While viruses and bugs used previous methods, today's malware is designed to attack cutting tools and make them more deadly. How did Malware get into your system? Malware exploits operating system vulnerabilities and vulnerabilities , or vulnerabilities exposed by deliberate clicking on malicious links. A malware program starts running before the malware distributes itself to the system. How to avoid bad software? ▪ Make sure the operating system is up to date. ▪ Update all apps. ▪ Do not click on inappropriate or incorrect links. Chapter 01: Threats, Attacks, and Vulnerabilities 36 Use antivirus/antimalware software. Ransomware Ransomware is a malware program that uses encryption to restrict access to system files and folders. Some types of ransomware can freeze the system. When a system is encrypted, it needs a decryption key to unlock it and its data. The attacker then demands a ransom payment before providing the decryption key to remove the restriction. Online payments using hard-to-fly currencies such as Ukash and Bitcoin are used to hold the ransom. Ransomware is usually sent using the Trojan. One of the best examples of ransomware is the WannaCry Ransomware attack. The most common and well-known types of ransomware are: Cryptobit Ransomware CryptoLocker Ransomware CryptoDefense Ransomware CryptoWall Ransomware Police-themed 4 4 Examples 4 4 Ransomware 4 Crypto-Locker Trojan 44 44 All Users are real Malicious programs that deceive you about your needs are classified as Trojans. Social engineering is often a Trojan horse. The most common Trojans are: Creating backdoors Gaining unauthorized access Stealing information Linked viruses Ransomware attacks Using victims to send spam Users Abused as Botnet 444 additional malware Trojan Types ▪ Command Shell Trojans Command Shell Trojans are well known as long as they stay away from the victim's command shell . Command shell Trojans server-side, for example Netcat, are installed on the target machine. The Trojan server will open a shell command bound to port Chapter 01: Threats, Attacks and Vulnerabilities 37 User application installed on the attacker's machine. This client-server based Trojan provides command line access. ▪ Defacement Trojan An attacker can use Defacement Trojan to access, modify, and delete data from any Windows program . Attackers often replace strings, images, and symbols with this information to get rid of their characters. An attacker compromised application using a user-style application protocol (UCA). The site of destruction is very common and is well known; It is similar to the concept of an application running on the target machine. HTTP/HTTPS Trojans HTTP and HTTPS Trojans bypass firewalls and attack target computers. After is complete, they create an HTTP/HTTPS tunnel from the victim's computer to interact with the attacker . Botnet Trojans The number of attacked machines is called botnet (zombie). This error is not limited to a single LAN; they can be found all over the world. Command and control centers are responsible for these botnets. These bot networks are used by to perform denial of service (DoS), spam, and other attacks. Proxy Server Trojan Trojan-Proxy Server is a program virus that can turn your computer into a proxy server. The nameserver Trojan activates the nameserver on the victim's computer, allowing an attacker to use the victim's computer as a proxy. This method is used by to kill additional attacks while hiding the true nature of the attack. ▪ Remote Access Trojan (RAT) RAT (Remote Access Trojan) allows an attacker to gain remote access to the victim's machine through ports that allow GUI remote access. The RAT has a backbone to control access and control victims. Using RAT, attackers can monitor user activities, access confidential information and files, take photos, record audio and video from webcams, change file paper and drive type, and more. How can I prevent this malware? ▪ The software must be tested before installation. Only install trusted ones. ▪ You need to backup your data. ▪ You must update your antivirus software and functionality. Trojan Exploit Tool The Trojan Exploit Tool allows attackers to create their own Trojans. If Backfired, This Custom Trojan Could Be More Dangerous to Targets and Attackers