You are on page 1of 32

A P P L I E D C RY P T O G R A P H Y

AND NETWORK SECURITY


FACULTY - NARESH K
TEAM MEMBERS
o B.YASWANTH KUMAR 21MID0010

o M.DILEEP 21MID0021

o H.GURU JANARDHAN REDDY 21MID0060

o K.VARUN KUMAR REDDY 21MID0116

o M.RISHABH RAJ 21MID0170


C Y B E R S WAC H H TA K E N D R A
Cyber Swachhta Kendra is an initiative launched by the Indian
government's Computer Emergency Response Team under
the Ministry of Electronics and Information Technology. The
term "Swachhta" refers to cleanliness in the digital space,
implying the removal of malware and ensuring a safer
cyberspace.

Goals:

➢ Malware Defense

➢ Cybersecurity Awareness
Key Features:

❖ Malware detection and removal tools

❖ USB device blocking for malware prevention

❖ URL and IP address analysis for safe browsing

❖ Cybersecurity awareness campaigns and workshops


T H R E AT S O F C Y B E R S W AC H H TA
KENDRA

Panchan Nitrogen
KV Botnet Vidar SecuriDropper
Botnet Malware
Original Issue Date:- Original Issue Date:- Original Issue Date:- Original Issue Date:- Original Issue Date:-
April 12, 2024Virus January 13, November 17, September 16, August 11, 2023Virus
Type:- 2023Virus Type:- 2023Virus Type:- 2022Virus Type:- Type:-
BotnetSeverity:- Info-Stealing Dropper-As-A- Botnet / TrojanSeverity:-
Medium MalwareSeverity:- Service WormSeverity:- Medium
Medium (DaaS)Severity:-High Medium
KV BOTNET
The KV Botnet, a sophisticated malware operation attributed
to a Chinese state-sponsored hacking group called Volt
Typhoon or Bronze Silhouette, poses a significant threat to
Small Office/Home Office (SOHO) routers and VPN devices.
Initiation Mechanisms:
❖ Exploiting Firmware and Web Interface Vulnerabilities

❖ Brute-Force Attacks

❖ Infection via Third-party Applications and Malicious Firmware


Updates
Impact Assessment:
❖ Data Exfiltration

❖ Lateral Movement

❖ Command and Control


Preventive Measures:

❖ Implement Strong, Unique Passwords

❖ Multi-factor Authentication (MFA)

❖ Network Segmentation

❖ Exercise Caution Online

❖ Monitor System Activity


V I DA R
Vidar is a type of malicious software (malware) that sneaks
onto your computer without your permission. It's called "info-
stealing" because its main job is to secretly gather sensitive
information from your device.
Initiation Mechanisms:

❖ Spoofing of Legitimate Sites

❖ Typo Squatting

❖ Malicious ZIP File


Impact Assessment:
❖ Information Theft

❖ Privacy Breach

❖ System Compromise
Preventive Measures:
❖ Safe Browsing Practices

❖ Regular Device Updates

❖ Browser Reinstallation

❖ Software Download Safety

❖ Remote Desktop Security


S E C U R I D RO P P E R
SecuriDropper is a type of malware known as Dropper-as-a-
Service (DaaS), designed to infect Android devices. It disguises
itself as a legitimate app and bypasses Android's security
measures, including the Restricted Settings feature, to secretly
install more harmful programs like spyware or banking Trojans
onto your device.
Initiation Mechanisms:
❖ Disguised as Legitimate Apps

❖ Permission Requests

❖ Dynamic Interface Management


Impact Assessment:
❖ Secondary Payload Installation

❖ Privacy Invasion

❖ Device Compromise
Preventive Measures:
❖ Stick to Official App Stores

❖ Review App Details

❖ Keep Android Updated

❖ Exercise Caution

❖ Use Antivirus Software


PA N C H A N B O T N E T
Panchan is a sophisticated peer-to-peer (p2p) botnet primarily
focused on crypto mining. It targets Linux servers, particularly
in telecom and education sectors, and is designed to spread
across networks using various methods, including SSH brute
force attacks and stealing SSH keys. Written in Golang,
Panchan utilizes concurrency features to enhance its spread
and execution modules.
Initiation Mechanisms:
❖ SSH Brute Force

❖ Execution and Spread

❖ Peer-to-Peer Communication
Impact Assessment:
❖ Cryptocurrency Mining

❖ Stealth Features

❖ Network Compromise
Preventive Measures:
❖ Complex Passwords

❖ Multi-Factor Authentication

❖ Network Segmentation

❖ Monitoring and Firewall

❖ Software Updates
N I T RO G E N M A L WA R E
Nitrogen is a Trojan malware that targets organizations by
deceiving users into downloading malicious IT tools through
deceptive ads on search engines. Once infiltrated, Nitrogen
enables attackers to conduct various malicious activities,
including extracting sensitive information such as passwords
and banking details.
Initiation Mechanisms:
❖ Deceptive Ads

❖ Compromised Websites

❖ Malicious Installers
Impact Assessment:
❖ Data Theft

❖ Malicious Payload

❖ Use of Cobalt Strike


Preventive Measures:
❖ Periodic System Checks

❖ Avoid Pirated Software

❖ Maintain Backups

❖ Security Practices

❖ Software Updates
T H A N K YO U

You might also like