10 MALWARE AND ATTACK VECTORS AND HOW TO AVOID THEM 1.TROJAN HORSES • At first, we will discuss Trojan horses, it is the most popular type of malware. In this, the attackers pretend this malware as something beneficial, such as a specific offer or present, to infiltrate a computer system so that people would enter it without any hesitation. • Moreover, Trojan Horse malware often shares the same capabilities as other malware counting, spyware, and adware producing tremendous obstacles for the users. There are some features which this malware does if it gets into your system, hence it steals sensitive data, crashes your device, takes your personal information like payment card information. Mainly its blocks your anti-virus software, and thus it slows down your system, and it does not operate properly. Therefore it’s essential to protect your system from this malware. Prevention •A Trojan Horse can only enter a system if the user gives permission. •Therefore it applies false information in downloads during the agreement section. •Thus you should use discretion to withdraw accidental downloading, for example, which could really harm your computer or PC. 2. WORMS • Next, we will discuss the Worm. Usually, it is like a virus in the way which can reproduce itself to affect other computer systems. • But, not similar to a virus, a worm doesn’t require to be connected to a current program or be provoked to perform as we know that a virus needs human interference to enter a file, attachment, or website link while a worm can attach to file by itself and self-grow. Moreover, a worm can reduce bandwidth, install a backdoor or unnecessary programs, and even “eat up” all data files and functioning systems until the drive gets empty. As we have known from the above para that worms don’t need any interference of the user to be issued or proclaimed, thus they are unusually complex to protect against and to get rid of computer systems. Prevention As we all know very well that its prevention is quite complex, but the fact is that you can simply make your PC secure simply by activating the firewall, as it will simply limit or reduce network traffic, particularly the unapproved users. 3. ADWARE • Now, we will discuss Adware, it is one of the types of malware attack that automatically passes notifications to a user to create wealth for its producer. • Adware is mainly used in conjunction with spyware. Thus it can be done with the help of pop-up internet ads or ads inserted in the interface of a program. Not only that even it also collects personal data and information through spyware, and several advertisements can be provided to the users. Thus this malware penetrates the privacy of users and causes interruption of computer functionality and potency. Prevention You can simply prevent this malware by observing the locations from where they are downloading the details because the unknown websites are general territories for adware. 4. CRYPTOJACKING • Next, we have Cryptojacking attack, it is basically a type of malware that utilizes a victim’s computing capability to pit for cryptocurrency . Thus we can say that Cryptojacking is illegal to use someone else’s processor to pit for cryptocurrency. Coin mining malware attack increases by 29%. Hence, hackers do this by both getting the victim to agree on a malicious link in an email that obtains crypto mining code on the computer or by poisoning a website or online ad with JavaScript language that auto-executes once stored in the victim’s browser. Prevention You can prevent Cryptojacking by installing an ad-blocking or anti-crypto mining extensions on your web browsers. Moreover, you should use endpoint security that is proficient in identifying known crypto miners and also keep your web filtering devices up to date and, at last, maintain browser expansions. 5 . S P Y W AR E Then we have Spyware on our list. It is accurately what you would imagine this malware intended to spy on and all collect information about the user. Moreover, it can be practiced to follow and monitor internet activity, find and obtain delicate information, and log keystrokes. Thus if your system grows affected with spyware, then the hacker can gain all the information, payment card information, and the customer profiles of the companies. This liberated activity and information can be exchanged or utilized to harm the affected user. Prevention •There is a pop-up window that can incorporate spyware just by agreeing on the link or window, or by unintentionally installing spyware to the computer. •Thus by withdrawing these links can stop an accidental download. 6. RANSOMWARE After that, we will discuss ransomware, it is a type of malware that can stop users from being able to log into their PC or to have access to their data. It can also delete or distribute data if a payment is not forthcoming. Thus it restricts a user from introducing to a file within encryption. But, hold on, let me clarify one most important thing if you are thinking that once the demanded amount is paid your PC will be unlocked, then you are totally wrong, as there is no guarantee after funding the desired ransom will restore your system and the data. According to the McAfee Labs report, ransomware grows 118% in the year 2019. The ransomware attacks keep on evolving. Most ransomware today falls under two categories:•Locker ransomware – It reduces the entrance to the computer or affected device. •Crypto ransomware – It simply restricts access to files and collecting data. Although malware is continuously growing, therefore, there are simple stretches of ransomware that have been recognized and classified, including Cerber, CTB-Locker, TeslaCrypt, and CryptoWall. Prevention An affected system cannot negotiate data that has remained backed up offline. Therefore, users who encounter a ransomware attack will have a whole unharmed backup of their files, and will not be required to pay the ransom to gain access to their data. 7. MALVERTISING • Next, we will discuss about Malvertising, it is a grip of the malicious advertising, and it is the use of advertising to develop malware. • It usually includes implanting malicious or malware-laden advertisements into authentic advertising networks and webpages. Thus advertising is a great way to expand malware because the meaningful effort is put into ads to create them attractive for the users to sell or advertise commodities. Moreover, Malvertising gain profits from the reliability of the sites it is located on, just like as highprofile and popular news websites. Prevention You can prevent this malware by Security researchers because it advises installing antivirus tools so that you can keep all software updated from time to time, consisting of the operating system, browsers, Java, and Adobe Flash. Moreover, you can achieve more effective protection just by avoiding the use of Flash and Java collectively. 8. BACKDOOR • Next, we have Backdoor, it is a secret method of circumventing standard authentication or encryption in a computer system, embedded device, or other parts of a computer. Backdoors are usually used to achieve remote access to a computer or obtain access to encrypted files. However, it can be utilized to gain access to, fraudulent, delete, or give sensitive data. Backdoors can take the form of a private part of your program, for example, trojan horse, an individual program, or code in firmware and working systems, hence, backdoors is widely known. Prevention For preventing this malware, you must install a compelling antivirus with top-notch malware exposure and blocking abilities, for example, a firewall and a network monitoring tool. 9. ROOTKITS • After that, we will discuss about Rootkit, a combination of malware that is designed to give unlawful access to a computer or area of its software and usually masks its existence or the occurrence of other software. Moreover, Rootkit establishment can be automated, or the antagonist can advance it with official access. Rootkit relocation can be complicated or nearly impossible, particularly when rootkits remain in the kernel, thus firmware rootkits may need hardware replacement or specific equipment. Prevention The best way to prevent Rootkits is to avoid it to prevent from being installed in the first place. 10. BOTS AND BOTNETS At last, we will discuss the bots and botnets, it is basically a computer that is contaminated with malware that enables it to be remotely managed by an attacker. The bot can be used to launch more cyber attacks or convert to a botnet that is a collection of bots. Therefore, botnets are a conventional method for dispersed denial of service that is DDoS attacks, growing ransomware, keylogging, and increasing other types of malware. Prevention There are several things to consider such as Anti-Botnet tools, Software patches, Network monitoring, and user awareness. Identifying Suspicious processes: Rootkits and Trojan attacks CD Bradley Identifying Suspicious processes Exercise It is not always an option to rely on antiviruses and antispyware software. You need to know how to detect and remove unsolicited programs by yourself If you suspect your computer is running malware, you should: • Disconnect it from the network • Identify suspicious processes and drivers • Stop the unwanted programs • Block the unwanted programs from running automatically at system start • Find and delete program files and registry entries made by the programs • Restart the computer and repeat steps 2 to 5 Process Explorer may be helpful in identifying malware Identifying Suspicious processes Exercise: An infected computer runs between 20-40 programmes on average and try to prevent each others removal When you’re on a lookout for unwanted programs, pay attention to processes that: • Lack an icon or have an icon belonging to a different, popular program, Lack a description, Lack a vendor name • Have files that present themselves as Microsoft’s, but don’t have the right signature , Have files stored in the Windows folder • Are compressed or packaged, Have files that contain suspicious strings or URLs, Wait for network connections or exchange data using networks • Hide behind the Svchost.exe or Rundll32.exe processes Identifying the Malware: Process Explorer Removing malware Removing a malicious program starts with stopping it Malicious programs monitor each other’s processes and if they detect one has been stopped, another process will start it again Many unwanted programs modify also other running processes so that they will restart them if they are stopped Rather than stop a process, you should suspend it When you detect and stop the processes of malicious programs, you need to prevent them from starting automatically Removing malware The Msconfig system tool does not monitor all paths, and that is why you need another Sysinternals Suite program, Autoruns, to block unwanted software The last step in the removal procedure is detecting and deleting the programs from the disk and system registry If you cannot delete the unwanted file: • Use Process Explorer to identify and stop the process related to this file and try to delete it again • If that doesn’t work (the file may be protected by a driver or system process) try to change its name or extension. If this works, when you restart the computer you will be able to delete the file • If it doesn’t work, delete the file using MoveFile detecting rootkits A rootkit is a program designed to cloak itself or other objects from users and system administrators Rootkits may be used to hide: •Malware or attacks •Internal system mechanisms •Additional services/ programs • Selected files, folders, • registry keys, • network connections, • user accounts, drivers, etc Rootkit Remover- Bitdefender Anti-Rootkit from MalwareBytes Remediation and Removal Remove any virus from your PC with only 5 in built windows commands Will kill the process, but what’s the issue here? Scenario The bad actor designed a malicious word document. He sent the document via email with a description of “How to prevent Corona-Virus”. When the victim opened it, a file got downloaded in victim’s system by which attacker got a remote shell connection/ RAT. Now victim suspects that he has been hacked. Can he trace and remove the malware from his system? Commands Netstat : Displays all remote IPs that are connected with my PC and used port status. It also shows the corresponding protocol and process ID by which the remote connection is made. Tasklist: Displays information about currently running process in my PC including: process name, PID, memory taken etc. Wmic: Awesome tool; it gives us numerous info about my PC like OS info, file system info, running process info etc. This is depreciated, use powershell <Get CimInstance> then <ClassName Win32_PhysicalMemory | Select-Objectcapacity> Taskkill: Used for stopping any process in command line Findstr: Find any specific string from input taken; used here for filtering output. Web Sites https://whatismyipaddress.com/ https://www.virustotal.com/