Malware
Malware
Mains 2024
Computer Awareness
Malware
By : Kavita Negi
1
Malware
• Viruses : A computer virus infects devices and replicates itself across systems. Viruses require human
intervention to propagate. Viruses can modify computer functions and applications; copy, delete and
exfiltrate data etc.
• Worm : A computer worm self-replicates and infects other computers without human intervention. This
malware inserts itself in devices via security vulnerabilities or malicious links or files. Worms often go
unnoticed by users, usually disguised as legitimate work files.
• Ransomware : Ransomware locks or encrypts files or devices and forces victims to pay a ransom in
exchange for reentry.
• Trojan horses : A Trojan horse is malicious software that appears legitimate to users. Trojans rely on
social engineering techniques to invade devices.
• Keyloggers : A keylogger is surveillance malware that monitors keystroke patterns. Threat actors use
keyloggers to obtain victims' usernames and passwords and other sensitive data.
Malware
• Spyware : Spyware is malware that downloads onto a device without the user's knowledge. It steals
users' data to sell to advertisers and external users. Spyware can track credentials and obtain bank details
and other sensitive data.
• Adware : Adware is software that displays or downloads unwanted advertisements, typically in the
form of banners or pop-ups. It collects web browser history and cookies to target users with specific
advertisements.
• Rootkit : A rootkit is a type of malware designed to give hackers access to and control over a target
device. Once they gain unauthorized access to computers, rootkits enable cybercriminals to steal
personal data and financial information, install malware or use computers as part of a botnet to circulate
spam and participate in DDoS (distributed denial of service) attacks.
• Logic Bomb : A logic bomb is a piece of malware that’s designed to execute when certain conditions
are met. Logic bombs don’t execute initially.
Malware
• Time Bomb : A time bomb is a piece of malware that’s designed to execute at a predetermined time.
• Sniffing : Sniffing is a process of monitoring and capturing all data packets passing through given
network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic.
Attackers use sniffers to capture data packets containing sensitive information such as password,
account information etc.
• Phishing : Phishing is when attackers send scam emails (or text messages) that contain links to
malicious websites. The websites may contain malware (such as ransomware) which can sabotage
systems and organisations.
Malware
• Smishing : Smishing is a social engineering attack that uses fake mobile text messages to trick people
into downloading malware, sharing sensitive information or sending money to cybercriminals.
The term “smishing” is a combination of “SMS”—or “short message service,” the technology behind
text messages—and “phishing.”
• Vishing : Vishing, short for voice phishing, uses fraudulent phone calls to trick victims into providing
sensitive information, like login credentials, credit card numbers, or bank details.
• Firewall : A firewall is a network security device that prevents unauthorized access to a network.
Firewall is combination of Hardware and Software.
• Anti Virus : Antivirus software (antivirus program) is a security program designed to prevent, detect,
search and remove viruses. Once installed, most antivirus software runs automatically in the background
to provide real-time protection against virus attacks.
• Encryption tool : An Encryption Tool is a software application that is designed to hide data by
rendering it unreadable without the proper keys or passwords.
• Strong Password
Key Points
❑ First Ransomware : AIDS Trojan
• year : 1989
• Launch by : Joseph L. Popp
• Other example of ransomware : WannaCry, Locky, CryptoWall etc
• Software that tries users to buy a program or service by making pop-ups : Nagware
• The act of disguising a communication from an unknown source as being from, trusted source : Spoofing
• Type of hackers, also known as crackers, hack to gain unauthorised access to a system and harm its
operations or steal sensitive information : Black Hat Hacker
Share your feedback with us at
[email protected]