Unit 3 - Viruses and Malware Assignment

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 12

Viruses and

Malware
Assignment
By
Osa Omoigui
01 What is a computer risk?
COMPUTER RISK
A Computer risk, is software that is installed onto someone’s computer that can cause serious damage to it and cause
multiple problems for the user. This software’s is unwillingly/unknowingly implanted into the user’s computer by
malicious sources that aim to use this information to benefit themselves, even if it’s to the user’s dismay.

HOW IT’S POSSIBLE


The ways in which one gains access to another person’s computer is through malware (malicious software), examples of
malware include viruses, trojan horses, adware, ransomware, rootkits, spyware, and worms. Common targets for
these attacks range from your average joe multi-million dollar companies and sometimes even governments.

WHAT DOES IT DO
Malware disrupts the computer and network when it is installed into the victim’s system without their knowledge.
When it is installed it is capable of troublesome actions in order to complete their mission. These actions include but
are not limited to:

● Changing the computer’s configuration https://www.youtube.com/watch?


● Deleting files/ corrupting hard drive v=MvFxXwBItjo
● Stealing sensitive information
What is Social Engineering /
02
Phishing
S ocial Engineering is both a powerful and common method of
malware attacks because it has a high success rate and is easy to do. By
avoiding the hustle and bustle of security systems, and cutting out the
middle man, the scammers extract sensitive information through the user
directly, exploiting their gulibility by physcological manipulation and
having of a silver tongue. The attacker pretends to provide some sort of
service to the user which requires compliance and trust from the victim,
persuade the victim into doing something that they don’t know will harm
them, or giving out sensitive information. In addition, this method is even
more effective when used in conjunction with other network attacks (ex.
Telling someone to click on a link which is actually a disguised virus).
Phishing is a non direct approach similar to social engineering but it
mainly deals with emailing, and getting the victim to click on a link which
is potrayed to be real. This technique is especially problematic for
companies and business because of their employees, improper training for
just one employee, can lead to them making terrible mistakes that could
create possible ransom attacks. Finally, phishing can be seen in the modern
day with crypto/NFT holders getting their accounts hacked, and assets
stolen by clicking illegitimate links, or making an insecure transaction.
https://www.youtube.com/watch?
v=lc7scxvKQOo
0 What is a virus?

3
A computer virus is a malicious program that
has the capacity to duplicate itself without the
permission of the user. It can attach to
documents, code, and other files aswell. Thus
when you have have a virus it is common that
when you try to open a application, you will
receive dozens of pop-ups, or the application
won’t open at all, it is because it is already
corrupted. Viruses can spread from computer
to computer via advertisements, emails, and
downloading from sketchy websites. Once a
virus is activated from being dormant, it can
gain control of both your system and your
information. It can also cause harm to other
files / programs.

SYMPTOMPS:
- Slow response times
- Random hard drive crashes
- Pop-up ads

(All the pop-ups you’ll be getting)


MY.DOOM
My doom was a problematic virus back in 2004, which spread
by attaching itself to emails and sending copies to people in
your address book. It is responsible for web speeds being cut
by 50% across the world caused by Denial-of-Service attacks.
It operated by targeting a backdoor on port 3127 on unpatched
versions of Microsoft Windows. It’s main target was SCO, but
Microsoft was attacked aswell. It is known for being the
fastest-spreading email worm of all time.

FUN FACTS
(Youtube llink)
- At its peak, it was sent to 1/12 emails sent.
- Blocked companies from accessing their websites.
- Shut down google for one day.
- Cost 38.4B dollars in damages.
04 What is a trojan horse?
STORM WORM
A trojan horse is a faulty code / software that
disguises itself as harmless and helpful when in
reality it is capable of doing serious damage to your Affects
system or network, such as such as damaging Storm Worm would affect millions of computers by sending copious amounts
of spam mail which led to virus infected websites.
stealing or disrupting info and programs on your
system. It is capable of doing such damage because
of the high privileges and authority the victim
unknowingly grants the malware. They are hard to What Damage Did It Do
Storm Worm turned around 5-50 million computers into zombies, it is not
detect because of the resources they were given.This known how much damage was done financially.
malware is named trojan horse because it usually
comes in the form of something that does not seem
suspicious. Such as the horse gifted by the greeks How did it Work?
that was used to infiltrate troy, the virus usually It opens a backdoor in the computer which allows remote control, while also
comes in the form of an email, that conceals the installing a rootkit that hides the malicious program.
virus.

Creator/Motive
The Storm Worm was traced back to Russian hackers, that were motivated
by money. Researchers have concluded that a Russian hacker group in St.
Petersburg were behind Storm.
04 What is a Rootkit
A Rootkit is a collection of malware that is hidden deep within the
operating system of a computer. It changes code and data structures
of the operating system to enact damage by altering the firewalls,
antivirus protection, and system files, thought its main purpose is to
provide the hacker with administrative access to the systesm. It also
changes the ouput so that traces of the malware can not be noticed, it
can conceal the presence of other program and malware aswell.
Though similar, a Trojan Horse virus and a Rookit differentiate in
that a Trojan horse’s main objective is not to provide the hacker with
administrative protocol. Finally, because removal of a rootkit with an
anti-virus program is close to impossible, specialized rootkit removal
skills will required but a complete system re-install also works.
Sony Rootkit
Social Engineering is both a powerful and common method of
02
FEATURES OF
THE TOPIC
You can enter a subtitle if you
need it
Sony Rootkit
ALTERNATIVE RESOURCES

You might also like