SlideShare a Scribd company logo
MALWARES
BY:SAGILA
3RD YEAR BSc. FORENSIC SCIENCE
ANNAI FATHIMA COLLEGE OF ARTS AND SCIENCE
WHAT IS MALWARE ?
 Malware is the collective name for a number of malicious
software variants, including viruses, ransomware and
spyware.
 Malware typically consists of code developed by cyber
attackers, designed to cause extensive damage to data and
systems or to gain unauthorized access to a network.
 Malware is typically delivered in the form of a link or file over
email and requires the user to click on the link or open the file
to execute the malware.
TYPES OF MALWARE
VIRUS
 Primitive types of malware.
 Possibly the most common type of malware, viruses attach their
malicious code to clean code and wait for an unsuspecting user or an
automated process to execute them.
 They are usually contained within an executable file. They are self-
replicating programs that usually have a malicious intent.
 Instead it copies itself using a human assistance, such as using an
infected floppy disk at another machine.
 Some viruses are harmful and delete information or corrupt the
operating system.
TYPES OF VIRUSES
Boot viruses: establish their code in the disk sector. The machine
automatically executes the code of the boot virus when booting. Thus,
when an infected machine boots, the virus loads and runs it. After
completion of booting of viruses they usually load the original boot code
of the machine which they have previously moved to another location in
the disk or take other measures to ensure the machine appears to boot
normally.
File viruses: Get attached to program files (files containing
executable). When the infected program runs, the virus code executes.
Very often the virus code is added in such a way that it executes first,
then the program itself. After the virus code has finished loading and
executing, it will normally load and execute the original program it has
infected, or call the function it intercepted, so as to not arouse the
user’s suspicion.
 Companion viruses: Exploit the characteristics of the operating
system to execute it, rather than directly targeting programs or
boot sectors. Under DOS and Windows, when executing the
command „ABC‟, the method is that ABC.COM executes before
ABC.EXE (in the rare cases where both files exist). Thus, a
companion virus could place its code in a COM file with its first
name similar to that of an existing EXE file. When executing the
„ABC‟ command, the virus‟ ABC.COM program runs (usually the
virus would launch ABC.EXE once its function has been
completed so as not to alert the user. This is known as the
execution preference companion method.
Script viruses: became quite a hit with the hackers. The basic
reason for this virus being successful is machines started
operating on Windows. Writers of Script viruses used mass
mailing to target machines installed with Windows 98 and 2000
with Internet Explorer 5.0 and following versions. Program files
like VBS, JS & icons that of safe text files became quite
vulnerable to such attacks.
WORMS
Worms are similar to viruses as
they replicate themselves in the
same manner.
 Although self cloning in nature it is
different from a virus as it does
not need to attach itself to a file
or a disk sector.
Just like the picture depcits:
Starting from one infected machine,
they weave their way through the
network, connecting to consecutive
machines in order to continue the
spread of infection. This type of
malware can infect entire networks
of devices very quickly.
TROJAN
 In cyber world Trojan horses bare
one of the deadliest and randomly
used malware appearing to be worthy
software but instead it infect
damages & compromises the security
of the system.
A Trojan horse tempts a user into
opening a program as they are
satisfied that it is from a legitimate
source. Free softwares available for
downloading may be Trojans.
Just like the picture depicts: Acting
discretely, it will breach security by
creating backdoors that give other
malware variants easy access.
SPYWARE
Spyware is unwanted software that
infiltrates your computing device,
stealing your internet usage data
and sensitive information.
Spyware monitors your internet
activity, tracking your login and
password information, and spying on
your sensitive information.
 It aims to track and sell your
internet usage data, capture your
credit card or bank account
information, or steal your personal
identity.
ADWARE
Adware is any software application in
which advertising banners are displayed
while a program is running.
The ads are delivered through pop-up
windows or bars that appear on the
program's user interface.
Without the consent of the target user,
his online habits are sold.
The advertisement companies display
commercial ads, pop ups & even redirect
a user to a website without his
willingness or knowledge. These are
known as sticky software. It stays in the
infected machine without providing the
facility to uninstall it.
RANSOMWARE
Ransomware is malicious software that infects
your computer and displays messages
demanding a fee to be paid in order for your
system to work again.
This class of malware is a criminal money
making scheme that can be installed through
deceptive links in an email message, instant
message or website.
 It has the ability to lock a computer screen or
encrypt important, predetermined files with a
password.
Scareware is the simplest type of ransomware.
It uses scare tactics or intimidation to trick
victims into paying up. It can come in the form of
fake antivirus software in which a message
suddenly appears claiming your computer has
various issues and an online payment is
necessary to fix them.
CRIMEWARE
Crimeware is doing illegal online activities with the use of various
malware types. More specifically, Crimeware may be a virus, spyware, or
other piece of software that can be used to commit identity theft and
fraud.
Crimeware can take a number of actions, including:
Furtively install keystroke loggers to procure sensitive data, such as login
and password information for online bank accounts, and report them back
to the thief.
Redirect a user’s web browser to a counterfeit website controlled by the
thief.
Enable remote access into applications, allowing criminals to break into
networks for malicious purposes.
Encrypt all data on a computer and require the user to pay to decrypt it
(ransomware).
Sending out an email with an attachment to execute a payload to spread
the malware.
ROOTKIT
A rootkit is a collection of computer
software, typically malicious, designed
to enable access to a computer or an
area of its software that is not otherwise
allowed and often masks its existence
or the existence of other software.
A rootkit allows someone to maintain
command and control over a computer
without the computer user/owner
knowing about it. Once a rootkit has
been installed, the controller of the
rootkit has the ability to remotely
execute files and change system
configurations on the host machine.
A rootkit on an infected computer can
also access log files and spy on the
legitimate computer owner’s usage.
TYPES OF ROOTKIT
Kernel Rootkits - Hide a backdoor on a computer system by using
modified code to add or replace a portion of the system's existing
kernel code. Usually the new code is added to the kernel via a device
driver or loadable module. Kernel rootkits can be especially
dangerous because they can be difficult to detect without appropriate
software.
Library Rootkits - Hide information about the intruder by
manipulating system calls with patches, hooks, or replacements.
Application Rootkits - Replace or modify regular application
binaries with camouflaged fakes, hooks, patches, or injected code.
ANTI-MALWARE
Antivirus software, or anti-virus software also known as anti-malware, is a
computer program used to prevent, detect, and remove malware.
With the spread of other kinds of malware, antivirus software started to
provide security from other computer threats.
Antivirus software can guard users from malicious browser helper objects
(BHOs), browser hijackers, ransomware, worms, keyloggers, backdoors,
rootkits, Trojan horses, malicious LSPs, dialers, fraudtools, adware and
spyware.
Some products also include protection from further computer threats,
such as infected and malicious URLs, spam, scam and phishing attacks,
online identity (privacy), online banking attacks, social engineering
techniques, advanced persistent threat (APT) and botnet DDoS attacks.
PREVENATION
Ensure that all security updates and patches are installed.
Avoid suspicious links and emails.
Avoid suspicious websites.
Review software carefully before downloading.
Leverage strong, unique passwords.
Install Anti-virus software.
Turn on your firewall .
Limit application privileges.
Only buy Apps from trusted sources.
Back up data regularly.
CONCLUSION
 There are a lot of security measures that can be executed to
protect computers and networks form malware. Most security
measures that are accessible to users are aimed at protecting
computers from malware, adware, spam and various types of
common viruses. Even though there are a lot of companies
providing these services, cyber criminals are always looking
for new ways to get around firewalls and anti virus software
and on some occasions they are effective because there are
numerous hackers and spammers around the globe new ways
of getting around these barriers are regularly being developed
and catching them can be very difficult. However if users take
the suitable steps such as installing firewalls and anti
malware/virus software they will be less likely to fall prey to
cyber criminals.
MALWARE AND ITS TYPES

More Related Content

What's hot

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
VSAM Technologies India Private Limited
 
Malware and security
Malware and securityMalware and security
Malware and security
Gurbakash Phonsa
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Cyber security
Cyber securityCyber security
Cyber security
Sabir Raja
 
Computer virus
Computer virusComputer virus
Computer virus
Priti Singh
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
Gaurang Rathod
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
Apurv Singh Gautam
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
sadique_ghitm
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
Dnyaneshwar Beedkar
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
aritradutta22
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
Shri ramswaroop college of engineering and management
 
Computer virus
Computer virusComputer virus
Computer virus
Shubham Kafle
 
Virus
VirusVirus
Virus
Protik Roy
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
Sardar Kaukaz
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
LakshayNRReddy
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
Nikhil Raj
 
spyware
spywarespyware
spyware
NamanKikani
 

What's hot (20)

cyber security and threats.pptx
cyber security and threats.pptxcyber security and threats.pptx
cyber security and threats.pptx
 
Malware and security
Malware and securityMalware and security
Malware and security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Trojan horse
Trojan horseTrojan horse
Trojan horse
 
Cyber Security Fundamentals
Cyber Security FundamentalsCyber Security Fundamentals
Cyber Security Fundamentals
 
Computer Worms
Computer WormsComputer Worms
Computer Worms
 
Security threats and safety measures
Security threats and safety measuresSecurity threats and safety measures
Security threats and safety measures
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Security threats and attacks in cyber security
Security threats and attacks in cyber securitySecurity threats and attacks in cyber security
Security threats and attacks in cyber security
 
Computer virus
Computer virusComputer virus
Computer virus
 
Presentation on computer viruses
Presentation on computer virusesPresentation on computer viruses
Presentation on computer viruses
 
Virus
VirusVirus
Virus
 
Computer virus and anti virus presentation
Computer virus and anti virus presentationComputer virus and anti virus presentation
Computer virus and anti virus presentation
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Intrusion detection and prevention system
Intrusion detection and prevention systemIntrusion detection and prevention system
Intrusion detection and prevention system
 
spyware
spywarespyware
spyware
 

Similar to MALWARE AND ITS TYPES

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
TIC
TICTIC
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
Kakai Catalan
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
PragatiKachhi1
 
Presentation2
Presentation2Presentation2
Presentation2Jeslynn
 
MALWARE
MALWAREMALWARE
MALWARE
Anupam Das
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent themkrunal gandhi
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
Cyber Vignan
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
ranaanish11062001
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Virus
VirusVirus
Virus
dddaou
 
Module 5.Malware
Module 5.MalwareModule 5.Malware

Similar to MALWARE AND ITS TYPES (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer virus 18
Computer virus 18Computer virus 18
Computer virus 18
 
Computer virus
Computer virusComputer virus
Computer virus
 
TIC
TICTIC
TIC
 
CS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdfCS111-PART 7 (MALWARE).pdf
CS111-PART 7 (MALWARE).pdf
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Presentation2
Presentation2Presentation2
Presentation2
 
MALWARE
MALWAREMALWARE
MALWARE
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Malwares and ways to detect and prevent them
Malwares and ways to detect and prevent themMalwares and ways to detect and prevent them
Malwares and ways to detect and prevent them
 
Introductions To Malwares
Introductions To MalwaresIntroductions To Malwares
Introductions To Malwares
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
PPT on information technology laws description
PPT on information technology laws descriptionPPT on information technology laws description
PPT on information technology laws description
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Virus
VirusVirus
Virus
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 

Recently uploaded

insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
anitaento25
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
Areesha Ahmad
 
plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
yusufzako14
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
AADYARAJPANDEY1
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
Richard Gill
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
subedisuryaofficial
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
aishnasrivastava
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
NathanBaughman3
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
Lokesh Patil
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
Health Advances
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
DiyaBiswas10
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
YOGESH DOGRA
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
AlaminAfendy1
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
ChetanK57
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
IvanMallco1
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
Columbia Weather Systems
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
Richard Gill
 

Recently uploaded (20)

insect morphology and physiology of insect
insect morphology and physiology of insectinsect morphology and physiology of insect
insect morphology and physiology of insect
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
plant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptxplant biotechnology Lecture note ppt.pptx
plant biotechnology Lecture note ppt.pptx
 
Cancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate PathwayCancer cell metabolism: special Reference to Lactate Pathway
Cancer cell metabolism: special Reference to Lactate Pathway
 
Richard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlandsRichard's aventures in two entangled wonderlands
Richard's aventures in two entangled wonderlands
 
Citrus Greening Disease and its Management
Citrus Greening Disease and its ManagementCitrus Greening Disease and its Management
Citrus Greening Disease and its Management
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
Structural Classification Of Protein (SCOP)
Structural Classification Of Protein  (SCOP)Structural Classification Of Protein  (SCOP)
Structural Classification Of Protein (SCOP)
 
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
Astronomy Update- Curiosity’s exploration of Mars _ Local Briefs _ leadertele...
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Nutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technologyNutraceutical market, scope and growth: Herbal drug technology
Nutraceutical market, scope and growth: Herbal drug technology
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
extra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdfextra-chromosomal-inheritance[1].pptx.pdfpdf
extra-chromosomal-inheritance[1].pptx.pdfpdf
 
Mammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also FunctionsMammalian Pineal Body Structure and Also Functions
Mammalian Pineal Body Structure and Also Functions
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
filosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptxfilosofia boliviana introducción jsjdjd.pptx
filosofia boliviana introducción jsjdjd.pptx
 
Orion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWSOrion Air Quality Monitoring Systems - CWS
Orion Air Quality Monitoring Systems - CWS
 
Richard's entangled aventures in wonderland
Richard's entangled aventures in wonderlandRichard's entangled aventures in wonderland
Richard's entangled aventures in wonderland
 

MALWARE AND ITS TYPES

  • 1. MALWARES BY:SAGILA 3RD YEAR BSc. FORENSIC SCIENCE ANNAI FATHIMA COLLEGE OF ARTS AND SCIENCE
  • 2. WHAT IS MALWARE ?  Malware is the collective name for a number of malicious software variants, including viruses, ransomware and spyware.  Malware typically consists of code developed by cyber attackers, designed to cause extensive damage to data and systems or to gain unauthorized access to a network.  Malware is typically delivered in the form of a link or file over email and requires the user to click on the link or open the file to execute the malware.
  • 4. VIRUS  Primitive types of malware.  Possibly the most common type of malware, viruses attach their malicious code to clean code and wait for an unsuspecting user or an automated process to execute them.  They are usually contained within an executable file. They are self- replicating programs that usually have a malicious intent.  Instead it copies itself using a human assistance, such as using an infected floppy disk at another machine.  Some viruses are harmful and delete information or corrupt the operating system.
  • 5. TYPES OF VIRUSES Boot viruses: establish their code in the disk sector. The machine automatically executes the code of the boot virus when booting. Thus, when an infected machine boots, the virus loads and runs it. After completion of booting of viruses they usually load the original boot code of the machine which they have previously moved to another location in the disk or take other measures to ensure the machine appears to boot normally. File viruses: Get attached to program files (files containing executable). When the infected program runs, the virus code executes. Very often the virus code is added in such a way that it executes first, then the program itself. After the virus code has finished loading and executing, it will normally load and execute the original program it has infected, or call the function it intercepted, so as to not arouse the user’s suspicion.
  • 6.  Companion viruses: Exploit the characteristics of the operating system to execute it, rather than directly targeting programs or boot sectors. Under DOS and Windows, when executing the command „ABC‟, the method is that ABC.COM executes before ABC.EXE (in the rare cases where both files exist). Thus, a companion virus could place its code in a COM file with its first name similar to that of an existing EXE file. When executing the „ABC‟ command, the virus‟ ABC.COM program runs (usually the virus would launch ABC.EXE once its function has been completed so as not to alert the user. This is known as the execution preference companion method. Script viruses: became quite a hit with the hackers. The basic reason for this virus being successful is machines started operating on Windows. Writers of Script viruses used mass mailing to target machines installed with Windows 98 and 2000 with Internet Explorer 5.0 and following versions. Program files like VBS, JS & icons that of safe text files became quite vulnerable to such attacks.
  • 7. WORMS Worms are similar to viruses as they replicate themselves in the same manner.  Although self cloning in nature it is different from a virus as it does not need to attach itself to a file or a disk sector. Just like the picture depcits: Starting from one infected machine, they weave their way through the network, connecting to consecutive machines in order to continue the spread of infection. This type of malware can infect entire networks of devices very quickly.
  • 8. TROJAN  In cyber world Trojan horses bare one of the deadliest and randomly used malware appearing to be worthy software but instead it infect damages & compromises the security of the system. A Trojan horse tempts a user into opening a program as they are satisfied that it is from a legitimate source. Free softwares available for downloading may be Trojans. Just like the picture depicts: Acting discretely, it will breach security by creating backdoors that give other malware variants easy access.
  • 9. SPYWARE Spyware is unwanted software that infiltrates your computing device, stealing your internet usage data and sensitive information. Spyware monitors your internet activity, tracking your login and password information, and spying on your sensitive information.  It aims to track and sell your internet usage data, capture your credit card or bank account information, or steal your personal identity.
  • 10. ADWARE Adware is any software application in which advertising banners are displayed while a program is running. The ads are delivered through pop-up windows or bars that appear on the program's user interface. Without the consent of the target user, his online habits are sold. The advertisement companies display commercial ads, pop ups & even redirect a user to a website without his willingness or knowledge. These are known as sticky software. It stays in the infected machine without providing the facility to uninstall it.
  • 11. RANSOMWARE Ransomware is malicious software that infects your computer and displays messages demanding a fee to be paid in order for your system to work again. This class of malware is a criminal money making scheme that can be installed through deceptive links in an email message, instant message or website.  It has the ability to lock a computer screen or encrypt important, predetermined files with a password. Scareware is the simplest type of ransomware. It uses scare tactics or intimidation to trick victims into paying up. It can come in the form of fake antivirus software in which a message suddenly appears claiming your computer has various issues and an online payment is necessary to fix them.
  • 12. CRIMEWARE Crimeware is doing illegal online activities with the use of various malware types. More specifically, Crimeware may be a virus, spyware, or other piece of software that can be used to commit identity theft and fraud. Crimeware can take a number of actions, including: Furtively install keystroke loggers to procure sensitive data, such as login and password information for online bank accounts, and report them back to the thief. Redirect a user’s web browser to a counterfeit website controlled by the thief. Enable remote access into applications, allowing criminals to break into networks for malicious purposes. Encrypt all data on a computer and require the user to pay to decrypt it (ransomware). Sending out an email with an attachment to execute a payload to spread the malware.
  • 13. ROOTKIT A rootkit is a collection of computer software, typically malicious, designed to enable access to a computer or an area of its software that is not otherwise allowed and often masks its existence or the existence of other software. A rootkit allows someone to maintain command and control over a computer without the computer user/owner knowing about it. Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine. A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
  • 14. TYPES OF ROOTKIT Kernel Rootkits - Hide a backdoor on a computer system by using modified code to add or replace a portion of the system's existing kernel code. Usually the new code is added to the kernel via a device driver or loadable module. Kernel rootkits can be especially dangerous because they can be difficult to detect without appropriate software. Library Rootkits - Hide information about the intruder by manipulating system calls with patches, hooks, or replacements. Application Rootkits - Replace or modify regular application binaries with camouflaged fakes, hooks, patches, or injected code.
  • 15. ANTI-MALWARE Antivirus software, or anti-virus software also known as anti-malware, is a computer program used to prevent, detect, and remove malware. With the spread of other kinds of malware, antivirus software started to provide security from other computer threats. Antivirus software can guard users from malicious browser helper objects (BHOs), browser hijackers, ransomware, worms, keyloggers, backdoors, rootkits, Trojan horses, malicious LSPs, dialers, fraudtools, adware and spyware. Some products also include protection from further computer threats, such as infected and malicious URLs, spam, scam and phishing attacks, online identity (privacy), online banking attacks, social engineering techniques, advanced persistent threat (APT) and botnet DDoS attacks.
  • 16. PREVENATION Ensure that all security updates and patches are installed. Avoid suspicious links and emails. Avoid suspicious websites. Review software carefully before downloading. Leverage strong, unique passwords. Install Anti-virus software. Turn on your firewall . Limit application privileges. Only buy Apps from trusted sources. Back up data regularly.
  • 17. CONCLUSION  There are a lot of security measures that can be executed to protect computers and networks form malware. Most security measures that are accessible to users are aimed at protecting computers from malware, adware, spam and various types of common viruses. Even though there are a lot of companies providing these services, cyber criminals are always looking for new ways to get around firewalls and anti virus software and on some occasions they are effective because there are numerous hackers and spammers around the globe new ways of getting around these barriers are regularly being developed and catching them can be very difficult. However if users take the suitable steps such as installing firewalls and anti malware/virus software they will be less likely to fall prey to cyber criminals.