0% found this document useful (0 votes)
60 views

Malware Infographics by Slidesgo

Malware analysis involves understanding the behavior and purpose of suspicious files or URLs. It is done through static analysis, dynamic analysis, or hybrid analysis. Static analysis examines code without executing it, while dynamic analysis monitors execution in an isolated sandbox. Malware identification methods include signature-based detection using known malware algorithms/hashes, heuristic analysis examining code for suspicious properties, and behavioral audits observing interactions. Malware can hide in software downloads, email attachments, online ads, infected websites, torrents, fake hotspots, and social media. Warning signs of malware include slow performance, crashes, automatic program opening/closing, and suspicious network/storage activity.

Uploaded by

bhasu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Malware Infographics by Slidesgo

Malware analysis involves understanding the behavior and purpose of suspicious files or URLs. It is done through static analysis, dynamic analysis, or hybrid analysis. Static analysis examines code without executing it, while dynamic analysis monitors execution in an isolated sandbox. Malware identification methods include signature-based detection using known malware algorithms/hashes, heuristic analysis examining code for suspicious properties, and behavioral audits observing interactions. Malware can hide in software downloads, email attachments, online ads, infected websites, torrents, fake hotspots, and social media. Warning signs of malware include slow performance, crashes, automatic program opening/closing, and suspicious network/storage activity.

Uploaded by

bhasu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

MALWARE ANALYSIS

MALWARE

MALWARE ANALYSIS

CONTENT MALWARE IDENTIFICATION METHODS

S
MALWARE PREVENTION

MALWARE HIDING PLACES


MALWARE
• Software that is specifically designed to
gain access to or damage a computer.

• Consists of code developed by cyber


attackers.

• Cybercriminals use it to extract data that


they can leverage over victims for
financial gain.
TYPES

• Virus
• Worms
• Malvertising
• Ransomware
VIRUS

• Malicious piece of computer code


designed to spread from device to device.

• Programmed to harm computer by


damaging programs, deleting files ,
reformatting the hard drive.
WORM

• Type of malware which


spreads copies of itself from
computer to computer.

• Can replicate itself without


any human interaction.
• Used by cybercriminals to inject malicious code into legitimate online
MALVERTISING advertising networks and web pages.

• Typically redirects users to malicious websites or installs malware on

their computers or mobile devices.


RANSOMWAR
E

• Malware that encrypts


a victims files.

• Attacker then demands


ransom from the victim
to restore access to the
data upon payment.
MALWARE
ANALYSIS

• Process of understanding the


behavior and purpose of a
suspicious file or URL.

• Malware samples are analyzed and


determined.

• Done manually by experts.


TYPES

• Static Analysis

• Dynamic Analysis

• Hybrid Analysis
STATIC ANALYSIS
• Process of software debugging without executing the code / program.

• Can be implemented on various representations of program.

• Also called static code analysis.


DYNAMIC ANALYSIS

• Allows malware analyst to monitor


the execution of malware at each
step.

• Dynamic analysis opens and


executes files in an isolated
sandbox environment .
HYBRID ANALYSIS

• Includes both Static


Analysis and Dynamic
Analysis.

• Helps in detecting
unknown threats even
those from the most
sophisticated malware.
STAGES

• Static Properties
Analysis

• Interactive Behaviour
Analysis

• Fully Automated
Analysis

• Manual Code Reversing


CONFIDENTIALITY

• Information is not disclosed to


unauthorized individuals, entities and
process.

• Passwords, encryption,
authentication, and defense against
penetration attacks are used to
ensure confidentiality.
INTEGRITY

• Means maintaining accuracy


and completeness of data.

• Way of implementing security


controls that ensure data
cannot be modified or deleted
by an unauthorized person .
AVAILABILITY

• Means information must be


available when needed.

• Ensuring data availability


means matching network
and computing resources to
the volume of data access.
NON REPUDIATION

• Assurance that someone


cannot deny something.

• Data Integrity and


Authenticity are pre requisites
for Non Repudiation.
AUTHENTICITY
• An integral component of
information security.

• Helps to reduce instances of


fraud by way of
misrepresentation.
ACCOUNTABILIT
Y

• Essential part of an
information security plan.

• Means that it should be


possible to trace actions of
an entity uniquely to that
entity.
MALWARE IDENTIFICATION
METHODS

• Anti Malware Signature

• Heuristic Analysis

• Behavioural Audits
ANTI MALWARE SIGNATURE

• Algorithm / hash that is used


to uniquely identify malware.

• Are representations of
complete files / pieces of
code that have already been
discovered as malicious.

• Commonly used way to


identify malware .
HEURISTIC
ANALYSIS

• Method of detecting viruses


by examining code for
suspicious properties.

• Is a expert based analysis


which determines the
susceptibility of a system .
BEHAVIOURAL AUDITS

• Consist of executing code and


observing its interactions with
the computer / server .

• Performed by a person within a


virtual / sandboxed environment.
MALWARE
PREVENTION

• Install Anti Virus software

• Regularly update software

• Only buy Apps from trusted


sources

• Install Firewall
MALWARE HIDING
PLACES

• In Software Downloads

• In Email Attachments

• In Online Ads

• In Infected Websites

CONT….
MALWARE HIDING
PLACES

• In Torrent Downloads

• In Fake Free Wi-fi Hotspots

• In Pop-ups

• In Social Media Posts &


Messages
• Slow computer

• Blue screen of death


MALWARE WARNING
SIGNS • Programs opening and closing automatically

• Lack of storage space

CONT….
MALWARE WARNING SIGNS
• Suspicious modem and hard drive activity

• Pop-ups, websites, toolbars and other unwanted programs

• Sending out spam


REFERENCE

• https://www.metacompliance.com/blog/what-is-malware-and-
how-to-prevent-against-it/

• https://www.crowdstrike.com/cybersecurity-
101/malware/malware-analysis/
THANK YOU

You might also like