0% found this document useful (0 votes)
1 views

presentation on malicious softwares

This document provides an overview of malicious software (malware) and spam, detailing various types of malware, their transmission methods, and prevention strategies. It covers specific malware types such as viruses, worms, Trojan horses, ransomware, and spyware, along with their impacts and real-world examples. The document emphasizes the importance of understanding these threats to enhance protection against them.

Uploaded by

sapkotakabir07
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

presentation on malicious softwares

This document provides an overview of malicious software (malware) and spam, detailing various types of malware, their transmission methods, and prevention strategies. It covers specific malware types such as viruses, worms, Trojan horses, ransomware, and spyware, along with their impacts and real-world examples. The document emphasizes the importance of understanding these threats to enhance protection against them.

Uploaded by

sapkotakabir07
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Team

Members
• Apsn Rai
• Arjun Kafle
• Chakra
Bajgain
• Kabir Sapkota
Malicious Software and
Spam: An Overview

This presentation offers a


concise overview of malicious
software. We will cover
different types of malware and
spam. Learn about how they
spread and how to protect
against them.
Introduction to
Malicious
Software

Malware, short for malicious software,


refers to any program or code
intentionally designed to disrupt,
damage, or gain unauthorized access to
computer systems. It is a broad term
that encompasses various types of
harmful software, each serving different
purposes but sharing the common goal
of exploiting vulnerabilities in systems
for malicious intent.
Transmission Vectors of
Malicious Software
Email Attachments
Infected files attached to emails can spread malware quickly.

Compromised Websites
Visiting malicious websites can lead to drive-by downloads.

Removable Media
USB drives and other media can carry infected files.

Network Propagation
Worms can spread automatically across networks.
Viruses
A computer virus is malicious software which self-
replicates and attaches itself to other files/programs.
Computer viruses spread like biological ones. It is
capable of quiet executing of its worst when the host
program/file is activated. Viruses can be transmitted
as attachments to an e-mail note or in a downloaded
file or present on a disk. Viruses copy themselves to
other disks to quickly pass on to other computers.
They can do anything from erasing the data on your
computer to hijacking your computer to attack other
systems, send spam, or host and share illegal
content.
Virus Types: Boot Sector,
Macro, Polymorphic - with
Examples

Boot Sector Macro Polymorphic


Infects the boot Embedded in Changes its code to
sector of storage documents or avoid detection.
devices. Example: spreadsheets. Example: V2PX
Stone Virus. Example: Melissa virus.
Virus.
Worms

Computer worm is a self-replicating malware


that does not alter files but duplicates itself.
The trouble of worms is to spread and infect
as many computers as possible. They do so
by creating copies of themselves on infected
computers, which then spread to other
computers via different channels. It is
common for worms to be noticed only when
their uncontrolled replication consumes
system resources, slowing or halting other
tasks. It uses a network to send copies of
itself to other nodes (computers on the
network). It may do so without any user
intervention. It does not need to attach itself
to an existing program.
Real-World Worm Attack:
Case Study
1 2001: Code Red
Targeted Microsoft IIS servers, causing widespread damage.

2 2003: SQL Slammer


Caused a global internet slowdown by exploiting SQL
Server vulnerabilities.

3 2004: Sasser
Exploited a buffer overflow vulnerability in Windows
LSASS service.
Trojan
Horses
Trojan horses is a malware that neither replicates nor
copies itself but causes damage or compromises the
security of the computer. It must be sent by someone or
carried by another program and may arrive in the form of
joke program or software of some sort. It has appearance
of desired function. After gaining trust, it secretly
performs malicious and illicit activities .
Trojan Horses: A History
Trojan horses disguise as legitimate
software. Once installed, they perform
malicious actions.
1 Ancient Origins
Named after the Trojan Horse from Greek mythology.

2 Modern Malware
Used for data theft, system control, and backdoors.

3 Example: Zeus
Banking trojan stealing financial information.

4 Example: NetBus
Remote administration tool used maliciously.
Understanding the Logic
Bomb
Dormant Code
Malicious code hidden within a program. Waits for a
specific condition.

Trigger Event
A date, time, or user action. Activates the harmful payload.

Harmful Payload
Deletes data or damages system. Causing significant
disruption.
Spyware
Spyware is a type of malware installed on
computer that collects your personal
information and passes it on to someone else
without your knowledge or consent. The
presence of spyware is typically hidden from
the user and can be difficult to detect.
Email Attacks
Email attacks are cyber threats that exploit email communication
to steal data, spread malware, or deceive users. Common types
include phishing, where attackers trick users into revealing
sensitive information, and spear phishing, which targets specific
individuals or organizations. Business Email Compromise (BEC)
involves impersonating executives to authorize fraudulent
transactions, while malware attachments spread harmful
software. Spoofing deceives recipients by mimicking legitimate
senders. To prevent such attacks, users should verify email
sources, avoid clicking suspicious links, and implement strong
security measures.
Ransomware
Ransomeware is a form of malware that essentially holds a computer system locked
demanding a ransom. The malware restricts the user from access to the computer
either by encrypted files on the hard drive or locking down the system and
displaying messages that are intended to force the user to pay the malware creator
to remove the restrictions .
Zombies
A zombie is a computer connected to a
network that has been compromised by a
cracker a virus or a Trojan. It can used
remotely for malicious tasks . A cracker
secretly infiltrates an unsuspecting victims
computer and uses it to conduct illegal
activities .
Adware
Adware is a type of malware that
automatically delivers
advertisements.
Phishing Attacks

Phising refers to the sending of emails that


appear to originate from reliable sources but
are really intended to trick the recipient into
revealing confidential information.
Spams

Spam refers to unwanted, unsolicited messages


sent in bulk, typically via email, SMS, or social
media. It is often used for advertising, phishing
scams, or spreading malware. Common types of
spam include email spam, phishing spam, and bot-
generated spam. Spam can pose security risks,
such as identity theft and financial fraud, making it
essential to use spam filters and practice caution
when opening unknown messages.
Symptoms of
Malware Attacks

Common symptoms of malware


infections include:
•Slow system performance
• Unusual pop-ups or ads
•Unauthorized changes to files or
settings
•Frequent crashes or errors
• Unexpected network activity
• Best practices for prevention:
• Use antivirus and anti-
Preventing malware software
• Keep systems and software
Malware and updated
Spam • Avoid suspicious emails and
downloads
• Enable firewalls and network
security
• Educate users about
phishing and social
engineering
Conclusion
Malicious software and spam pose
significant threats to individuals and
organizations. By understanding the
types, transmission methods, and
prevention techniques, we can better
protect ourselves and our systems.
THANK YOU

You might also like