0% found this document useful (0 votes)
65 views

T.L.E Online Threats: Submitted By: Nazzel S. Apolinar Submitted To

This document discusses various types of online threats such as Trojan horses, backdoors, rootkits, and worms. A Trojan horse is malware that masquerades as legitimate software to gain access to systems. It can steal data, disrupt computers or networks, and grant hackers backdoor access. Backdoors and rootkits also bypass security to grant unauthorized access. Several examples of infamous worms are provided that caused major disruptions when initially released online.

Uploaded by

nezzah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
65 views

T.L.E Online Threats: Submitted By: Nazzel S. Apolinar Submitted To

This document discusses various types of online threats such as Trojan horses, backdoors, rootkits, and worms. A Trojan horse is malware that masquerades as legitimate software to gain access to systems. It can steal data, disrupt computers or networks, and grant hackers backdoor access. Backdoors and rootkits also bypass security to grant unauthorized access. Several examples of infamous worms are provided that caused major disruptions when initially released online.

Uploaded by

nezzah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

T.L.

E
ONLINE
THREATS

SUBMITTED BY : NAZZEL S. APOLINAR


SUBMITTED TO :
TROJAN HORSE
A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can be
employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically tricked by
some form of social engineering into loading and executing Trojans on their systems. Once activated, Trojans
can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor access to your system.
These actions can include:
 Deleting data • Modifying data
 Blocking data • Copying data
Disrupting the performance of computers or computer networks
Unlike computer viruses and worms, Trojans are not able to self-replicate.
A backdoor is a means to access a computer A rootkit is a malicious software that allows an
system or encrypted data that bypasses the unauthorized user to have privileged access to a
system's customary security mechanisms. A computer and to restricted areas of its software. A
developer may create a backdoor so that an rootkit may contain a number of malicious tools such as
application or operating system can be key loggers, banking credential stealers, password
accessed for troubleshooting or other stealers, antivirus disablers, and bots for Dados attacks.
purposes.

Its purpose is to steal your account data for online banking systems, e-
payment systems and credit or debit cards.

This is used to install Trojans and other viruses into the computer.
This can also conceal detection of malicious programs. If you're
using a weak or outdated antivirus, some of them can't scan all of
the components inside this type of Trojan horse virus.

This Trojan horse virus can start up the Denial of


Service (DoS) attacks. Not only it can affect Released into the wild on November 2, 1988, the Morris
endpoints, but also websites. By sending multiple Worm was originally made in order to gauge the size of the
requests – from your computer and several other Internet. However, a coding flaw in the program has
infected computers – the attack can overload the inadvertently turned it into an extremely damaging, resource-
target address which leads to a denial of service. hogging program capable of bogging down a computer
system by infecting it multiple times.

A bait-and-switch, faux-porn-list worm that nearly shut


down the entire worldwide web when it was released in
1999, Melissa's promise of providing free access to over
eighty porno sites enabled it to spread across the mailboxes
of affection-starved individuals and mass mail itself into
thousands of recipients in a short period of time.
Nidi ("admin" spelled backwards) was able to wreak
havoc in autumn of 2001 by infecting an assortment
of Microsoft computers via an email-based exploit.
Because of the fact that it shares characteristics with
all the major malware ever developed, Nidi was able
to propagate itself in a rapid rate by modifying
configurations to become more vulnerable and
appending all Internet-related files with JavaScript.

This Resident viruseswas


2003 malware liveable
in your RAM memory.
to continue the early It can
interfere
2000's with
tradition of normal systemchaos
worm-related operation
by which can
lead toa the
exploiting corruptionthat
vulnerability of files and programs. The
Microsoft
most popular
announced in July examples of resident
of that year. viruses
It featured a are CMJ, This 2007 worm was named after the Kirill weather storm in
Maeve,
message MrKlunky,
addressed and
to Bill Radix.
Gates that said, "Stop Europe. It'stype
a rogue spamcan
thateasily
compelled
This of virus spreadusers to open
in your it
computer
making money and fix your software," and it was because it boreItaisheadline alleging that two-hundred and
system. very infectious, performing unauthorized
able to infect seven thousand computers within thirty people
actionshave diedoperating
in your while thesystem,
Kirill storm pummeled
in folders, and other
mere hours of its discovery. Europe. Its collection
A worm virus of contaminated machines becametopart
programs on theiscomputer.
a malicious,Theyself-
have the ability
of a large botnet
bothresponsible
replicating
infect program
the forcan
that
executable gathering
filesspread tonsboots
and the of private
sector.data
and executing
throughoutvarious DDOSwithout
a network attacks.human

WORM assistance.

This virus lives in certain links, ads, image


placement, videos, and layout of a website. These
may carry malicious codes in which when you
click, the viruses will be automatically downloaded
or will direct you to malicious websites. From the name itself, this virus overwrites the content of a
file, losing the original content. It infects folders, files, and
even programs. To delete this virus, you also need to get rid
of your file. Thus, it is important to back up your data.

VIRUS
Macro viruses target applications and software
that contain macros. These viruses can carry out
series of operations affecting the performance of
the program or software. Some examples of
macro viruses are O97M/Y2K, Babbles, Melissa.
A, and Relax.

You might also like