SlideShare ist ein Scribd-Unternehmen logo
1 von 20
WHAT IS MALWARE?
 Malware short for ‘malicious software’.
 Software programs designed to inflict damage or perform
other unwanted actions on a computer system.
 In Spanish, ‘mal’ is a prefix that means ‘bad’, making the
term ‘badware’.
 Common examples of malware
include viruses, worms, trojan horses and spyware.
 To hurt others and make money, usually by affecting important information
adversely.
 Stealing, encrypting or deleting sensitive data.
 Altering or hijacking core computing functions.
 Monitoring users’ computer activity without their permission.
 To steal personal, financial, or business information from individuals & govs.
PURPOSE
HISTORY
 People first started writing malware in the 1970s and early 1980s. They were written
as experiments or pranks for fun.
 ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause
damage - but did foretell the future of malware with its quick spread through systems.
‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an
‘anti-virus’ program.
 Term ‘malware’ coined in 1990.
 Use of malware increased in the early 2000s.
 Experts believe that 31.5% of the world's computers have some type of malware
installed today.
HOW DOES MALWARE WORK?
 Delivered physically to a system through a
USB flash drives or external hard drives.
 Drive-by-Downloads via the Internet.
 Spam E-mails and Phishing Attacks.
 Bundled with other software.
 Accessing hacked or compromised webpages.
5 STAGE MALWARE ATTACK
ENTRY
DISTRIBUTION
EXPLOITINFECTION
EXECUTION
TYPES OF MALWARE
Virus Worm Trojan Rootkit Ransomware
VIRUS
 A virus is a piece of code written with malicious intention to harm a
computer or a computer system.
 A virus may effect in following ways :
• Deleting the existing files
• Corrupting the running application
• Harming the boot sector of the HDD
• Replication of files
• Engaging the CPU
VIRUS PHASES
TYPES OF VIRUSES
 Macro virus
 Boot sector virus
 Time bomb virus
 Logic bomb virus
Famous Viruses:
MyDoom
Melissa
Stuxnet
Melissa
WORM
 A computer worm is a standalone malware computer program
that replicates itself in order to spread to other computers.
• It doesn't affect other files
• Rather copies itself to other network computers
• The worm will do this repeatedly
• Can cause slowness or even block network transmissions
 Worms exploit a computer's security
holes :
a. Out of date updates
b. No anti-virus
 They attack the weakened points in a
network.
 Worms can be very difficult to
quarantine.
Famous Worms:
• MSBlaster
• Sasser and Netsky
MSBlaster
TROJANS
 There are a wide variety of Trojan viruses on the Internet landscape that can
perform an array of tasks. Most Trojans are typically aimed at taking control of a
user’s computer, stealing data and inserting more malware on to a victim’s
computer.
• Backdoor Trojan (Eg:Storm Worm)
• Downloader Trojan
• Infostealer Trojan
• Remote Access Trojan
• Distributed Denial of Service (DDoS) Attack Trojan
ROOTKIT
 It is a computer program designed to provide continued
privileged access to a computer while actively hiding
its presence.
 Originally, a rootkit was a collection of tools that
enabled administrator-level access to a computer or
network.
 Once a rootkit has been installed, the controller of the
rootkit has the ability to remotely execute files and
change system configurations on the host machine.
 A rootkit on an infected computer can also access log
files and spy on the legitimate computer owner’s usage.
RANSOMWARE
 Ransomware is a type of malware that prevents or
limits users from accessing their system, either by
locking the system's screen or by locking the users’
files unless a ransom is paid.
 Payment is demanded in a virtual currency, such as
bitcoin. Also iTunes and Amazon gift cards.
 Motive is mostly always money and victim is
notified unlike other cases.
 Originated in Russia, 2005-06. Crypto-ransomware
in 2013.
FAMOUS RANSOMWARE ATTACKS
Not Petya
It started as a fake Ukranian tax
software update and infected hundreds
of thousands of computers in more
than 100 countries in just a few days.
It hit a number of firms in the US and
caused major financial damage. For
example, the attack cost
pharmaceutical giant Merck more than
$300 million in Q3 alone.
Locky
It is delivered by email with an
attached Microsoft Word
document (payment invoice) that
contains malicious macros. Once
enabled, the macros downloads
the actual trojan virus which
encrypts files matching particular
extensions.
WannaCry or WannaCrypt
WannaCry targeted computers running
the Microsoft Windows operating
system by encrypting data and
demanding ransom payments in the
Bitcoin cryptocurrency. It includes a
‘transport’ mechanism to automatically
spread itself. Organizations that had
not installed Microsoft's security
update from April 2017 were affected
by the attack. the four most affected
countries were Russia, Ukraine, India
and Taiwan.
PROTECTION AGAINST MALWARE
 The two most effective ways to fight against malware are:
Personal vigilance and protective tools.
 Malware security protection provides that second vital layer
of protection for your computer or network.
 A robust antivirus software package is the primary
component of technological defenses that every personal
and business computer system should have.
 No protection is absolute. But a combination of personal
awareness and well-designed protective tools will make
your computer as safe as it can be.
MALWARE PROTECTION LAWS
 The relevant laws in India dealing with protection against malware fall under the
following sections of the Indian Information Technology Act, 2000:
• Section 72A - deals with punishment for disclosure of information in breach of
lawful contract. Simply stated, this section provides for protection against illegal or
uninformed release of personal information for wrongful purposes caused due to
malware attacks in this case.
• Section 43 – deals with penalty and compensation for damage to computer, computer
system, etc. This section directly mentions that if anyone introduces or causes to be
introduced any computer contaminant or computer virus into any computer,
computer system or computer network; is punishable by law.
THANK YOU!

Weitere ähnliche Inhalte

Was ist angesagt?

presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
Yogesh Singh Rawat
 

Was ist angesagt? (20)

Ppt123
Ppt123Ppt123
Ppt123
 
Hacking
HackingHacking
Hacking
 
Malware and security
Malware and securityMalware and security
Malware and security
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Cyber security
Cyber securityCyber security
Cyber security
 
Malware- Types, Detection and Future
Malware- Types, Detection and FutureMalware- Types, Detection and Future
Malware- Types, Detection and Future
 
presentation on computer virus
presentation on computer viruspresentation on computer virus
presentation on computer virus
 
Cyber Security Presentation
Cyber Security PresentationCyber Security Presentation
Cyber Security Presentation
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
MALWARE
MALWAREMALWARE
MALWARE
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware
SpywareSpyware
Spyware
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer security
Computer securityComputer security
Computer security
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Spyware
SpywareSpyware
Spyware
 
Computer virus
 Computer virus Computer virus
Computer virus
 

Ähnlich wie Malware

Ähnlich wie Malware (20)

Computer crimes
Computer crimesComputer crimes
Computer crimes
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
Malware
MalwareMalware
Malware
 
Malware
MalwareMalware
Malware
 
trojon horse Seminar report
 trojon horse Seminar report trojon horse Seminar report
trojon horse Seminar report
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
MALWARES.pptx
MALWARES.pptxMALWARES.pptx
MALWARES.pptx
 
Network Security.pptx
Network Security.pptxNetwork Security.pptx
Network Security.pptx
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Computer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides pptComputer Viruses and Classification lecture slides ppt
Computer Viruses and Classification lecture slides ppt
 
Presentation
PresentationPresentation
Presentation
 
Virus
VirusVirus
Virus
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1Detecting and mitigating cyber threats and attacks1
Detecting and mitigating cyber threats and attacks1
 
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
Security Threats to machine Learning( ARTIFICIAL INTELLIGENCE)
 
Cyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering studentsCyber-Security-CIT good for 1st year engineering students
Cyber-Security-CIT good for 1st year engineering students
 

Mehr von Anoushka Srivastava (6)

Intellectual Property Rights - IPR
Intellectual Property Rights - IPRIntellectual Property Rights - IPR
Intellectual Property Rights - IPR
 
Introduction to E - Commerce
Introduction to E - CommerceIntroduction to E - Commerce
Introduction to E - Commerce
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Understanding Human Resource Management
Understanding Human Resource ManagementUnderstanding Human Resource Management
Understanding Human Resource Management
 
Holacracy
HolacracyHolacracy
Holacracy
 
E - Commerce
E - CommerceE - Commerce
E - Commerce
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Kürzlich hochgeladen (20)

WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
%in kaalfontein+277-882-255-28 abortion pills for sale in kaalfontein
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 

Malware

  • 1.
  • 2. WHAT IS MALWARE?  Malware short for ‘malicious software’.  Software programs designed to inflict damage or perform other unwanted actions on a computer system.  In Spanish, ‘mal’ is a prefix that means ‘bad’, making the term ‘badware’.  Common examples of malware include viruses, worms, trojan horses and spyware.
  • 3.  To hurt others and make money, usually by affecting important information adversely.  Stealing, encrypting or deleting sensitive data.  Altering or hijacking core computing functions.  Monitoring users’ computer activity without their permission.  To steal personal, financial, or business information from individuals & govs. PURPOSE
  • 4. HISTORY  People first started writing malware in the 1970s and early 1980s. They were written as experiments or pranks for fun.  ‘Creeper Virus’ created in 1971. Created as an experiment, Creeper did not cause damage - but did foretell the future of malware with its quick spread through systems. ‘Reaper’ was created to hunt and destroy Creeper - one of the first examples of an ‘anti-virus’ program.  Term ‘malware’ coined in 1990.  Use of malware increased in the early 2000s.  Experts believe that 31.5% of the world's computers have some type of malware installed today.
  • 5. HOW DOES MALWARE WORK?  Delivered physically to a system through a USB flash drives or external hard drives.  Drive-by-Downloads via the Internet.  Spam E-mails and Phishing Attacks.  Bundled with other software.  Accessing hacked or compromised webpages.
  • 6. 5 STAGE MALWARE ATTACK ENTRY DISTRIBUTION EXPLOITINFECTION EXECUTION
  • 7. TYPES OF MALWARE Virus Worm Trojan Rootkit Ransomware
  • 8. VIRUS  A virus is a piece of code written with malicious intention to harm a computer or a computer system.  A virus may effect in following ways : • Deleting the existing files • Corrupting the running application • Harming the boot sector of the HDD • Replication of files • Engaging the CPU
  • 10. TYPES OF VIRUSES  Macro virus  Boot sector virus  Time bomb virus  Logic bomb virus Famous Viruses: MyDoom Melissa Stuxnet Melissa
  • 11. WORM  A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. • It doesn't affect other files • Rather copies itself to other network computers • The worm will do this repeatedly • Can cause slowness or even block network transmissions
  • 12.  Worms exploit a computer's security holes : a. Out of date updates b. No anti-virus  They attack the weakened points in a network.  Worms can be very difficult to quarantine. Famous Worms: • MSBlaster • Sasser and Netsky MSBlaster
  • 13. TROJANS  There are a wide variety of Trojan viruses on the Internet landscape that can perform an array of tasks. Most Trojans are typically aimed at taking control of a user’s computer, stealing data and inserting more malware on to a victim’s computer. • Backdoor Trojan (Eg:Storm Worm) • Downloader Trojan • Infostealer Trojan • Remote Access Trojan • Distributed Denial of Service (DDoS) Attack Trojan
  • 14. ROOTKIT  It is a computer program designed to provide continued privileged access to a computer while actively hiding its presence.  Originally, a rootkit was a collection of tools that enabled administrator-level access to a computer or network.  Once a rootkit has been installed, the controller of the rootkit has the ability to remotely execute files and change system configurations on the host machine.  A rootkit on an infected computer can also access log files and spy on the legitimate computer owner’s usage.
  • 15. RANSOMWARE  Ransomware is a type of malware that prevents or limits users from accessing their system, either by locking the system's screen or by locking the users’ files unless a ransom is paid.  Payment is demanded in a virtual currency, such as bitcoin. Also iTunes and Amazon gift cards.  Motive is mostly always money and victim is notified unlike other cases.  Originated in Russia, 2005-06. Crypto-ransomware in 2013.
  • 16. FAMOUS RANSOMWARE ATTACKS Not Petya It started as a fake Ukranian tax software update and infected hundreds of thousands of computers in more than 100 countries in just a few days. It hit a number of firms in the US and caused major financial damage. For example, the attack cost pharmaceutical giant Merck more than $300 million in Q3 alone. Locky It is delivered by email with an attached Microsoft Word document (payment invoice) that contains malicious macros. Once enabled, the macros downloads the actual trojan virus which encrypts files matching particular extensions.
  • 17. WannaCry or WannaCrypt WannaCry targeted computers running the Microsoft Windows operating system by encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. It includes a ‘transport’ mechanism to automatically spread itself. Organizations that had not installed Microsoft's security update from April 2017 were affected by the attack. the four most affected countries were Russia, Ukraine, India and Taiwan.
  • 18. PROTECTION AGAINST MALWARE  The two most effective ways to fight against malware are: Personal vigilance and protective tools.  Malware security protection provides that second vital layer of protection for your computer or network.  A robust antivirus software package is the primary component of technological defenses that every personal and business computer system should have.  No protection is absolute. But a combination of personal awareness and well-designed protective tools will make your computer as safe as it can be.
  • 19. MALWARE PROTECTION LAWS  The relevant laws in India dealing with protection against malware fall under the following sections of the Indian Information Technology Act, 2000: • Section 72A - deals with punishment for disclosure of information in breach of lawful contract. Simply stated, this section provides for protection against illegal or uninformed release of personal information for wrongful purposes caused due to malware attacks in this case. • Section 43 – deals with penalty and compensation for damage to computer, computer system, etc. This section directly mentions that if anyone introduces or causes to be introduced any computer contaminant or computer virus into any computer, computer system or computer network; is punishable by law.