Uploaded by 452Tarani

malware concept

advertisement
While viruses and bugs used previous methods, today's
malware is designed to attack cutting tools and make them more deadly. How did
Malware get into your system?
Malware exploits operating system vulnerabilities and vulnerabilities
, or vulnerabilities exposed by deliberate clicking on malicious links.
A malware program starts running before the malware distributes itself to the system.
How to avoid bad software?
▪ Make sure the operating system is up to date.
▪ Update all apps.
▪ Do not click on inappropriate or incorrect links.
Chapter 01: Threats, Attacks, and Vulnerabilities
36
 Use antivirus/antimalware software.
Ransomware
Ransomware is a malware program that uses
encryption to restrict access to system files and folders.
Some types of ransomware can freeze the system. When a
system is encrypted, it needs a decryption key to unlock it and its data. The attacker
then demands a ransom payment before providing the decryption key to remove the
restriction. Online payments using hard-to-fly currencies such as
Ukash and Bitcoin are used to hold the ransom. Ransomware is usually sent using the
Trojan.
One of the best examples of ransomware is the WannaCry Ransomware
attack.
The most common and well-known types of ransomware are:
 Cryptobit Ransomware
 CryptoLocker Ransomware
 CryptoDefense Ransomware
 CryptoWall Ransomware
 Police-themed 4 4 Examples 4 4 Ransomware 4 Crypto-Locker
Trojan 44 44 All Users are real Malicious programs that deceive you about your needs are
classified as
Trojans. Social engineering is often a Trojan horse. The most common
Trojans are:
Creating backdoors
Gaining unauthorized access
Stealing information
Linked viruses
Ransomware attacks
Using victims to send spam
Users Abused as Botnet 444 additional malware
Trojan Types
▪ Command Shell Trojans
Command Shell Trojans are well known as long as they stay away from the victim's command
shell
.
Command shell Trojans server-side, for example Netcat, are installed on the target machine.
The Trojan server will open a shell command bound to port
Chapter 01: Threats, Attacks and Vulnerabilities
37
User application installed on the attacker's machine. This client-server based
Trojan provides command line access.
▪ Defacement Trojan
An attacker can use Defacement Trojan to access, modify, and delete data from any Windows
program
. Attackers often replace
strings, images, and symbols with this information to get rid of their characters. An attacker
compromised application
using a user-style application protocol (UCA).
The site of destruction is very common and
is well known; It is similar to the concept of an application running on the target machine.
 HTTP/HTTPS Trojans
HTTP and HTTPS Trojans bypass firewalls and attack target computers. After
is complete, they create an HTTP/HTTPS tunnel from the victim's computer to interact with
the attacker
.
 Botnet Trojans
The number of attacked machines is called botnet (zombie). This
error is not limited to a single LAN; they can be found all over the world.
Command and control centers are responsible for these botnets. These bot networks are used by
to perform denial of service (DoS), spam, and other attacks.
 Proxy Server Trojan
Trojan-Proxy Server is a program virus that can turn your computer into a
proxy server. The nameserver Trojan activates the nameserver on the victim's computer,
allowing an attacker to use the victim's
computer as a proxy. This method is used by
to kill additional attacks while hiding the true nature of the attack.
▪ Remote Access Trojan (RAT)
RAT (Remote Access Trojan) allows an attacker to gain remote access to the victim's
machine through ports that allow GUI remote access. The
RAT has a backbone to control access and control
victims. Using RAT, attackers can monitor user activities, access confidential information
and files, take photos, record audio and video from webcams, change file paper and
drive type, and more.
How can I prevent this malware?
▪ The software must be tested before installation.
Only install trusted ones.
▪ You need to backup your data.
▪ You must update your antivirus software and functionality.
Trojan Exploit Tool The
Trojan Exploit Tool allows attackers to create their own Trojans. If Backfired, This
Custom Trojan Could Be More Dangerous to Targets and Attackers
Download