Search

MALWARE THREATS

MALWARE – MALICIOUS SOFTWARE

Malware is nothing but Malicious software created with the intent to damage or disable computer systems, gives limited or full access to the system or network to the attacker who crafted the malware for malicious activities.

TYPES OF MALWARE:

1) VIRUS

2) TROJAN

3) BACKDOOR

4) RANSOMWARE

5) ADWARE

6) ROOT KIT

7) WORMS

8) SPYWARE

9) BOTNET

10) CRYPTER.

POSSIBLE WAYS A MALWARE CAN GET INTO YOUR SYSTEM:

Instant messenger, Removable Devices, Browser & mail bugs, Insecure patch management, Decoy applications, Untrusted Sites, Downloading files from the internet, Email attachments, File sharing services, Installation by other malware, Bluetooth, and wireless networks.

TROJAN: It is a program in which the malicious code is Stuffed inside harmless programming or data to take control. Trojans can be used to Disable firewalls & Antivirus, Create Back-doors, Botnet for DDOS attacks, and Steal credentials.

VIRUS: A virus is a self-replicating program, which will replicate by attaching itself to another program, boot sector, or document, Generally transmitted through file downloads, infected flash drives, and Email Attachments

RANSOMWARE- It’s a type of malware that will encrypt the victim’s machine with some sort of encryption to restrict access to the computer system’s profile and demands Ransom to remove the Restriction and encryption.

WORMS- Worms are Programs that replicate, execute, and spread across the network connections independently, These worms are used to Corrupt files, backdoors, and zombies for creating botnets to carry further cyber attacks.

BACKDOORS:- It is a program to gain access to the system by bypassing the security systems of a computer or network to have uninterrupted access to the target machine.

BOTNET:- It is a program to compromise a large number of systems to create a network of bots that are controlled through a common command center, which can be used for further attacks.

ROOTKITS: Rootkits are powerful backdoors that especially attack the root or operating system, compared with backdoors, rootkits cannot be detected by observing services or registries.

ADWARE:- Adware will Pop up or push an Advertisement to trick the user to click on a malicious link to gain access to the system or network.

SPYWARE:- Spyware is used to spy on the Activities, Processes, information, and Manipulation which is happening in a system or network. Parents are using these to monitor their kid’s Computers to keep an eye on them.

COUNTERMEASURES: Avoid Unknown Senders, Avoid Untruthful sources, Avoid Untrusted applications, Use Updated Anti-Malware tools, Scan for Malware once a week, Don’t visit untrusted websites, Run disk clean-up and registry scanner once a week.

For Suspected Applications, we can do Malware Analysis to find out if the application is infectious or not.

Let’s see how to do Malware analysis in the upcoming Blog Posts.

Until then bye bye!!.

Table of Contents

Social Media
Facebook
Twitter
WhatsApp
LinkedIn