Professional Documents
Culture Documents
Introduction to Malware
The outbreak may disrupt normal business operations simply through the
malware’s spread, or the malware may also damage infected systems in other
ways, including destroying or altering information. Malware can also eavesdrop
on communications and send intercepted sensitive information back to its source.
While viruses, worms, Trojan horses, and so on do not directly attack networks,
they do use networks to propagate from one system to another. Especially
virulent malware may generate so much traffic that all legitimate network
communications may cease. This may be true even if only a small number of
infected systems are present and attempting to find new victim hosts to attack
and infect.
3. Classes of Malware
• Trojan horses As the name suggests, these are programs that are purported to
perform one function, but which actually perform other (or additional) undesired
functions. For example, something might be advertised as a game that actually
erases files (or does both).
• Root kits These are malware designed to hide themselves from the operating
system as well as evade detection by antivirus software. Some root kits are also
able to run “underneath” the operating system so that they are undetectable.
• Bots These are agents implanted by other forms of malware and which are
programmed to obey remotely issued instructions. Collections of bots are called
bot armies. These are built to create spam, propagate malware, attack target
systems and networks, and host phishing sites.
• Computer slowdowns
• Alteration or destruction of data
• Eavesdropping on communications
• Stolen data
• Attack or damage to other systems
• Spam Junk e-mail often contains malware, or entices users to connect to web sites
that contain malware. Spam also includes e-mail messages that advertise both
legitimate goods and services as well as fakes; prescription medication is a good
example of the phony merchandise that many people buy in the hopes of saving
money.
A common ploy is an e-mail message from a bank telling customers that their bank
accounts will be locked unless they respond by logging in to an imposter site. People
who fall for these schemes inadvertently provide login credentials to thieves, who
use them to transfer funds out of their victims’ accounts. Many similar schemes exist
that attempt to steal money or other valuables from victims.
• No removable media Malware can be introduced via removable media. In fact, the
earliest viruses were spread via floppy disk. Today, many organizations forbid, and
even actively block, the use of removable media such as USB drives and memory
sticks.
• Spam filters A lot of malware (not to mention phishing schemes and fraud) enters
an organization through e-mail. Centralized spam filters can intercept and block
spam before it even reaches the e-mail server. Many spam filters also have antivirus
programs on them to scrub viruses from incoming email— even when it comes from
legitimate, known persons.
• Blocking use of removable media While external memory devices such as USB
sticks and external hard drives are popular, they do represent a number of threats,
including malware. Blocking removable media is also one measure that is effective
against information leakage. typically use it to extract data that they can
leverage over victims for financial gain. That data can range from
financial data, to healthcare records, to personal emails and passwords
—the possibilities of what sort of information can be compromised have
become endless.
What is malware?
Malware is a catch-all term for any type of malicious
software designed to harm or exploit any
programmable device, service or network.
Cybercriminals typically use it to extract data that
they can leverage over victims for financial gain.
That data can range from financial data, to
healthcare records, to personal emails and
passwords—the possibilities of what sort of
information can be compromised have become
endless.