You are on page 1of 11

Name : Jainil Shah

Enrollment No : 20124070

Topic: Spamming
Spamming

• Malware is a malicious software that gets installed in your device and


performs unwanted tasks.

• Mainly designed to transmit information about your web browsing habits to


the third party
History

A malicious software (malware) program is an application whose developer or


sender has malicious intent. While most programs and files you install or
download are completely harmless, some are designed to further hidden
agendas, such as destroying your files, stealing your information, or extracting
a payment.

Scammers have been using a variety of methods to get malware onto as many
computers as possible for a long time. The first computer virus, called Elk
Cloner, was discovered on a Mac in 1982. In 1986, the first PC-based malware,
known as Brain, was released.
Types of Malware
VIRUS
• Software that replicates itself and spreads by damaging and deleting the
files.

• Virus enters your device via attached images, greeting, audio/video files,
downloads etc.

Spyware
• Spyware is a program that gets installed without the user's permission.

• It monitors the user's activities on the internet and transmits that information
to the third party.
Worms

• Malicious program that make copies of itself on local device, network shares etc.
• They make the working of your device slower

Trojan Horse

• A Trojan Horse is a program containing malicious or harmful code.


• Entering a computer, it performs various tasks like corrupting files and sending out personal
information.

Ransomware

• Ransomware is a type of malware that prevents or limits users from accessing their system,
either by locking the system's screen or by locking the users' files until a ransom is paid.
Case study – 1

CovidLock, ransomware, 2020

• Fear in relation to the coronavirus (COVID-19) has been widely


exploited by cybercriminals. CovidLock ransomware is an example.
This type of ransomware infects victims via malicious file promising to
offer more information about the disease.

• The problem is that, once installed, CovidLock encrypts data from


Android devices and denies data access to victims. To be granted
access, you must pay a ransom of USD 100 per device.
Case study – 2

Emotet, trojan, 2018

• Emotet is a trojan that became famous in 2018 after the U.S.


Department of Homeland Security defined it as one of the most
dangerous and destructive malware. The reason for so much attention is
that Emotet is widely used in cases of financial information theft, such
as bank logins and cryptocurrencies.

• The main vectors for Emotet’s spread are malicious emails in the form
of spam and phishing campaigns. 2 striking examples are the case of the
Chilean bank Consorcio, with damages of USD 2 million, and the case
of the city of Allentown, Pennsylvania, with losses of USD 1 million.
Case study – 3

WannaCry, ransomware, 2017

• One of the worst ransomware attacks in history goes by the name


of WannaCry, introduced via phishing emails in 2017. The threat
exploits a vulnerability in Windows.

• It’s estimated that more than 200,000 people have been reached
worldwide by WannaCry, including hospitals, universities and large
companies, such as FedEx, Telefonica, Nissan and Renault. The losses
caused by WannaCry exceed USD 4 billion.
Case study – 4

Zeus, trojan, 2007

• Zeus is a trojan distributed through malicious files hidden in emails and


fake websites, in cases involving phishing. It’s well known for
propagating quickly and for copying keystrokes, which led it to be
widely used in cases of credential and passwords theft, such as email
accounts and bank accounts.

• The Zeus attacks hit major companies such as Amazon, Bank of


America and Cisco. The damage caused by Zeus and its variations is
estimated at more than USD 100 million since it was created in 2007.
Conclusion

• Malware is one of the most common methods of


cyber attacks. But there are steps you can take to make
yourself less vulnerable. By doing what you can to
educate yourself, you're less likely to become a victim
of cyber crimes
References

• https://en.wikipedia.org/wiki/Malware
• https://gatefy.com/blog/real-and-famous-cases-malware-
attacks/
• https://www.lifewire.com/brief-history-of-malware-153616
• https://www.getcybersafe.gc.ca/en/blogs/what-malware-how-
protect-yourself

You might also like