MALWARE THREATS

MALWARE – MALICIOUS SOFTWARE

Malware is nothing but a Malicious software created with an intent to Damage or Disables the computer systems, gives limited or full access of the system or network to the attacker who crafted the malware for malicious activities.

TYPES OF MALWARES: 1) VIRUS 2) TROJAN 3)BACKDOOR 4) RANSOMWARE 5) ADWARE 6)ROOT KIT 7)WORMS 8)SPYWARE 9)BOTNET 10) CRYPTER.

POSSIBLE WAYS A MALWARE CAN GET INTO YOUR SYSTEM:

Instant messenger, Removable Devices, Browser & mail bugs, Insecure patch management, Decoy applications, Untrusted Sites, Downloading files from internet, Email attachments, File sharing services, Installation by other malware, Bluetooth and wireless networks.

TROJAN : It is a program in which the malicious code Stuffed inside harmless programming or data to take control. Trojans can be used to Disable firewall & Antivirus, Creating Back-doors, Botnet for DDOS attacks, Stealing Credential.

VIRUS:- A virus is a self-replicating program, which will replicate by attaching itself to another program, boot sector or document, Generally transmitted through file downloads, infected flash drives, and Email Attachments

RANSOMWARE:- It’s a type of malware which will encrypt the victim’s machine with some sort of encryption to restrict access to the computer system’s profile and demands for Ransom to remove the Restriction and encryption.

WORMS:- Worms are Programs which replicate, execute, and spread across the network connections independently, These worms are used to Corrupt files, Backdoor, and zombies for creating botnet to carry further cyber attacks.

BACKDOORS:- It is a program to gain access to the system by bypassing security systems of a computer or network to have an uninterrupted access to the target machine.

BOTNET:- It is a program to compromise large number of systems to create a network of bots that is controlled through a common command center, which can be used for further attacks.

ROOTKITS: Rootkits are powerful backdoors that specially attack the root or operating system, compared with backdoor, rootkits cannot be detected by observing services or registries.

ADWARE:- Adware will Pop up or push an Advertisement to trick the user to click into a malicious link to gain access to the system or network.

SPYWARE:- Spyware is used to spy the Activities, Processes, information, Manipulation which is happening in a system or network. Parents are using these to monitor their kids Computer to keep an eye on them.

COUNTERMEASURES: Avoid Unknown Senders, Avoid Untruthful sources, Avoid Untrusted applications, Use Updated Anti-Malware tools, Scan for Malware once in a week, Don’t visit untrusted websites, Run disk clean-up and registry scanner once a week.

For Suspected Applications we can do Malware Analysis to find out the application is infectious or not.

Let’s see how to do Malware analysis in the upcoming Blog Posts.

Until then bye bye!!.

2 thoughts on “MALWARE THREATS”

  1. Pingback: MALWARE ANALYSIS – PART 1 – Blog | Securium Solutions

  2. Pingback: Malware Analysis – For Beginners – Blog | Securium Solutions

Leave a Comment

Your email address will not be published. Required fields are marked *