SlideShare ist ein Scribd-Unternehmen logo
1 von 22
MALWARE Different types of malware
Types of Malware Analysis
MALWARE
“Malware” is short for “malicious software”
computer programs designed to infiltrate and damage
computers without the user’s consent
“Malware” is the general term covering all the different
types of threats to your computer safety such as
viruses, spyware, worms, trojans, rootkits and so on
Today many experts believe the amount of malicious
software being released on the web might actually
surpass the release of valid software.
MALWARE SYMPTOMS
•Increased CPU usage
•Slow computer or web browser speeds
•Problems connecting to networks
•Freezing or crashing
•Modified or deleted files
•Appearance of strange files, programs, or desktop icons
•Programs running, turning off, or reconfiguring themselves (malware will often
reconfigure or turn off antivirus and firewall programs)
•Strange computer behavior
WHAT DIFFERENT TYPES OF
MALWARE ?
DIFFERENT TYPES OF MALWARE
1. Virus
2. Worm.
3. Trojan Horse.
4. Spyware.
5. Adware.
6. Ransomware.
7. Rootkits
8. Keyloggers
9. Bot Net
10. Bugs
DIFFERENT TYPES OF MALWARE
Viruses and worms – the
contagious threat
Trojans and Rootkits – the
masked threat
Spyware and keyloggers – the
financial threat
1.VIRUS
Viruses are designed to damage the target computer or device by
corrupting data, reformatting your hard disk, or completely shutting down
your system. They can also be used to steal information, harm computers
and networks, create botnets, steal money, render advertisements, and
more.
Computer viruses require human action to infect computers and mobile
devices and are often spread through email attachments and internet
downloads.
Eg : I love you
Nimnda
Tinba
Conficker
2.WORM
One of the most common types of malware, worms spread over computer
networks by exploiting operating system vulnerabilities. A worm is a
standalone program that replicates itself to infect other computers, without
requiring action from anyone.
Since they can spread fast, worms are often used to execute a payload—a
piece of code created to damage a system. Payloads can delete files on a
host system, encrypt data for a ransomware attack, steal information, delete
files, and create botnets.
eg: Morris Worm
Storm Worm
3.TROJAN HORSE
A Trojan horse, or “Trojan”, enters your system disguised as a normal,
harmless file or program designed to trick you into downloading and
installing malware.
As soon as you install a Trojan, you are giving cyber criminals access to
your system.
Through the Trojan horse, the cyber criminal can steal data, install more
malware, modify files, monitor user activity, destroy data, steal financial
information, conduct denial of service (DoS) attacks on targeted web
addresses, and more.
Trojan malware cannot replicate by itself; however, if combined with a
worm, the damage Trojans can have on users and systems is endless.
4.SPYWARE
Installed on your computer without your knowledge, spyware is designed to
track your browsing habits and internet activity.
 Spying capabilities can include activity monitoring, collecting keystrokes,
and harvesting of account information, logins, financial data, and more.
Spyware can spread by exploiting software vulnerabilities, bundling with
legitimate software, or in Trojans.
Eg: CoolWebSearch
Gator
Zlob
5.ADWARE
Adware is often known for being an aggressive advertising software that
puts unwanted advertising on your computer screen.
Malicious adware can collect data on you, redirect you to advertising sites,
and change your internet browser settings, your default browser and search
settings, and your homepage.
Legitimate adware does exist, but it will ask your permission first before
collecting data about you.
Eg: ClickDownloader
7search
6.RANSOMWARE
According to Cybersecurity Ventures, cybercrime is predicted to cost the world 6
trillion dollars annually by 2021.
Because ransomware generates so much money for cybercriminals, it is the type of
malware
Ransomware is a type of malware that holds your data captive and demands
payment to release the data back to you.
It restricts user access to the computer by either encrypting files on the hard drive or
locking down the system and displaying messages that are intended to force the
user to pay the attacker to release the restrictions and regain access to the
computer.
Once the attacker is paid, your system and data will usually go back to its original
state.
Eg : WannaCry, Locky, Bad Rabbit.
7.ROOTKITES
A root kit is software that gives malicious actors remote control of a victim’s
computer with full administrative privileges.
Rootkits can be injected into applications, kernels, hypervisors, or firmware.
They spread through phishing, malicious attachments, malicious
downloads, and compromised shared drives. Rootkits can also be used to
conceal other malware, such as keyloggers.
eg: Knark, Adore, Rkit and Da IOS
8.KEYLOGGERS
A keylogger is a type of spyware that monitors user activity.
Keyloggers have legitimate uses; businesses can use them to monitor
employee activity and families may use them to keep track of children’s
online behaviors.
when installed for malicious purposes, keyloggers can be used to steal
password data, banking information and other sensitive information.
Keyloggers can be inserted into a system through phishing, social
engineering or malicious downloads.
Eg: Software Keyloggers, hardware keyloggers
9.BOT/BOTNETS
A bot is a software application that performs automated tasks on
command.
They’re used for legitimate purposes, such as indexing search engines,
But when used for malicious purposes, they take the form of self-
propagating malware that can connect back to a central server.
Usually, bots are used in large numbers to create a botnet , which is a
network of bots used to launch broad remotely-controlled floods of attacks,
such as DDoS attacks. Botnets can become quite expansive.
eg: Mirai IoT botnet ranged from 800,000 to 2.5M computers.
10.BUG
 bug is an error, flaw or fault in a computer program or system that causes
it to produce an incorrect or unexpected result, or to behave in unintended
ways.
Most bugs arise from mistakes and errors made in either a
program's design or its source code, or in components and operating
systems used by such programs
A few are caused by compilers producing incorrect code. A program that
contains many bugs, and/or bugs that seriously interfere with its functionality,
is said to be buggy (defective)
TYPES OF MALWARE ANALYSIS
1.Static Analysis
2.Dynamic Analysis
3.Threat Analysis
1. STATIC ANALYSIS
Static Analysis also called static code analysis, is a process of
software debugging without executing the code or program.
The techniques of static malware analysis can be implemented on
various representations of a program
The techniques and tools instantaneously discover whether a file is
of malicious intent or not
Then the information on its functionality and other technical
indicators help create its simple signatures
The source code will help static analysis tools in finding memory
corruption flaws and verify the accuracy of models of the given
system
2. DYNAMIC ANALYSIS
The dynamic analysis runs malware to examine its behavior, learn its
functionality and recognize technical indicators
When all these details are obtained, they are used in the detection
signatures
The technical indicators exposed may comprise of IP addresses,
domain names, file path locations, additional files, registry keys,
found on the network or computer. Additionally, it will identify and
locate the communication with the attacker-controlled external server
The intention to do so may involve in zeroing in on the command
and control purposes or to download additional malware files. This
can be related to many of the common dynamic malware or
automated sandbox analysis engines perform today.
3. THREAT ANALYSIS
The threat analysis is an ongoing process that helps identify
exemplars of malicious software
Hackers regularly reinstating network infrastructure, it is obvious to
lose sight of the tools constantly being used and updated by these
various actors.
Beginning with malicious program family analysis, this process is
centered on mapping vulnerabilities, exploits, network infrastructure,
additional malware, and adversaries.
ANY QUERIES ?
THANK YOU !

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

spyware
spywarespyware
spyware
 
Spyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasmeSpyware presentation by mangesh wadibhasme
Spyware presentation by mangesh wadibhasme
 
Spyware report
Spyware reportSpyware report
Spyware report
 
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security ThreatsSophos Threatsaurus: The A-Z of Computer and Data Security Threats
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
 
Malware & Anti-Malware
Malware & Anti-MalwareMalware & Anti-Malware
Malware & Anti-Malware
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
computer virus ppt.pptx
computer virus ppt.pptxcomputer virus ppt.pptx
computer virus ppt.pptx
 
Introduction to Malware
Introduction to MalwareIntroduction to Malware
Introduction to Malware
 
Spyware
SpywareSpyware
Spyware
 
Malware and it's types
Malware and it's typesMalware and it's types
Malware and it's types
 
Spyware by Sahibe Alam
Spyware by Sahibe AlamSpyware by Sahibe Alam
Spyware by Sahibe Alam
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
TIC
TICTIC
TIC
 
spyware
spywarespyware
spyware
 
MALWARE
MALWAREMALWARE
MALWARE
 
Virus
VirusVirus
Virus
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 

Ähnlich wie Type of Malware and its different analysis and its types !

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docxSarahReese14
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementMuhammad FAHAD
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)SHUBHA CHATURVEDI
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES Sagilasagi1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESShyam Kumar Singh
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptxPragatiKachhi1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Computer virus
Computer virusComputer virus
Computer virussajeena81
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicpiyushkamble6
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptxLakshayNRReddy
 

Ähnlich wie Type of Malware and its different analysis and its types ! (20)

viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
SECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURESSECURITY THREATS AND SAFETY MEASURES
SECURITY THREATS AND SAFETY MEASURES
 
computer security
computer securitycomputer security
computer security
 
Computer Virus ppt.pptx
Computer Virus ppt.pptxComputer Virus ppt.pptx
Computer Virus ppt.pptx
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer virus
Computer virusComputer virus
Computer virus
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Know More about Your Enemies
Know More about Your EnemiesKnow More about Your Enemies
Know More about Your Enemies
 

Kürzlich hochgeladen

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 

Kürzlich hochgeladen (20)

Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 

Type of Malware and its different analysis and its types !

  • 1. MALWARE Different types of malware Types of Malware Analysis
  • 2. MALWARE “Malware” is short for “malicious software” computer programs designed to infiltrate and damage computers without the user’s consent “Malware” is the general term covering all the different types of threats to your computer safety such as viruses, spyware, worms, trojans, rootkits and so on Today many experts believe the amount of malicious software being released on the web might actually surpass the release of valid software.
  • 3. MALWARE SYMPTOMS •Increased CPU usage •Slow computer or web browser speeds •Problems connecting to networks •Freezing or crashing •Modified or deleted files •Appearance of strange files, programs, or desktop icons •Programs running, turning off, or reconfiguring themselves (malware will often reconfigure or turn off antivirus and firewall programs) •Strange computer behavior
  • 4. WHAT DIFFERENT TYPES OF MALWARE ?
  • 5. DIFFERENT TYPES OF MALWARE 1. Virus 2. Worm. 3. Trojan Horse. 4. Spyware. 5. Adware. 6. Ransomware. 7. Rootkits 8. Keyloggers 9. Bot Net 10. Bugs
  • 6. DIFFERENT TYPES OF MALWARE Viruses and worms – the contagious threat Trojans and Rootkits – the masked threat Spyware and keyloggers – the financial threat
  • 7. 1.VIRUS Viruses are designed to damage the target computer or device by corrupting data, reformatting your hard disk, or completely shutting down your system. They can also be used to steal information, harm computers and networks, create botnets, steal money, render advertisements, and more. Computer viruses require human action to infect computers and mobile devices and are often spread through email attachments and internet downloads. Eg : I love you Nimnda Tinba Conficker
  • 8. 2.WORM One of the most common types of malware, worms spread over computer networks by exploiting operating system vulnerabilities. A worm is a standalone program that replicates itself to infect other computers, without requiring action from anyone. Since they can spread fast, worms are often used to execute a payload—a piece of code created to damage a system. Payloads can delete files on a host system, encrypt data for a ransomware attack, steal information, delete files, and create botnets. eg: Morris Worm Storm Worm
  • 9. 3.TROJAN HORSE A Trojan horse, or “Trojan”, enters your system disguised as a normal, harmless file or program designed to trick you into downloading and installing malware. As soon as you install a Trojan, you are giving cyber criminals access to your system. Through the Trojan horse, the cyber criminal can steal data, install more malware, modify files, monitor user activity, destroy data, steal financial information, conduct denial of service (DoS) attacks on targeted web addresses, and more. Trojan malware cannot replicate by itself; however, if combined with a worm, the damage Trojans can have on users and systems is endless.
  • 10. 4.SPYWARE Installed on your computer without your knowledge, spyware is designed to track your browsing habits and internet activity.  Spying capabilities can include activity monitoring, collecting keystrokes, and harvesting of account information, logins, financial data, and more. Spyware can spread by exploiting software vulnerabilities, bundling with legitimate software, or in Trojans. Eg: CoolWebSearch Gator Zlob
  • 11. 5.ADWARE Adware is often known for being an aggressive advertising software that puts unwanted advertising on your computer screen. Malicious adware can collect data on you, redirect you to advertising sites, and change your internet browser settings, your default browser and search settings, and your homepage. Legitimate adware does exist, but it will ask your permission first before collecting data about you. Eg: ClickDownloader 7search
  • 12. 6.RANSOMWARE According to Cybersecurity Ventures, cybercrime is predicted to cost the world 6 trillion dollars annually by 2021. Because ransomware generates so much money for cybercriminals, it is the type of malware Ransomware is a type of malware that holds your data captive and demands payment to release the data back to you. It restricts user access to the computer by either encrypting files on the hard drive or locking down the system and displaying messages that are intended to force the user to pay the attacker to release the restrictions and regain access to the computer. Once the attacker is paid, your system and data will usually go back to its original state. Eg : WannaCry, Locky, Bad Rabbit.
  • 13. 7.ROOTKITES A root kit is software that gives malicious actors remote control of a victim’s computer with full administrative privileges. Rootkits can be injected into applications, kernels, hypervisors, or firmware. They spread through phishing, malicious attachments, malicious downloads, and compromised shared drives. Rootkits can also be used to conceal other malware, such as keyloggers. eg: Knark, Adore, Rkit and Da IOS
  • 14. 8.KEYLOGGERS A keylogger is a type of spyware that monitors user activity. Keyloggers have legitimate uses; businesses can use them to monitor employee activity and families may use them to keep track of children’s online behaviors. when installed for malicious purposes, keyloggers can be used to steal password data, banking information and other sensitive information. Keyloggers can be inserted into a system through phishing, social engineering or malicious downloads. Eg: Software Keyloggers, hardware keyloggers
  • 15. 9.BOT/BOTNETS A bot is a software application that performs automated tasks on command. They’re used for legitimate purposes, such as indexing search engines, But when used for malicious purposes, they take the form of self- propagating malware that can connect back to a central server. Usually, bots are used in large numbers to create a botnet , which is a network of bots used to launch broad remotely-controlled floods of attacks, such as DDoS attacks. Botnets can become quite expansive. eg: Mirai IoT botnet ranged from 800,000 to 2.5M computers.
  • 16. 10.BUG  bug is an error, flaw or fault in a computer program or system that causes it to produce an incorrect or unexpected result, or to behave in unintended ways. Most bugs arise from mistakes and errors made in either a program's design or its source code, or in components and operating systems used by such programs A few are caused by compilers producing incorrect code. A program that contains many bugs, and/or bugs that seriously interfere with its functionality, is said to be buggy (defective)
  • 17. TYPES OF MALWARE ANALYSIS 1.Static Analysis 2.Dynamic Analysis 3.Threat Analysis
  • 18. 1. STATIC ANALYSIS Static Analysis also called static code analysis, is a process of software debugging without executing the code or program. The techniques of static malware analysis can be implemented on various representations of a program The techniques and tools instantaneously discover whether a file is of malicious intent or not Then the information on its functionality and other technical indicators help create its simple signatures The source code will help static analysis tools in finding memory corruption flaws and verify the accuracy of models of the given system
  • 19. 2. DYNAMIC ANALYSIS The dynamic analysis runs malware to examine its behavior, learn its functionality and recognize technical indicators When all these details are obtained, they are used in the detection signatures The technical indicators exposed may comprise of IP addresses, domain names, file path locations, additional files, registry keys, found on the network or computer. Additionally, it will identify and locate the communication with the attacker-controlled external server The intention to do so may involve in zeroing in on the command and control purposes or to download additional malware files. This can be related to many of the common dynamic malware or automated sandbox analysis engines perform today.
  • 20. 3. THREAT ANALYSIS The threat analysis is an ongoing process that helps identify exemplars of malicious software Hackers regularly reinstating network infrastructure, it is obvious to lose sight of the tools constantly being used and updated by these various actors. Beginning with malicious program family analysis, this process is centered on mapping vulnerabilities, exploits, network infrastructure, additional malware, and adversaries.