
RANSOMWARE
 Ransomware is a type of malware that prevents or
limits users from accessing their system, either by
locking the system's screen or by locking the users’
files unless a ransom is paid.
 Payment is demanded in a virtual currency, such as
bitcoin. Also iTunes and Amazon gift cards.
 Motive is mostly always money and victim is
notified unlike other cases.
 Originated in Russia, 2005-06. Crypto-ransomware
in 2013.
FAMOUS RANSOMWARE ATTACKS
Not Petya
It started as a fake Ukranian tax
software update and infected hundreds
of thousands of computers in more
than 100 countries in just a few days.
It hit a number of firms in the US and
caused major financial damage. For
example, the attack cost
pharmaceutical giant Merck more than
$300 million in Q3 alone.
Locky
It is delivered by email with an
attached Microsoft Word
document (payment invoice) that
contains malicious macros. Once
enabled, the macros downloads
the actual trojan virus which
encrypts files matching particular
extensions.
WannaCry or WannaCrypt
WannaCry targeted computers running
the Microsoft Windows operating
system by encrypting data and
demanding ransom payments in the
Bitcoin cryptocurrency. It includes a
‘transport’ mechanism to automatically
spread itself. Organizations that had
not installed Microsoft's security
update from April 2017 were affected
by the attack. the four most affected
countries were Russia, Ukraine, India
and Taiwan.
PROTECTION AGAINST MALWARE
 The two most effective ways to fight against malware are:
Personal vigilance and protective tools.
 Malware security protection provides that second vital layer
of protection for your computer or network.
 A robust antivirus software package is the primary
component of technological defenses that every personal
and business computer system should have.
 No protection is absolute. But a combination of personal
awareness and well-designed protective tools will make
your computer as safe as it can be.
MALWARE PROTECTION LAWS
 The relevant laws in India dealing with protection against malware fall under the
following sections of the Indian Information Technology Act, 2000:
• Section 72A - deals with punishment for disclosure of information in breach of
lawful contract. Simply stated, this section provides for protection against illegal or
uninformed release of personal information for wrongful purposes caused due to
malware attacks in this case.
• Section 43 – deals with penalty and compensation for damage to computer, computer
system, etc. This section directly mentions that if anyone introduces or causes to be
introduced any computer contaminant or computer virus into any computer,
computer system or computer network; is punishable by law.
THANK YOU!

More Related Content

What's hot

What's hot (20)

MALWARE
MALWAREMALWARE
MALWARE
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
computer virus
computer viruscomputer virus
computer virus
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
Phishing, Smishing and vishing_ How these cyber attacks work and how to preve...
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Threats to a computer
Threats to a computer Threats to a computer
Threats to a computer
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Spyware
SpywareSpyware
Spyware
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Computer Malware and its types
Computer Malware and its typesComputer Malware and its types
Computer Malware and its types
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Antivirus
AntivirusAntivirus
Antivirus
 

Similar to Malware

trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar reportNamanKikani
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptOsama Yousaf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !Mohammed Jaseem Tp
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1NihanthReddyBalaiahg
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Debabrata Singh
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsDrPraveenKumar37
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 

Similar to Malware (20)

Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Presentation
PresentationPresentation
Presentation
 
Virus
VirusVirus
Virus
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 
Computer virus
Computer virusComputer virus
Computer virus
 

More from Anoushka Srivastava

More from Anoushka Srivastava (6)

Intellectual Property Rights - IPR
Intellectual Property Rights - IPRIntellectual Property Rights - IPR
Intellectual Property Rights - IPR
 
Introduction to E - Commerce
Introduction to E - CommerceIntroduction to E - Commerce
Introduction to E - Commerce
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Understanding Human Resource Management
Understanding Human Resource ManagementUnderstanding Human Resource Management
Understanding Human Resource Management
 
Holacracy
HolacracyHolacracy
Holacracy
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanyChristoph Pohl
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作qr0udbr0
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte GermanySuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
SuccessFactors 1H 2024 Release - Sneak-Peek by Deloitte Germany
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作英国UN学位证,北安普顿大学毕业证书1:1制作
英国UN学位证,北安普顿大学毕业证书1:1制作
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 

Malware

  • 1.
  • 2. WHAT IS MALWARE?  Malware short for ‘malicious software’.  Software programs designed to inflict damage or perform other unwanted actions on a computer system.  In Spanish, ‘mal’ is a prefix that means ‘bad’, making the term ‘badware’.  Common examples of malware include viruses, worms, trojan horses and spyware.
  • 3.  To hurt others and make money, usually by affecting important information adversely.  Stealing, encrypting or deleting sensitive data.  Altering or hijacking core computing functions.  Monitoring users’ computer activity without their permission.  To steal personal, financial, or business information from individuals & govs. PURPOSE
  • 4. HISTORY  People first started writing malware in the 1970s and early 1980s. They were written as experiments or pranks for fun.  ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage - but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.  Term ‘malware’ coined in 1990.  Use of malware increased in the early 2000s.  Experts believe that 31.5% of the world's computers have some type of malware installed today.
  • 5. HOW DOES MALWARE WORK?  Delivered physically to a system through a USB flash drives or external hard drives.  Drive-by-Downloads via the Internet.  Spam E-mails and Phishing Attacks.  Bundled with other software.  Accessing hacked or compromised webpages.
  • 6. 5 STAGE MALWARE ATTACK ENTRY DISTRIBUTION EXPLOITINFECTION EXECUTION
  • 7. TYPES OF MALWARE Virus Worm Trojan Rootkit Ransomware
  • 8. VIRUS  A virus is a piece of code written with malicious intention to harm a computer or a computer system.  A virus may effect in following ways : • Deleting the existing files • Corrupting the running application • Harming the boot sector of the HDD • Replication of files • Engaging the CPU
  • 10. TYPES OF VIRUSES  Macro virus  Boot sector virus  Time bomb virus  Logic bomb virus Famous Viruses: MyDoom Melissa Stuxnet Melissa
  • 11. WORM  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. • It doesn't affect other files • Rather copies itself to other network computers • The worm will do this repeatedly • Can cause slowness or even block network transmissions
  • 12.  Worms exploit a computer's security holes : a. Out of date updates b. No anti-virus  They attack the weakened points in a network.  Worms can be very difficult to quarantine. Famous Worms: • MSBlaster • Sasser and Netsky MSBlaster
  • 13. TROJANS  There are a wide variety of Trojan viruses on the Internet landscape that can perform an array of tasks. Most Trojans are typically aimed at taking control of a user’s computer, stealing data and inserting more malware on to a victim’s computer. • Backdoor Trojan (Eg:Storm Worm) • Downloader Trojan • Infostealer Trojan • Remote Access Trojan • Distributed Denial of Service (DDoS) Attack Trojan
  • 14. ROOTKIT  It is a computer program designed to provide continued privileged access to a computer while actively hiding its presence.  Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network.  Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.  A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
  • 15. RANSOMWARE  Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users’ files unless a ransom is paid.  Payment is demanded in a virtual currency, such as bitcoin. Also iTunes and Amazon gift cards.  Motive is mostly always money and victim is notified unlike other cases.  Originated in Russia, 2005-06. Crypto-ransomware in 2013.
  • 16. FAMOUS RANSOMWARE ATTACKS Not Petya It started as a fake Ukranian tax software update and infected hundreds of thousands of computers in more than 100 countries in just a few days. It hit a number of firms in the US and caused major financial damage. For example, the attack cost pharmaceutical giant Merck more than $300 million in Q3 alone. Locky It is delivered by email with an attached Microsoft Word document (payment invoice) that contains malicious macros. Once enabled, the macros downloads the actual trojan virus which encrypts files matching particular extensions.
  • 17. WannaCry or WannaCrypt WannaCry targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It includes a ‘transport’ mechanism to automatically spread itself. Organizations that had not installed Microsoft's security update from April 2017 were affected by the attack. the four most affected countries were Russia, Ukraine, India and Taiwan.
  • 18. PROTECTION AGAINST MALWARE  The two most effective ways to fight against malware are: Personal vigilance and protective tools.  Malware security protection provides that second vital layer of protection for your computer or network.  A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have.  No protection is absolute. But a combination of personal awareness and well-designed protective tools will make your computer as safe as it can be.
  • 19. MALWARE PROTECTION LAWS  The relevant laws in India dealing with protection against malware fall under the following sections of the Indian Information Technology Act, 2000: • Section 72A - deals with punishment for disclosure of information in breach of lawful contract. Simply stated, this section provides for protection against illegal or uninformed release of personal information for wrongful purposes caused due to malware attacks in this case. • Section 43 – deals with penalty and compensation for damage to computer, computer system, etc. This section directly mentions that if anyone introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; is punishable by law.