You are on page 1of 9

Information security & cryptography

Malware Chp 8
(Report)

Anila Tajammal Bcsm-f17-058


Asad Mahmood Butt Bcsm-f17-147
Rizwan Ali Bcsm-f17-141
Muhammad Umair Bcsm-f17-168
About Tool!

There are many tools for virus maker such as terabit virus maker, poison virus
maker, gps virus maker, but the tool which we use to implement is Terabit virus
maker. This is used to create virus actually Terabit Virus Maker is a prank
application that allows you to control various Windows functions in a fun way. It's
might appear to be a virus, but it's just a fun tool that can be installed and removed
easily. It doesn't delete data or provide personal data.

(Terabit virus maker interface)


Implementation
First of all you have to tick on any box where you want to create virus when
someone open it for example we take or tick on avoid opening calculator after this
right side we can see there is an option of Binder where we can bind any
application as you want after this step 2 below the Binder box where write is fake
error message the purpose of this is when user click on virus file it will open a
dialog message that it contain virus etc…..here we will give title of virus message
that we want to show and type of error for example critical…..than next where is
write run custom command where we can create custom virus using cmd….than 3rd
step see the box where write Add here we can add fake kb(s) to virus. Than next 4 th
step is to set extension of virus for example calculator.exe e.g. setup file…here we
can set virus name virus icon and file name so 5th step to create virus button.
Malware
Malware (for "malicious software") is any program or file that is harmful to
a computer user.
Malware includes computer viruses, worms, Trojan horses, and also
Spyware, programming that gathers information about a computer user
without permission.
 Malware typically consists of code developed by cyber attackers, designed
to cause extensive damage to data and systems or to gain unauthorized
access to a network.

Malware Types
 File less malware
 Ransomware
 Virus
 Trojan
 Logic Bomb
 Rootkit and types
 Trapdoor
 Worm
 Spyware
 Malvertising
 Malicious Fonts/code
Spyware
Technology that aids in gathering information about a person or organization
without their knowledge.
On the Internet Spyware is programming that is put in someone’s computer
to secretly gather information about the user and relay it to advertisers or
other interested parties?
Spyware can get in a computer as a software virus or as the result of
installing a new program.
Virus
A program or programming code that replicates by being copied or initiating
its copying to another program, computer boot sector or document.
Viruses can be transmitted as attachments to an e-mail note or in a
downloaded file, or be present on a diskette or CD. And is designed to
spread from one computer to another.

Worm
A computer worm is a standalone malware computer program that replicates
itself in order to spread to other computers.
It often uses a computer network to spread itself, relying on security failures
on the target computer to access it.
It will use this machine as a host to scan and infect other computers.

Logic Bomb

Logic bomb is programming code, inserted intentionally, that is designed to


execute under circumstances such as the failure of a program user to respond
to a program command.
A logic bomb, when "exploded," may be designed to display or print a
spurious message, delete or corrupt data, or have other undesirable effects.
Trapdoor

It is a method of gaining access to some part of a system other than by the


normal procedure (e.g. Gaining access without having to supply a
password).
There have also been instances of system developers leaving debug
trapdoors in software, which are then discovered and exploited by hackers.

Fileless malware

File less malware refers to a cyberattack technique that uses existing


software, allowed applications, and authorized protocols to carry out
malicious activities.
Fileless malware is a type of malicious software that uses legitimate
programs to infect a computer.
It does not rely on files and leaves no footprint, making it challenging to
detect and remove.

Randsomware

Ransomware is malicious software that infects your computer and displays


messages demanding a fee to be paid in order for your system to work again.
This class of malware is a criminal moneymaking scheme that can be
installed through deceptive links in an email message, instant message or
website.
Malvertising
Malvertising is the use of online advertising to spread malware.
It typically involves injecting malicious or malware-laden advertisements
into legitimate online advertising networks and webpages. 
Experts told CNBC that advertisements on sites can be used by
cybercriminals to take over your computer, steal your identity or access your
online bank account. ... This kind of malicious ad—known as
malvertisements—contain malware or embedded viruses, which can infect
computers without a single click.

Malicious Fonts
Webpage text that exploits the default method used to de-compress
Embedded Open Type Fonts in Windows based programs including Internet
Explorer and Outlook.
These malicious fonts are designed to trigger a buffer overflow which will
disable the security on Windows-based PCs.
This allows an intruder to take complete control of the affected computer
and remotely execute destructive activities including installing unauthorized
programs and manipulating data.
Rootkit

Rootkits are a set of software tools used by an intruder to gain and maintain
access to a computer system without the user's knowledge.
These tools conceal covert running processes, files and system data making
them difficult to detect.
There are rootkits to penetrate a wide variety of operating systems including
Linux, Solaris and versions of Microsoft Windows. A computer with rootkits on it
is called a rooted computer.
Summary

In this chapter, we covered one of the largest and most dangerous threats that has
emerged and evolved over the last 30 years: malware. You learned that malware is
a blanket term used to describe the family of software that includes viruses, worms,
Trojans, and logic bombs, as well as adware and spyware. Each of these types of
malware has been responsible for problems over the years and has done everything
from being an annoyance to causing outright harm.

You might also like