Malware - Himani
Malware - Himani
Malware - Himani
Usage of Malware
• Many early infectious programs, including the first Internet Worm, were written as
experiments or pranks.
• Steal sensitive personal, financial, or business information for the benefit of
others.
• Used broadly against government or corporate websites to gather guarded
information, or to disrupt their operation in general.
• Used against individuals to gain personal information such as social security
numbers, bank or credit card numbers, and so on.
Types of Malware
• Must be triggered or somehow executed before it can infect your computer system
and spread to others.
• Distributed:
a) Social network b) Pirated software c) Removable media d) Emails e) Websites
Damages
1. Data Loss
• Many viruses and Trojans will attempt to delete files or wipe hard drives when
activated, but even if you catch the infection early, you may have to delete infected files.
2. Account Theft
• Many types of malware include keylogger functions, designed to steal accounts and
passwords from their targets.
• This can give the malware author access to any of the user's online accounts, including
email servers from which the hacker can launch new attacks.
3. Botnets.
• Many types of malware also subvert control over the user's computer, turning it into a
"bot" or "zombie."
• Hackers build networks of these commandeered computers, using their combined
processing power for tasks like cracking password files or sending out bulk emails.
4. Financial Losses
• If a hacker gains access to a credit card or bank account via a keylogger, he can then use
that information to run up charges or drain the account.
Symptoms
Anti-Malware Program
Future Threats
CYBERSPACE
Attack on Estonia
Attacked parliament, ministries, banks, newspapers, and other websites were
attacked by Denial of Service Attacks.
Major infrastructures attacked - Stuxnet Virus
Japan’s Defense Contractors - Zeus Malware
Obama almost started a Cyberware in Libya.