This document defines and describes various types of malware including worms, viruses, Trojans, spyware, adware, rootkits, backdoors, logic bombs, and ransomware. It explains that malware is malicious software designed to damage computers and networks. Examples of specific malware attacks discussed include WannaCry, Mirai, Ghost, Kovter, and Zeus/ZBot.
WSO2CON 2024 - Building a Digital Government in Uganda
Malware and Types of malwares.pdf
1. CompTIA Security+
Attacks, Threats and Vulnerabilities
Friendly Tip: Please take notes to better remember concepts
In this video we will
learn about Malware
and Types of
malwares
2. What is Malware ?
" Malware is a software, that's
intentionally designed to cause
damage to a
computer/server/network "
" It's a set of instructions that run
on a victim/target computer to
make the computer do what the
attacker wants it do "
11. -> Backdoor
" Software that allows
hackers remote access
to hack into
devices/networks "
After gaining access to
a network, Hackers
install it to gain access
at their convenience,
whenever they want to.
12. Originally backdoors were developed for remote tech support
purposes, but in most cases, backdoors are installed either by
cybercriminals or intrusive governments to help them gain access to
a device, a network, or a software application.
Any malware that provides hackers
access to your device can be
considered a backdoor — this
includes rootkits, trojans, spyware,
cryptojackers, keyloggers, worms,
and even ransomware.
13. -> Logic Bomb
They infect a system and lie dormant until they're triggered
14. -> Logic Bomb
A logic bomb is a string of malicious code
inserted intentionally into a program to
harm a network when certain conditions
are met.
The term comes from the idea that the code "explodes" when
triggered by a specific event, such as a certain date or time, the
deletion of a particular record -- e.g., an employee -- from a
system or the launch of the infected software application.
15. -> Logic Bomb
A logic bomb often remains undetected until
it executes its function or launches its
payload. The set of conditions able to set it
off is virtually unlimited. & the degree of
destruction from a logic bomb can vary
greatly , depending on the target objective.
A logic bomb is sneaky because its code lies dormant until the trigger
occurs. it also allows the attaackers to cover their tracks since the logic
bomb usually remains undetectable, sometimes for months or even
years, making it difficult to trace or mitigate.
16. -> Ransomware
Ransomware is a type of
malware from cryptovirology
that threatens to publish the
victim's personal data or
perpetually block access to it
unless a ransom is paid.
Wanna Cry is a notorious
ransomware that you need to
look into.
17. Popular Malware Attacks :
-> WANNACRY
-> MIRAI
-> GHOST
->KOVTER
-> ZEUS or ZBOT
Here's a list of popular malware attacks you need to know. As a
learning exercise, Please do take the time to look into them.