You are on page 1of 19

Prepared by:

Cejay P. Jolapong
What is Malware?

• Malware is a catch-all term for any type of


malicious software designed to harm or
exploit any programmable device, service
or network.
Why do cybercriminals use
malware?
• Tricking a victim into providing personal data for
identity theft
• Stealing consumer credit card data or other
financial data
• Assuming control of multiple computers to launch
denial-of-service attacks against other networks
• Infecting computers and using them to mine
bitcoin or other cryptocurrencies
How does malware spread?

• include email attachments,


• malicious advertisements on popular sites
(malvertising),
• fake software installations,
• infected USB drives,
• infected apps,
• phishing emails and
• even text messages.
How do I know I’ve been
infected with malware?
• Slow computer performance
• Browser redirects, or when your web browser
takes you to sites you did not intend to visit
• Infection warnings, frequently accompanied by
solicitations to buy something to fix them
• Problems shutting down or starting up your
computer
• Frequent pop-up ads
12 Types of Malware
Name Definition Example
Ransomware a software that RobbinHood
uses encryption to halted all city
disable a target’s activities in
access to its data Baltimore
until a ransom is
paid.

Example of
a ransom
letter
Fileless Malware Doesn’t install spammed users
anything initially, with links to
instead, it makes a .LNK shortcut
changes to files file. When users
that are native to downloaded the
the operating file, a WMIC tool
system, such as was launched,
PowerShell or along with a
WMI. number of other
legitimate
Windows tools..

Spyware collects DarkHotel


information about which targeted
users’ activities business and
without their government
knowledge or leaders using hotel
consent. WIFI
Adware Tracks a user’s Fireball infected
surfing activity to 250 million
determine which computers and
ads to serve them. devices in 2017
The danger in
adware is the
erosion of a user’s
privacy

Trojan Disguises itself as Emotet is a


desirable code or sophisticated
software. Once banking trojan that
downloaded by has been around
unsuspecting users, since 2014.
the Trojan can take
control of victims’
systems for
malicious
purposes.
Worms Target Stuxnet was
vulnerabilities in probably
operating systems developed by the
to install US and Israeli
themselves into intelligence forces
networks. with the intent of
setting back Iran’s
nuclear program.

Virus is a piece of code A virus cannot


that inserts itself execute or
into an application reproduce unless
and executes when the app it has
the app is run. infected is running.
This dependence
on a host
application.
Worms Target Stuxnet was
vulnerabilities in probably
operating systems developed by the
to install US and Israeli
themselves into intelligence forces
networks. with the intent of
setting back Iran’s
nuclear program.

Virus is a piece of code A virus cannot


that inserts itself execute or
into an application reproduce unless
and executes when the app it has
the app is run. infected is running.
This dependence
on a host
application.
Bots/Botnets Is a software Echobot attacks a
application that wide range of IoT
performs devices, exploiting
automated tasks on over 50 different
command. vulnerabilities, but
it also includes
Bots are used in exploits for Oracle
large numbers to WebLogic Server
create a botnet, and VMWare’s
which is a network SD-Wan
of bots used to networking
launch broad software.
remotely-
controlled floods
of attacks, such as
DDoS attacks.
Botnets can
become quite
expansive. b
Mobile Malware Mobile malware Triada is a rooting
threats are as Trojan that was
various as those injected into the
targeting desktops supply chain when
and include millions of
Trojans, Android devices
ransomware, shipped with the
advertising click malware pre-
fraud and more. installed.

Wiper Malware A wiper is a type On Jan. 15, 2022,


of malware with a a set of malware
single purpose: to dubbed
erase user data and WhisperGate was
ensure it can’t be reported to have
recovered. been deployed
against Ukrainian
targets.
Difference between Virus, Worm and
Trojan Horse:

Virus Worm Trojan Horse


A software or Replicate itself to Rather than
computer program cause slow down replicate capture
that connect itself to the computer some important
another software or system. information about a
computer program computer system or
to harm computer a computer
system. network.

The main objective The main objective The main objective


of virus to modify of worms to eat the of Trojan horse to
the information. system resources. steal the
information.
Viruses are Worms are executed Trojan horse
executed via via weaknesses in executes through a
executable files. system. program and
interprets as utility
software.

The main objective The main objective The main objective


of virus to modify of worms to eat the of Trojan horse to
the information. system resources. steal the
information.
How to protect yourself from
malware?
• Protect your devices
– Keep your operating system and applications
updated.
– Never click on a link in a popup.
– Limit the number of apps on your devices.
– Use a pc/mobile security solution.
– Don’t lend out your phone or leave your devices
unattended for any reason, and be sure to check
their settings and apps.
How to protect yourself from
malware?
• Be careful online
– Avoid clicking on unknown links.
– Be selective about which sites you visit.
– Beware of emails requesting personal information.
– Avoid risky websites, such as those offering free
screensavers.
How to protect yourself from
malware?
• Pay attention to downloads and other software
purchases
– Only purchase security software from a reputable
company via their official website or in a retail
store.
– Stick to official app stores.
– When looking for your next favorite app, make sure
you only download something that checks out.
– Do not open an email attachment unless you know
what it is, even if it came from a friend or someone
you know.
How to protect yourself from
malware?
• Perform regular checks
– Run a scan using the security software you have
installed on your device.
– Check your bank accounts, cash apps(gcash,
paymaya and etc.) and credit reports regularly.
Citation

• https://www.geeksforgeeks.org/difference-between-virus-worm-
and-trojan-horse/#:~:text=Virus%20is%20a%20software
%20or,system%20or%20a%20computer%20network.
• https://www.mcafee.com/en-us/antivirus/malware.html
• https://www.crowdstrike.com/cybersecurity-101/malware/types-of-
malware/?
fbclid=IwAR2Xd6gEQzDr4wn8Mc7Lkr7WxetQi4c_wl88iS-
_eTnvz9Tb0Rkv8kNgKVY

You might also like