list of malwares

42
MALWARE

Upload: vishalya-dulam

Post on 08-Jul-2015

153 views

Category:

Education


0 download

DESCRIPTION

Malware and its types. People knows about virus, but they dont know about different type of malwares exist now a days.

TRANSCRIPT

Page 1: List of Malwares

MALWARE

Page 2: List of Malwares

LIST OF MALWARE

Virus

Worms

Trojans

Logic Bombs

Rootkits

Backdoors

Botnet

Spyware

Adware

Key Loggers

Rogue security software

Ransomware

Browser Hijacker

Page 3: List of Malwares

VIRUS

It is a malicious computer code that reproduce itself on

the same computer.

Attacks:

A virus first inserts itself into a computer files, these

are several types:

1.Erases files from hardware.

2.Reformatted the hard disk drive.

3.Turned off the computer’s security settings.

4.Caused to crash a computer repeatedly.

Page 4: List of Malwares

VIRUS PROTECTION

Install an antivirus program.

Don't open email attachments unless you're

expecting them.

Keep your computer updated.

Use a firewall. Windows Firewall (or any other

firewall) can help alert you to suspicious activity if a

virus attempts to connect to your computer.

Page 5: List of Malwares

VIRUS REMOVAL

Enter Safe Mode. Keep your PC disconnected from

the Internet, and don't use it until you're ready to

clean your PC.

Delete Temporary Files. Now that you're in Safe

Mode, you'll want to run a virus scan.

Download Malware Scanners.

Run a Scan With Malwarebytes.

Page 6: List of Malwares

WORMS

A Worm is a malicious computer code that

reproduce itself on the same computer and on the

other computer by using the networks.

Attacks:

It searches for the same vulnerabilities in other

computer’s in a network and effects them.

Page 7: List of Malwares

WORM PROTECTION

Scanning any potentially suspicious files with an

antivirus solution.

Keeping antivirus programs up-to-date.

Worm Removal:

Enter Safe Mode. Keep your PC disconnected from

the Internet, and don't use it until you're ready to

clean your PC.

Download Malware Scanners.

Page 8: List of Malwares

TROJANS

It is an executable program, advertisers performing

one activity, but actually does something else which

may effects the computer.

Attacks:

Deleting data

Blocking data

Modifying data

Copying data

Disrupting the performance of computers or

computer networks

Page 9: List of Malwares

TROJANS PROTECTION

Protect your computer with strong security

software.

Enable automatic Windows updates.

Be careful when engaging in peer-to-peer (P2P)

file-sharing.

Download the latest version of your browser.

Page 10: List of Malwares

TROJAN REMOVAL

Disable System Restore.

Install an anti-malware program, if you haven’t

already.

Reboot into Safe Mode.

Page 11: List of Malwares

ROOTKIT

Rootkit is a set of software used by attacker to hide

the actions of the other types of malicious software.

By hiding Log-in records.

Attacks:

They alter or replace OS files with modified versions

designed to ignore malicious activities.

Page 12: List of Malwares

ROOTKIT PROTECTION

Disable Auto run windows PC.

Install tools that will protect the computer from

rootkits.

Anti Rootkit tools like AVG Anti-Rootkit, Panda Anti-

Rootkit, Malwarebytes Anti-Rootkit.

Page 13: List of Malwares

ROOTKIT REMOVAL

By using one of the tools named Bitdefender

Rootkit Remover, we can remove Rootkit.

The Bitdefender Rootkit Remover deals with known

rootkits quickly and effectively and removes from

PC.

Page 14: List of Malwares

LOGIC BOMBS

A logic bomb is a piece of code intentionally inserted

into a software system that will set off a malicious

function when specified conditions are met.

Attacks:

A dissatisfied employee had counted on this to

cause the company’s stock to drop; the employee

can earn money from the price drop.

Attackers can also use a combination of spyware

and logic bombs in an attempt to steal your identity

Page 15: List of Malwares

LOGIC BOMBS PROTECTION

Do not download pirated software -- Logic bombs

can by distributed by exploits that promote software

piracy.

Do not click on suspicious web links -- Clicking on

an unsafe link may direct you to an infected website

that may host the logic bomb malware.

Apply patches to other software installed on your

computer- like such as Microsoft Office software,

Adobe products.

Page 16: List of Malwares

LOGIC BOMBS REMOVAL

Run Malwarebytes Anti-Malware.

Run the anti spyware removal programs Spybot -

Search & Destroy.

Page 17: List of Malwares

ADWARE

It is a software program that deliversadvertising unwanted for the users.

It also performs tracking functions.Attacks: Adware ,it usually includes code that tracks a

user's personal information and passes it on tothird parties, without the user's authorization orknowledge. This practice has been dubbedspyware and has prompted an outcry fromcomputer security and privacy advocates,including the Electronic Privacy InformationCentre.

Page 18: List of Malwares

ADWARE PROTECTION

Remove browser add-ons

You might need to remove add-ons from your

browser:

Manage add-ons in Internet Explorer

Disable or remove Add-ons in Firefox

Uninstall extensions in chrome

Page 19: List of Malwares

ADWARE REMOVAL

Uninstall Pop-up Ads malicious programs from your

computer

Remove Pop-up Ads from Internet Explorer, Firefox

and

Remove Pop-up Ads virus with Malwarebytes Anti-

Malware Free

Page 20: List of Malwares

BROWSER HIJACKER

Browser hijacking is the modification of a web browsers’ settings. The term hijacking is used as the changes are performed without the user's permission. A browser hijacker may replace the existing home page, error page, or search page with its own.

ATTACK:

Browser hijackers are generally distributed by downloading shareware or freeware applications from malicious and unauthorized websites. If you have clicked any pop-ups or ads link which displays click ‘Yes’ or ‘No’ then that link might have downloaded browser hijacker in your PC.

Page 21: List of Malwares

BROWSER HIJACKER PROTECTION

Remain up to date with Windows security updates

as they help you to improve your computer’s

security and you will be safe.

Install a good anti-spyware software on your PC

which will act as a shield between your PC and

Browser Hijacker and protect it from any Browser

Hijacker inventions.

Update your anti-spyware software definitions on a

regular basis at least once a day. This will help you

to detect new Browser Hijacker’s on your PC.

Page 22: List of Malwares

BROWSER HIJACKER REMOVAL

Scan for Browser Hijacker’s and other threats on

your PC on a regular basis at least once a week.

Page 23: List of Malwares

KEY LOGGERS

A key logger can be hardware or software.Attacks:

A key logger inspects keystrikes and send the information to the attacker.

Page 24: List of Malwares

KEY LOGGERS PROTECTION

Make sure that no unwanted hardware device is

connected to your computer.

Install and scan your computer with anti-malware

software.

keeping track of your authorized programs may be

all you need to do. If there’s a mystery guest on

your control panel.

Page 25: List of Malwares

KEY LOGGERS REMOVAL

Many software tools can be used to get rid of

keylogging.

If there is any keylogging device connected your

computer, disconnect it.

Install absolute keylogger removal tool.

Page 26: List of Malwares

RANSOMWARE

Ransomware is a type of malware which restricts

access to the computer system that it infects, and

demands a ransom paid to the creator(s) of the

malware in order for the restriction to be removed.

Page 27: List of Malwares

RANSOMWARE PROTECTION

Keep all of the software on your computer up to

date. Make sure automatic updating is turned on to

get all the latest Microsoft security updates.

Keep your firewall turned on.

Don't open spam email messages.

Scan your computer with the Microsoft Safety

Scanner.

Page 28: List of Malwares

RANSOMWARE REMOVAL

To detect and remove ransomware and other

malicious software that might be installed on your

computer, run a full-system scan with an

appropriate, up-to-date, security solution. The

following Microsoft products can detect and remove

this threat:

Windows Defender (built into Windows 8)

Microsoft Security Essentials

Microsoft Safety Scanner

Page 29: List of Malwares

BOTNET

Criminals distribute malicious software that can

turn your computer in to a bot also known as

zombie when it occurs it performs automated

task over the internet. They use it to send out

spam emails and messages. If this occurs to

your computer then your computer will get slow

down and you might be helping criminals.

Page 30: List of Malwares

BOTNET PROTECTION

E-mail with malware as an attachment.

Drive-by malware.

Plug-in and application risks.

Hazard: data storage devices.

Page 31: List of Malwares

BOTNET REMOVAL

Phrozensoft Mirage Anti-Bot.

Trend Micro RUBotted.

Norton Power Eraser.

BotHunter.

Avira BotFrei.

Page 32: List of Malwares

BACKDOORS

A backdoors is a mean of access to a computer program that bypasses security mechanisms.

Attacks:

Back door can be an installed program or could be a modification to an existing program. The installed program may allow a user log on to the computer without a password with administrative privileges. Many programs are available on internet to create back door attacks on systems. One of the more popular tools is Back Orifice which is also available for free download on internet.

Page 33: List of Malwares

BACKDOORS PROTECTION

Profiling the website's traffic and comparing it

against an extensive database of backdoors.

Enabling the detection to overcome file obfuscation

and signature mutation.

Page 34: List of Malwares

BACKDOORS REMOVAL

When AVG real-time antivirus protection detects a

virus in your computer, the AVG Detection window

is displayed, with two options:

Protect Me: this is the recommended action. It will

remove the threat from your device.

Ignore the threat: will do nothing to remove the

virus, however the file will be blocked so infection

won't spread.

It is recommended to perform a full device scan

after dealing with any threat, to make sure it was

successfully deleted.

Page 35: List of Malwares

SPYWARE

Spyware is infiltration software that secretly monitors unsuspectingusers. It can enable a hacker to obtain sensitive information, suchas passwords, from the user's computer. Spyware exploits userand application vulnerabilities and is often attached to free onlinesoftware downloads or to links that are clicked by users.

Attacks:•Slow computer performance.

• System instability .

• New browser toolbars or menu.

• New shortcuts.

• Hijacked home page.

• Increased pop-ups.

Page 36: List of Malwares

SPYWARE PROTECTION

The use of system resources, including what

programs are installed on their computers.

The collection,use,and distribution of personal or

otherwise sensitive information.

Material changes that affect the user experience

privacy, or system security.

Page 37: List of Malwares

SPYWARE REMOVAL

Check Installed Programs for items that don't

belong on your computer. Use this method with

extreme caution. Control Panel lists many

programs, most of which are not spyware.

Reinstall Windows. Some spyware can hide itself

so well that it can't be removed.

Page 38: List of Malwares

ROGUE SECURITY SOFTWARE

This one deceives or misleads users. It pretends to

be a good program to remove Malware infections,

but all the while it is the Malware. Often it will turn

off the real Anti-Virus software. The next image

shows the typical screen for this Malware program,

Antivirus 2010.

Page 39: List of Malwares

ATTACKS

Gives a false sense of security.

Fraudulent transaction.

Interrupts legitimate security program operations.

Prevents you from visiting legitimate security

software vendor sites

Page 40: List of Malwares

PROTECT

The best way to avoid rogues is to prevent them

from being installed in the first place.

Another way you can protect yourself is to be wary.

Legitimate security companies won’t try to scare

you into using their scanners.

Page 41: List of Malwares

REMOVE

Don’t pay the fee they ask for – this could create

further problems and expose you to further fraud or

identity theft.

If you have problems getting rid of a rogue the

following article might help

Page 42: List of Malwares