SlideShare a Scribd company logo
1 of 5
Download to read offline
MALWARE
Malware also known as malicious (or malevolent) software, is software used or created by attackers to
disrupt computer operation, gather sensitive information, or gain access to private computer systems. It
can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term
used to refer to a variety of forms of hostile or intrusive software.

Malware includes computer viruses, worms, Trojan horses, spyware, adware, rootkits , Backdoors and
other malicious programs.

 Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and
the World Wide Web.

On March 29, 2010, Symantec Corporation named Shaoxing, China, as the world's malware capital.




                                     The term computer virus is used for a program that has infected
some executable software and, when run, causes the virus to spread to other executables.

Viruses can be divided into two types based on their behavior when they are executed.
1. Nonresident viruses can be thought of as consisting of a finder module and a replication module. The
finder module is responsible for finding new files to infect. For each new executable file the finder module
encounters, it calls the replication module to infect that file.

2. Resident viruses contain a replication module that is similar to the one that is employed by nonresident
viruses. The virus loads the replication module into memory when it is executed and ensures that this
module is executed each time the operating system is called to perform a certain operation. For example
the replication module can be called each time the operating system executes a file. In this case the virus
infects every suitable program that is executed on the computer.

Examples:

The Cascade virus was a resident computer virus written in assembler,that was widespread in the 1980s
and early 1990s. It infected COM files and had the effect of making text on the screen fall down and forms
a heap in the bottom of the screen. It was notable for using an encryption algorithm to avoid being
detected.

Worms are software programs capable of reproducing itself that can spread from one computer to the
next over a network. Worms spread itself automatically and worms can take advantage of automatic file
sending and receiving features found on many computers.

Examples:

          , also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft
Windows operating system that was first detected in November 2008.

2. The Welchia worm, also known as the "Nachia worm," is a computer worm that exploits vulnerability
in the Microsoft Remote procedure call (RPC) service similar to the Blaster worm. However, unlike
Blaster, it tries to download and install security patches from Microsoft, so it is classified as a helpful
worm.
Concealment: [Trojan horses, Rootkits, and Backdoors]
A Trojan horse is any program that invites the user to run it, concealing harmful or
malicious code. The code may take effect immediately and can lead to many undesirable
effects, such as deleting the user's files or installing additional harmful software.


                 !
"                              !                #



                                   $                $



Rootkit softwares are used to hide the fact that a computer system has been compromised,
for example by modifying system commands to conceal changes made to the system. Rootkits
can prevent a malicious process from being visible in the system's list of processes, or keep its
files from being read. Some Rootkit programs contain routines to defend against removal, not
merely to hide them, but to resist attempts to remove them. Rootkits can change how the
operating system functions and in some cases can tamper with the anti-virus program and
render it ineffective. Rootkits are also difficult to remove, in some cases requiring a complete re-
installation of the operating system.
A backdoor is a method of bypassing normal authentication procedures. Once a system has
been compromised, one or more backdoors may be installed in order to allow easier access in
the future. Crackers typically use backdoors to secure remote access to a computer, while
attempting to remain hidden from casual inspection. To install backdoors crackers may use
Trojan horses, worms, or other methods.

Grayware: [Crimeware, Adwire, Spyware]
Grayware (or Greyware) is a general term that refers to applications or files that are not directly
classified as malware (like worms or Trojan horses), but can still negatively affect the
performance of computers and involve significant security risks. Another term is PUP which
stands for Potentially Unwanted Program.
Crimeware is designed to perpetrate identity theft in order to access a computer user's online
accounts at financial services companies and online retailers for the purpose of taking funds
from those accounts or completing unauthorized transactions.Criminals use a variety of
techniques to steal confidential data through crimeware, including through the following
methods:
•   Crimeware can surreptitiously install keystroke loggers to collect sensitive data—login
       and password information for online bank accounts, for example—and report them back
       to the thief.
   •   A Crimeware program can also redirect a user's web browser to a counterfeit website
       controlled by the thief even when the user types the website's proper domain name in
       the address bar.
   •   Crimeware threats can steal passwords cached on a user's system.
   •   Crimeware can wait for the user to log into their account at a financial institution, and
       then drain the account without the user's knowledge.
   •   Crimeware can enable remote access into applications, allowing criminals to break into
       networks for malicious purposes.




Adware is a type of malware designed to display advertisements in the user’s software. They
can be designed to be harmless or harmful; the adware gathers information on what the user
searches in the World Wide Web .With this gathered information it displays ads corresponding
to information collected.

Spyware is a software that self-installs on a computer, enabling information to be gathered
covertly about a person's Internet use, passwords, etc. Spyware can changes your computer
configuration and can cause your computer to slow down or crash. These programs can change
your web browser's home page or search page, or add additional components to your browser
you don't need or want. They also make it very difficult for you to change your settings back to
the way you had them.

Major infrastructures attacked:

                 % &                                           '             (     )*+* % &
                    ,      "                    %                                -       "



 ! "         '                  % &                 .              /
                                                        .




                  0                                                              #
                                                                                              #

   0                                  !%
                      1
                                                                                     &
            &
0


                                                                                                                0


     0
                                                                  0
     "




2    0                                                             0
                                                                                                                        .
                                                              0
3                                                                                      &
                     4                      0                                              5       $       &$
4                                                5


6&               ,           "                        0                                                         ,
%        6               4   "    78                 "        95           0                                    "
,            %           2        4                       "            :       5               "       '            4
                                 "         785
                                       .             4                             0                   5

There are several methods which antivirus software can use to identify malware:
Signature based detection is the most common method. To identify viruses and other
malware, antivirus software compares the contents of a file to a dictionary of virus signatures.
Because viruses can embed themselves in existing files, the entire file is searched, not just as a
whole, but also in pieces.
Heuristic analysis is used to identify new malware or variants of known malware. Many viruses
start as a single infection and through either mutation or refinements by other attackers, can
grow into dozens of slightly different strains, called variants. Heuristic analysis and detection
refers to the detection and removal of multiple threats using a single virus definition.

More Related Content

Similar to Malwares

Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks Ahmed Sherif
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Akash Karwande
 
20160211 OWASP Charlotte RASP
20160211 OWASP Charlotte RASP20160211 OWASP Charlotte RASP
20160211 OWASP Charlotte RASPchadtindel
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxAmardeepKumar621436
 
What is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfWhat is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfHost It Smart
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing BasicsRick Wanner
 
20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASP20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASPchadtindel
 
Malware removal tutorial
Malware removal tutorialMalware removal tutorial
Malware removal tutorialHarikaReddy115
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPScougarcps
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeMangesh wadibhasme
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 

Similar to Malwares (20)

Common Web Application Attacks
Common Web Application Attacks Common Web Application Attacks
Common Web Application Attacks
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques Malware Detection Using Data Mining Techniques
Malware Detection Using Data Mining Techniques
 
20160211 OWASP Charlotte RASP
20160211 OWASP Charlotte RASP20160211 OWASP Charlotte RASP
20160211 OWASP Charlotte RASP
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Security Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptxSecurity Threats and Vulnerabilities-2.pptx
Security Threats and Vulnerabilities-2.pptx
 
What is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdfWhat is ModSecurity and Its Usage.pdf
What is ModSecurity and Its Usage.pdf
 
Penetration Testing Basics
Penetration Testing BasicsPenetration Testing Basics
Penetration Testing Basics
 
20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASP20160225 OWASP Atlanta Prevoty RASP
20160225 OWASP Atlanta Prevoty RASP
 
Malware removal tutorial
Malware removal tutorialMalware removal tutorial
Malware removal tutorial
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
IT Security Seminar Cougar CPS
IT  Security  Seminar  Cougar  CPSIT  Security  Seminar  Cougar  CPS
IT Security Seminar Cougar CPS
 
2 . web app s canners
2 . web app s canners2 . web app s canners
2 . web app s canners
 
D-Cipher
D-CipherD-Cipher
D-Cipher
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 

Recently uploaded

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Malwares

  • 1. MALWARE Malware also known as malicious (or malevolent) software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile or intrusive software. Malware includes computer viruses, worms, Trojan horses, spyware, adware, rootkits , Backdoors and other malicious programs. Malware's most common pathway from criminals to users is through the Internet: primarily by e-mail and the World Wide Web. On March 29, 2010, Symantec Corporation named Shaoxing, China, as the world's malware capital. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. Viruses can be divided into two types based on their behavior when they are executed.
  • 2. 1. Nonresident viruses can be thought of as consisting of a finder module and a replication module. The finder module is responsible for finding new files to infect. For each new executable file the finder module encounters, it calls the replication module to infect that file. 2. Resident viruses contain a replication module that is similar to the one that is employed by nonresident viruses. The virus loads the replication module into memory when it is executed and ensures that this module is executed each time the operating system is called to perform a certain operation. For example the replication module can be called each time the operating system executes a file. In this case the virus infects every suitable program that is executed on the computer. Examples: The Cascade virus was a resident computer virus written in assembler,that was widespread in the 1980s and early 1990s. It infected COM files and had the effect of making text on the screen fall down and forms a heap in the bottom of the screen. It was notable for using an encryption algorithm to avoid being detected. Worms are software programs capable of reproducing itself that can spread from one computer to the next over a network. Worms spread itself automatically and worms can take advantage of automatic file sending and receiving features found on many computers. Examples: , also known as Downup, Downadup and Kido, is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. 2. The Welchia worm, also known as the "Nachia worm," is a computer worm that exploits vulnerability in the Microsoft Remote procedure call (RPC) service similar to the Blaster worm. However, unlike Blaster, it tries to download and install security patches from Microsoft, so it is classified as a helpful worm.
  • 3. Concealment: [Trojan horses, Rootkits, and Backdoors] A Trojan horse is any program that invites the user to run it, concealing harmful or malicious code. The code may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or installing additional harmful software. ! " ! # $ $ Rootkit softwares are used to hide the fact that a computer system has been compromised, for example by modifying system commands to conceal changes made to the system. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Some Rootkit programs contain routines to defend against removal, not merely to hide them, but to resist attempts to remove them. Rootkits can change how the operating system functions and in some cases can tamper with the anti-virus program and render it ineffective. Rootkits are also difficult to remove, in some cases requiring a complete re- installation of the operating system. A backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Crackers typically use backdoors to secure remote access to a computer, while attempting to remain hidden from casual inspection. To install backdoors crackers may use Trojan horses, worms, or other methods. Grayware: [Crimeware, Adwire, Spyware] Grayware (or Greyware) is a general term that refers to applications or files that are not directly classified as malware (like worms or Trojan horses), but can still negatively affect the performance of computers and involve significant security risks. Another term is PUP which stands for Potentially Unwanted Program. Crimeware is designed to perpetrate identity theft in order to access a computer user's online accounts at financial services companies and online retailers for the purpose of taking funds from those accounts or completing unauthorized transactions.Criminals use a variety of techniques to steal confidential data through crimeware, including through the following methods:
  • 4. Crimeware can surreptitiously install keystroke loggers to collect sensitive data—login and password information for online bank accounts, for example—and report them back to the thief. • A Crimeware program can also redirect a user's web browser to a counterfeit website controlled by the thief even when the user types the website's proper domain name in the address bar. • Crimeware threats can steal passwords cached on a user's system. • Crimeware can wait for the user to log into their account at a financial institution, and then drain the account without the user's knowledge. • Crimeware can enable remote access into applications, allowing criminals to break into networks for malicious purposes. Adware is a type of malware designed to display advertisements in the user’s software. They can be designed to be harmless or harmful; the adware gathers information on what the user searches in the World Wide Web .With this gathered information it displays ads corresponding to information collected. Spyware is a software that self-installs on a computer, enabling information to be gathered covertly about a person's Internet use, passwords, etc. Spyware can changes your computer configuration and can cause your computer to slow down or crash. These programs can change your web browser's home page or search page, or add additional components to your browser you don't need or want. They also make it very difficult for you to change your settings back to the way you had them. Major infrastructures attacked: % & ' ( )*+* % & , " % - " ! " ' % & . / . 0 # # 0 !% 1 & &
  • 5. 0 0 0 0 " 2 0 0 . 0 3 & 4 0 5 $ &$ 4 5 6& , " 0 , % 6 4 " 78 " 95 0 " , % 2 4 " : 5 " ' 4 " 785 . 4 0 5 There are several methods which antivirus software can use to identify malware: Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. Because viruses can embed themselves in existing files, the entire file is searched, not just as a whole, but also in pieces. Heuristic analysis is used to identify new malware or variants of known malware. Many viruses start as a single infection and through either mutation or refinements by other attackers, can grow into dozens of slightly different strains, called variants. Heuristic analysis and detection refers to the detection and removal of multiple threats using a single virus definition.