You are on page 1of 16

Contents

1. 2. 3. 4. 5.

6.
7. 8.

9.
10. 11.

Malware Purpose of Malware Malware includes Virus & Worm Trojan & Spyware Root kit Backdoor Adware Top Detected Malware Anti-virus & Anti-Malware Types of Protection

Malware
Software used or created by attackers to disrupt

computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware is a general term used to refer to a variety of forms of hostile or intrusive software.

Purposes of Malware
Malware is sometimes used broadly against

government or corporate websites to gather guarded information, or to disrupt their operation in general. Malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for black-market exploitation. Infected "zombie computers" are used to send email spam, to host contraband data or to engage in distributed denial-of-service attacks as a form of extortion.

Malware includes
Computer viruses Worms Trojan horses

Remote Access Data Destruction Downloader Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.) Security software disabler Denial-of-service attack (DoS)

Spyware
Adware Backdoor

Virus & Worm


The term computer virus is used for a program that

has infected some executable software and, when run, causes the virus to spread to other executables.
On the other hand, a worm is a program

that actively transmits itself over a network to infect other computers.


A virus requires user intervention to spread,

whereas a worm spreads itself automatically.

Torjan & Spyware


Trojan horse is any program that invites the user to run

it, concealing harmful or malicious code. The code may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or installing additional harmful software. One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed along with it. Spyware authors who attempt to act in a legal fashion may include an end-user license agreement that states the behavior of the spyware in loose terms, which users may not read or understand.

Rootkit
If a malicious program get installed on a system, it is

essential that it stays concealed, to avoid detection. Techniques known as root kits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Root kits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. Ex. Jargon File (Xerox CP-V time sharing)

Backdoor
A backdoor is a method of bypassing

normal authentication procedures. If a system has been compromised, one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry

Adware
Adware, or advertising-supported software, is

any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements.

Top Detected Malware


Malicious URL

Trojan.Script.Iframer
Trojan.Script.Generic Exploit.Script.Blocker

Trojan.JS.Popupper.aw
Trojan.Win32.Generic Trojan-Downloader.JS.Iframe.cxk

Anti-virus and Anti-malware software


Anti virus and anti-malware software commonly hooks deep into

the operating system's core or kernel functions in a manner similar to how malware itself would attempt to operate, though with the user's informed permission for protecting the system.

Any time the operating system does something, the anti-malware

software checks that the OS is doing an approved task. This commonly slows down the operating system and/or consumes large amounts of system memory. system before they occur, including activities which might exploit bugs or trigger unexpected operating system behavior.

The goal is to stop any operations the malware may attempt on the

Types of Protection
They can provide Real Time Protection against the installation of

malware software on a computer. This type of spyware protection works the same way as that of antivirus protection in that the antimalware software scans all incoming network data for malware software and blocks any threats it comes across.

Anti-malware software programs can be used solely for detection

and removal of malware software that has already been installed onto a computer. This type of anti-malware software scans the contents of the Windows registry, operating system files, and installed programs on a computer and will provide a list of any threats found, allowing the user to choose which files to delete or keep, or to compare this list to a list of known malware components, removing files that match.

Conclusion
Everyday attackers are engaged in building some new malicious code to attack victim computers to steal confidential information for their profit. In order to protect our computer from these attacks , the only way is to install an updated Anti-virus or Anti-malware software and be careful while installing new software and using internet services such as email, downloading.

You might also like