presentation on malicious softwares
presentation on malicious softwares
Members
• Apsn Rai
• Arjun Kafle
• Chakra
Bajgain
• Kabir Sapkota
Malicious Software and
Spam: An Overview
Compromised Websites
Visiting malicious websites can lead to drive-by downloads.
Removable Media
USB drives and other media can carry infected files.
Network Propagation
Worms can spread automatically across networks.
Viruses
A computer virus is malicious software which self-
replicates and attaches itself to other files/programs.
Computer viruses spread like biological ones. It is
capable of quiet executing of its worst when the host
program/file is activated. Viruses can be transmitted
as attachments to an e-mail note or in a downloaded
file or present on a disk. Viruses copy themselves to
other disks to quickly pass on to other computers.
They can do anything from erasing the data on your
computer to hijacking your computer to attack other
systems, send spam, or host and share illegal
content.
Virus Types: Boot Sector,
Macro, Polymorphic - with
Examples
3 2004: Sasser
Exploited a buffer overflow vulnerability in Windows
LSASS service.
Trojan
Horses
Trojan horses is a malware that neither replicates nor
copies itself but causes damage or compromises the
security of the computer. It must be sent by someone or
carried by another program and may arrive in the form of
joke program or software of some sort. It has appearance
of desired function. After gaining trust, it secretly
performs malicious and illicit activities .
Trojan Horses: A History
Trojan horses disguise as legitimate
software. Once installed, they perform
malicious actions.
1 Ancient Origins
Named after the Trojan Horse from Greek mythology.
2 Modern Malware
Used for data theft, system control, and backdoors.
3 Example: Zeus
Banking trojan stealing financial information.
4 Example: NetBus
Remote administration tool used maliciously.
Understanding the Logic
Bomb
Dormant Code
Malicious code hidden within a program. Waits for a
specific condition.
Trigger Event
A date, time, or user action. Activates the harmful payload.
Harmful Payload
Deletes data or damages system. Causing significant
disruption.
Spyware
Spyware is a type of malware installed on
computer that collects your personal
information and passes it on to someone else
without your knowledge or consent. The
presence of spyware is typically hidden from
the user and can be difficult to detect.
Email Attacks
Email attacks are cyber threats that exploit email communication
to steal data, spread malware, or deceive users. Common types
include phishing, where attackers trick users into revealing
sensitive information, and spear phishing, which targets specific
individuals or organizations. Business Email Compromise (BEC)
involves impersonating executives to authorize fraudulent
transactions, while malware attachments spread harmful
software. Spoofing deceives recipients by mimicking legitimate
senders. To prevent such attacks, users should verify email
sources, avoid clicking suspicious links, and implement strong
security measures.
Ransomware
Ransomeware is a form of malware that essentially holds a computer system locked
demanding a ransom. The malware restricts the user from access to the computer
either by encrypted files on the hard drive or locking down the system and
displaying messages that are intended to force the user to pay the malware creator
to remove the restrictions .
Zombies
A zombie is a computer connected to a
network that has been compromised by a
cracker a virus or a Trojan. It can used
remotely for malicious tasks . A cracker
secretly infiltrates an unsuspecting victims
computer and uses it to conduct illegal
activities .
Adware
Adware is a type of malware that
automatically delivers
advertisements.
Phishing Attacks