malware, types of malware, virus, trojans, worm, rootkit, ransomware, malware protection, malware protection laws India, how malware works, history of malware
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Malware
1.
2. WHAT IS MALWARE?
Malware short for ‘malicious software’.
Software programs designed to inflict damage or perform
other unwanted actions on a computer system.
In Spanish, ‘mal’ is a prefix that means ‘bad’, making the
term ‘badware’.
Common examples of malware
include viruses, worms, trojan horses and spyware.
3. To hurt others and make money, usually by affecting important information
adversely.
Stealing, encrypting or deleting sensitive data.
Altering or hijacking core computing functions.
Monitoring users’ computer activity without their permission.
To steal personal, financial, or business information from individuals & govs.
PURPOSE
4. HISTORY
People first started writing malware in the 1970s and early 1980s. They were written
as experiments or pranks for fun.
‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause
damage - but did foretell the future of malware with its quick spread through systems.
‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an
‘anti-virus’ program.
Term ‘malware’ coined in 1990.
Use of malware increased in the early 2000s.
Experts believe that 31.5% of the world's computers have some type of malware
installed today.
5. HOW DOES MALWARE WORK?
Delivered physically to a system through a
USB flash drives or external hard drives.
Drive-by-Downloads via the Internet.
Spam E-mails and Phishing Attacks.
Bundled with other software.
Accessing hacked or compromised webpages.
6. 5 STAGE MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOITINFECTION
EXECUTION
8. VIRUS
A virus is a piece of code written with malicious intention to harm a
computer or a computer system.
A virus may effect in following ways :
• Deleting the existing files
• Corrupting the running application
• Harming the boot sector of the HDD
• Replication of files
• Engaging the CPU
10. TYPES OF VIRUSES
Macro virus
Boot sector virus
Time bomb virus
Logic bomb virus
Famous Viruses:
MyDoom
Melissa
Stuxnet
Melissa
11. WORM
A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.
• It doesn't affect other files
• Rather copies itself to other network computers
• The worm will do this repeatedly
• Can cause slowness or even block network transmissions
12. Worms exploit a computer's security
holes :
a. Out of date updates
b. No anti-virus
They attack the weakened points in a
network.
Worms can be very difficult to
quarantine.
Famous Worms:
• MSBlaster
• Sasser and Netsky
MSBlaster
13. TROJANS
There are a wide variety of Trojan viruses on the Internet landscape that can
perform an array of tasks. Most Trojans are typically aimed at taking control of a
user’s computer, stealing data and inserting more malware on to a victim’s
computer.
• Backdoor Trojan (Eg:Storm Worm)
• Downloader Trojan
• Infostealer Trojan
• Remote Access Trojan
• Distributed Denial of Service (DDoS) Attack Trojan
14. ROOTKIT
It is a computer program designed to provide continued
privileged access to a computer while actively hiding
its presence.
Originally, a rootkit was a collection of tools that
enabled administrator-level access to a computer or
network.
Once a rootkit has been installed, the controller of the
rootkit has the ability to remotely execute files and
change system configurations on the host machine.
A rootkit on an infected computer can also access log
files and spy on the legitimate computer owner’s usage.
15. RANSOMWARE
Ransomware is a type of malware that prevents or
limits users from accessing their system, either by
locking the system's screen or by locking the users’
files unless a ransom is paid.
Payment is demanded in a virtual currency, such as
bitcoin. Also iTunes and Amazon gift cards.
Motive is mostly always money and victim is
notified unlike other cases.
Originated in Russia, 2005-06. Crypto-ransomware
in 2013.
16. FAMOUS RANSOMWARE ATTACKS
Not Petya
It started as a fake Ukranian tax
software update and infected hundreds
of thousands of computers in more
than 100 countries in just a few days.
It hit a number of firms in the US and
caused major financial damage. For
example, the attack cost
pharmaceutical giant Merck more than
$300 million in Q3 alone.
Locky
It is delivered by email with an
attached Microsoft Word
document (payment invoice) that
contains malicious macros. Once
enabled, the macros downloads
the actual trojan virus which
encrypts files matching particular
extensions.
17. WannaCry or WannaCrypt
WannaCry targeted computers running
the Microsoft Windows operating
system by encrypting data and
demanding ransom payments in the
Bitcoin cryptocurrency. It includes a
‘transport’ mechanism to automatically
spread itself. Organizations that had
not installed Microsoft's security
update from April 2017 were affected
by the attack. the four most affected
countries were Russia, Ukraine, India
and Taiwan.
18. PROTECTION AGAINST MALWARE
The two most effective ways to fight against malware are:
Personal vigilance and protective tools.
Malware security protection provides that second vital layer
of protection for your computer or network.
A robust antivirus software package is the primary
component of technological defenses that every personal
and business computer system should have.
No protection is absolute. But a combination of personal
awareness and well-designed protective tools will make
your computer as safe as it can be.
19. MALWARE PROTECTION LAWS
The relevant laws in India dealing with protection against malware fall under the
following sections of the Indian Information Technology Act, 2000:
• Section 72A - deals with punishment for disclosure of information in breach of
lawful contract. Simply stated, this section provides for protection against illegal or
uninformed release of personal information for wrongful purposes caused due to
malware attacks in this case.
• Section 43 – deals with penalty and compensation for damage to computer, computer
system, etc. This section directly mentions that if anyone introduces or causes to be
introduced any computer contaminant or computer virus into any computer,
computer system or computer network; is punishable by law.