Malware

What malware is

What viruses are and how they function

What worms are and how they function

What the significance of Trojan horses is

What detection of Trojans and viruses is

What tools for Trojans are

What distribution methods are

What Trojan constructions kits are

What backdoors are

What covert communication is

What spyware is

What adware is

What scareware is

What ransomware is

Software that is inherently

Intrusive

Annoying

Hostile

In its operation and performs its intent without consent of the owner

Types

Rootkits

Trojans

Ransomware

Scareware

Adware

Spyware

Worms

Viruses

Virus is used to refer to all types of malware

They are a piece of code or software that spreads from system to system by attaching itself to other files, once the file is accessed the code has been activated

Types

Logic bombs

Polymorphic viruses

Multipartite viruses

Marco viruses

Hoaxes

Prevention

Antivirus/Anti-malware

Applying updates

Education

Similar to a virus, however, doesn't require user intervention and is self replicate

How they work

No host program nor function

No user intervention

Replicate rapidly

Consume bandwidth and resources

Additional functions

Transmitting information from a victim system

Carrying a payload, such as a virus

A virus which can grant access to a system on behalf of the attacker

Once Trojan is installed, an attacker can perform

Modification or deletion of files

Installing keystroke loggers

Downloading or uploading files

Viewing the system user's screen

Installation software

Consuming computer storage space

Data theft

Crashing the victim's system

Antivirus/Anti-malware

Vulnerability scanners

Port scanners

A wide range of tools that can be used to take over a system

Common tools

Beast

Hard disk killer

Zombam.B

Amitis

Phatbot

CryptoLocker

RECUB (Remoted Encrypted Callback UNIX Backdoor)

Tiny Banker

Kedi RAT

Let Me Rule

Using wrappers

Types of wappers

Trojan Wrap

Teflon Oil Patch

Saran Wrap

Restorator

eLiTeWrap

Firekiller 2000

To assist in development of new Trojan viruses

A way in which many attacker gain access into systems

Types of backdoors

Rootkits

Services backdoor

Password-cracking backdoor

Process-hiding backdoors

Transferring information through a mechanism that was not designed for the purpose

Designed to collect and report information on a user's activities without the user's knowledge or concent

Software that is specifically designed to display ads on your system

Software that is designed to trick victims into purchasing or downloading useless or dangerous software

A type of malware designed to hold information hostage until a ransom is paid