Malware
What malware is
What viruses are and how they function
What worms are and how they function
What the significance of Trojan horses is
What detection of Trojans and viruses is
What tools for Trojans are
What distribution methods are
What Trojan constructions kits are
What backdoors are
What covert communication is
What spyware is
What adware is
What scareware is
What ransomware is
Software that is inherently
Intrusive
Annoying
Hostile
In its operation and performs its intent without consent of the owner
Types
Rootkits
Trojans
Ransomware
Scareware
Adware
Spyware
Worms
Viruses
Virus is used to refer to all types of malware
They are a piece of code or software that spreads from system to system by attaching itself to other files, once the file is accessed the code has been activated
Types
Logic bombs
Polymorphic viruses
Multipartite viruses
Marco viruses
Hoaxes
Prevention
Antivirus/Anti-malware
Applying updates
Education
Similar to a virus, however, doesn't require user intervention and is self replicate
How they work
No host program nor function
No user intervention
Replicate rapidly
Consume bandwidth and resources
Additional functions
Transmitting information from a victim system
Carrying a payload, such as a virus
A virus which can grant access to a system on behalf of the attacker
Once Trojan is installed, an attacker can perform
Modification or deletion of files
Installing keystroke loggers
Downloading or uploading files
Viewing the system user's screen
Installation software
Consuming computer storage space
Data theft
Crashing the victim's system
Antivirus/Anti-malware
Vulnerability scanners
Port scanners
A wide range of tools that can be used to take over a system
Common tools
Beast
Hard disk killer
Zombam.B
Amitis
Phatbot
CryptoLocker
RECUB (Remoted Encrypted Callback UNIX Backdoor)
Tiny Banker
Kedi RAT
Let Me Rule
Using wrappers
Types of wappers
Trojan Wrap
Teflon Oil Patch
Saran Wrap
Restorator
eLiTeWrap
Firekiller 2000
To assist in development of new Trojan viruses
A way in which many attacker gain access into systems
Types of backdoors
Rootkits
Services backdoor
Password-cracking backdoor
Process-hiding backdoors
Transferring information through a mechanism that was not designed for the purpose
Designed to collect and report information on a user's activities without the user's knowledge or concent
Software that is specifically designed to display ads on your system
Software that is designed to trick victims into purchasing or downloading useless or dangerous software
A type of malware designed to hold information hostage until a ransom is paid