Professional Documents
Culture Documents
Week2 Module6 PDF
Week2 Module6 PDF
1
Objectives
2
Learning Outcomes
✓Organize and Group Specific Class of Cyber
Attacks
✓Enumerate the types of vulnerability weakness
and how it is exploited
✓Judge the various threat types
3
Outline
Malware Attacks and its types
Macro viruses
File infectors
Boot-record/ System infectors
Polymorphic viruses
Stealth viruses
Trojans
Logic bombs
Worms
Droppers
Ransomware
Adware and Spyware 4
Outline
Classification of Vulnerabilities
Technology Weakness
Configuration Weakness
Security policy Weakness
Types of Threats
Unstructured Threats
Structured Threats
External Threats
Internal Threats
5
Malware attacks
6
Common types of Malwares
Macro
Viruses
File
Spyware infectors
Boot-record/System
infectors
Adware
Polymorphic
Ransomware viruses
Stealth
Droppers virus
Malwares
Worms
Trojans
Logic
bombs
7
Macro Viruses
8
File Infectors
• This type of viruses basically is attached to
executable code such as exe files
• Whenever the exe file loads the code the virus
is installed
The File infector virus seeks out It gathers information from the affected
.exe files to infect the files present file system and starts duplicating and
in the system. hiding in the system directories.
9
Polymorphic Viruses
• These viruses hide themselves in various
cycles of encryption and decryption
Mutation Engine
(to produce unlimited
number of different
decryptors)
Decryptor
Infection Process
10
Trojans
• A malicious function which hides in a useful
program is known as Trojan or Trojan horse
TROJAN
Attacker Victim
Infection occurs
ICQ (Internet
Chat Query)
Server IP Address
IP Address
and Port
and Port
Connection
11
Logic bombs
• These are added with an application and get
triggered during a specific scenario
Logic bomb
12
Worms
• Worms are self-contained programs that
propagate across computers and networks
• It is different from viruses and is not attached
with host file
• It is transferred via emails
Initial Infection
Worm
Server
Attacker
13
Droppers and Ransomware
14
Adware
• Adware is used by the companies for
marketing and advertising banners
• They are displayed when any kind of program
is running in the machine
15
Spyware
• It is a type of program that could be installed
on the system to gather the useful information
about the users
Password
********
Mail
contents
Spyware
Monitors
Spyware
Confidential
information
Website visits 16
Similarities and differences between
Virus, Worms and Trojan horse
Steal information Self-replicates
4%
5%
5%
26%
6%
6%
7%
17%
8%
16%
18
Types of malware reported to MS-ISAC
• WannaCry is a Ransomware malware
• Emotet downloads or drops Trojans
• ZeuS is also an integrated banking Trojan
• Kovter is a kind of adware
• CoinMiner is a type of ransomware
• Mirai is a malware Botnet
• NanoCore is a Remote Access Trojan (RAT)
• Gh0st is a RAT that is dropped by other malware
• Smoke Leader is distributed by malicious spams
• Ursnif is a type of banking trojans
19
Classification of Vulnerabilities
• Every network consists of vulnerabilities which
can be referred to as “soft spots”
• They might be present in network or can be
created by individual devices
Technology weakness
20
Technology weaknesses
21
Configuration Weaknesses
22
Types of Configuration Weaknesses
23
Security policy weaknesses
24
Types of Threats
Unstructured threats
Structured threats
Threats
External threats
Internal threats
25
Threat types
26
Common Cyber Attacks Terms
• Hacker
• Cracker
• Phreaker
• Spammer
• Phisher
• White hat
• Black hat
27
Conclusion
28
Thank you
29