Want to know what are Malware, Trojans, backdoors, and other Virus types?
Post Views:366
What’s your Reaction?
+1
0
+1
0
+1
0
+1
0
+1
0
What are Malware, Trojans, backdoors, and other Virus types?
Adware
Adwares are mainly designed to show advertisements on your screen without your permission. This can be categorized into PUP ( potentially unwanted program). Adwares are harmless but can be really annoying.
Examples of ADWARE
Fireball
Appearch
Dollar Revenue
DeskAd
PBot
Kuik
How is it deliverd?
You download a program or executable files and virus install itself without your permission.
Use the vulnerability of software on your computer to install directly without your permission
Email , usb ,shady softwares..etc
Impacts
System gets slow
unwanted pop ups
install other malware
Replicate themselves
Spams
etc…
How you can avoid it.
Avoid visiting sketchy sites and downloading untrusted software
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Virus
A malicious code initiated by user interaction and executes its own code without a user concent . The virus can be designed with replicating mechanisms. The word ‘virus’ comes from Latin which means poison.
Examples of Virus
Fireball
Stuxnet
Conficker
Shlayer
and the recent one COVID19 (LOL)
How is it deliverd?
You download a program or executable files and virus install itself without your permission.
Use the vulnerability of software on your computer to install directly without your permission
Email , usb ,shady softwares..etc
Impacts
Backdoor access to your systems
DNS highjacking
Kernal level access to your system
Slow your computer
How you can avoid it.
Avoid visiting sketchy sites and downloading untrusted software
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Sys admins can Configure External Email Warning message.
Understand what SCAREWARE is.
Worm
A malicious code that replicates itself and spread across other computers. Worms can cause major disruption in the network by causing unwanted traffic. Worms are more infectious than viruses they not only compromise the targeted computer but also spread t other computer in the network and infect them too.
Examples of Worm
ILOVEYOU
WANK
W32/Bolgimo.worm
Voyager
How is it deliverd?
You download a program or executable files and virus install itself without your permission.
Use the vulnerability of software on your computer to install directly without your permission
Email , usb ,shady softwares..etc
Impacts
Delete files
install aditional malwares
Replicates itself
Reduce network speed
Slow your computer
Do some specific task configured by the attacker.
How you can avoid it.
Configure ACL in routers and switches
Avoid visiting sketchy sites and downloading untrusted software
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Don’t fall for SPAM mails
Trojan Horse
A malicious code injected into an OS with the help of an application without user consent (backdoor). It will take full control of your system. Open up service from the system, for example, listen to specific port 443- HTTPS. Can be designed to avoid detection by antivirus. Once the code installed on your computer it can damage, disrupt steal, and infect your computer. Most of the backdoors are delivered through Trojan.
” A trojan can be a Swiss Army knife of hacking” Malwarebytes
Examples of Trojan
Rootkit
Trojan-DDOS
Trojan-Banker
FAKEAV
How is it deliverd?
You download a program or executable files and virus install itself without your permission.
Use the vulnerability of software on your computer to install directly without your permission
Email , usb ,shady softwares..etc
Impacts
Full access to your computer
install other Softwares (PUP) without user consent
installs Keylogger and steals your credentials
How you can avoid it.
Avoid visiting sketchy sites and downloading untrusted software
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Don’t fall for SPAM mails
Ransomeware
A malicious code injected to the System without user consent. This can restrict access to your system, files, or any other services in your computer and demands a ransom payment to get back your access.
Most of the Ransome payments are requested via cryptocurrencies. Once you make the payment we cannot trace the transaction thus the attacker can keep their anonymity.
Examples of Ransomeware
Wannacry
CryptoLocker
Bad Rabbit
Petya
Jigsaw
How is it deliverd?
You download a program or executable files and virus install itself without your permission.
Use the vulnerability of software on your computer to install directly without your permission
Email , usb ,shady softwares..etc
Impacts
Restrict access to your computer and personal files
Ransome payment request
No guarantee they will give back your full access
How you can avoid it.
Avoid visiting sketchy sites and downloading untrusted software
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Don’t fall for SPAM mails
Understand what SCAREWARE is.
Phishing
Phishing is the most common, simple, and most effective way of hacking. The users can be tricked into a page that looks legitimate and steals your user credentials, banking details, or any information which can be useful for the attacker.
Examples of Phishing
Spam Email
SMS Phishing
Social Engineering
How is it deliverd?
Email ,SMS, usb ,shady Websites ..etc
Impacts
Steals your user credentials
steals banking details
How you can avoid it.
Use Antivirus & Anti-malware
Cybersecurity awareness programs
Don’t fall for SPAM mails
Honorable mentions
Polymorphic Malware – A type of malware that changes itself to avoid detection. Any above types of malware can be polymorphic.
Armed Virus – Programmed to avoid detection and do specific damage to computers mainly used in cyber warfare.
Logic Bombs – As the name says it will execute a malicious program when certain logic is met.
Have you noticed something common to all malware, yes you can avoid a big junk of such malicious malware simply by getting basic security training or by self-educating.
When your company provides a cyber security awareness program make sure you do not miss it . . .