SlideShare a Scribd company logo
7
Most read
16
Most read
18
Most read
Common malware and countermeasures
MALWARE
(Malicious-Software)
Ask yourself this. This power point presentation is named malware.
Did you run a scan on it before opening.?
 A Malware is a specific set of codes or an
application , specifically designed to harm
and/or to gain access to a targeted computer
, or spread across multiple computers ; over
the use of a network or a data storage device.
Malware is a Malicious
Software
As old as the Software itself
Any harmful piece of program.
 Virus
 Worm
 Trojan horse
 Spyware
 Phishing
The first malware was a Virus
It Appeared in the realms of
computer were ELK Cloner and
Brain virus.
The “ELK Cloner” virus
appeared on Apple MAC in
1982 , and was created by Rich
Skrenta from
Pennsylvania, United States.
FIRST MALWARE OF THE WORLD
The Brain virus was programmed by two
brothers ; Amjad Farooq Alvi and Basit Farooq
Alvi , from Lahore Pakistan in 1986.
 1990 focused targeting on colleges and
universities
 Mid 20th century started targeting businesses
 After the year 2000 target was The Internet !
 To attack or takedown websites
• Destroying the online presence and credibility.
• Financial Theft.
BRIEF HISTORY OF MALWARES.
BRIEF HISTORY OF MALWARES.
The “Worn Outbreak ERA”
From 2000-2003
The “WEB THREAT ERA”
From 2004-2008
 Current Era of Malwares as termed by
experts:
BRIEF HISTORY OF MALWARES.
Common malware and countermeasures
 Evolution of Malware over (2003-2010):
Common malware and countermeasures
 Virus replicates into the network by creating copies
of itself in the computer files.
◦ Need a file to survive, infect and replicate
 Virus is designed to damage or read data on
computers or cause interruptions in work
 Melissa virus is a top known virus.
• Self duplicating malware that spreads out independentl
• Eats the Network
• Famous of all time and first Worm– Morris Worm
• Stuxtnet Worm !
 The Trojan Horse by the Greeks
 Hides in a legitimate software
 Tricks users to install it
 Gains privileged access to the OS
 Makes a botnet
 Non self replicating
 NetBus is a well known trojan from 1988
 As the name suggests SPYware!
 Steals information
 Hard to detect
 SpyAnytime, CASE, GATOR are spywares
 Pretend Play!
 Get financial or personal information
 Corporate espionage
 Fake calls and emails
 Common target today is social networking sites
Malwares will always be Chasing you!
Adopt layers of security for defense
◦ Anti Virus and Scans
◦ Install software from trusted vendors
◦ Avoid opening unknown attachments
◦ Do not insert media on known infected computer
◦ Clean out old files
Keep up your security shields
◦ Always re confirm source
◦ Monitor network traffic
◦ Audit logs
◦ Keep OS updated
◦ All other common security measures
KEEP YOUR GUARD UP
Malwares are now not
restricted to
computers only ,
these have made their
way into the world of
cell phones and
tablets.
Major affecting the
mobiles containing
the Android and IOS
operating system.
STATISTICS ; MALWARE , Type.
Malware Distribution by type:
In order to countermeasure the threats of
malware , the user should:
• Installing Anti-Malware
Applications.
• Often Get the data drive
Scan and analyzed.
• Gaining basic knowledge
about the way malwares
work.
• Installing Basic internet
Security Applications.

More Related Content

PPTX
Network security (vulnerabilities, threats, and attacks)
PPTX
Cybercrime and Security
PPTX
Cyber security
PDF
Ransomware: History, Analysis, & Mitigation - PDF
PPTX
Session Hijacking ppt
PPTX
Encryption
PPTX
Inetsecurity.in Ethical Hacking presentation
PPTX
Spyware powerpoint
Network security (vulnerabilities, threats, and attacks)
Cybercrime and Security
Cyber security
Ransomware: History, Analysis, & Mitigation - PDF
Session Hijacking ppt
Encryption
Inetsecurity.in Ethical Hacking presentation
Spyware powerpoint

What's hot (20)

PPTX
Firewall in Network Security
PPT
Keyloggers and Spywares
PPTX
Types of Hacker
PPT
Ethical hacking a licence to hack
PDF
Cyber Security and Cloud Computing
PPT
Reconnaissance & Scanning
PPTX
Introduction To Exploitation & Metasploit
PDF
Malicious software
PPT
IDS and IPS
PPT
Malware Detection using Machine Learning
PPT
Ch08 Authentication
PPTX
What is Ransomware
PPTX
Password Attack
ODP
Ethical hacking ppt
PPTX
Computer forensics
PPTX
Secret key cryptography
PDF
Computer forensics and Investigation
PPTX
Introduction to cyber security amos
PPTX
Password Cracking
PPTX
Cyber Security 03
Firewall in Network Security
Keyloggers and Spywares
Types of Hacker
Ethical hacking a licence to hack
Cyber Security and Cloud Computing
Reconnaissance & Scanning
Introduction To Exploitation & Metasploit
Malicious software
IDS and IPS
Malware Detection using Machine Learning
Ch08 Authentication
What is Ransomware
Password Attack
Ethical hacking ppt
Computer forensics
Secret key cryptography
Computer forensics and Investigation
Introduction to cyber security amos
Password Cracking
Cyber Security 03
Ad

Viewers also liked (20)

PDF
MR201504 Web Defacing Attacks Targeting WordPress
PDF
Anti-Virus Evasion techniques and Countermeasures
PPTX
Virus and its CounterMeasures -- Pruthvi Monarch
PDF
PPT
Dos threats and countermeasures
PPTX
Spyware and key loggers
PPT
Counter Measures Of Virus
PPTX
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
PPT
Threats, Vulnerabilities & Security measures in Linux
PPTX
Secure Hash Algorithm (SHA-512)
PPS
introduction to malwares,virus,trojan horse
PDF
Processing tech malicioussoftware_ecommerce
PPTX
Caesar cipher
PDF
Big Data For Flight Delay Report
PPTX
Pgp pretty good privacy
PPT
Secure hashing algorithm
PDF
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
PPT
PPT
Network Attacks
MR201504 Web Defacing Attacks Targeting WordPress
Anti-Virus Evasion techniques and Countermeasures
Virus and its CounterMeasures -- Pruthvi Monarch
Dos threats and countermeasures
Spyware and key loggers
Counter Measures Of Virus
Application hardening, Secure Socket Layer(SSL) & Secure Electronic Transacti...
Threats, Vulnerabilities & Security measures in Linux
Secure Hash Algorithm (SHA-512)
introduction to malwares,virus,trojan horse
Processing tech malicioussoftware_ecommerce
Caesar cipher
Big Data For Flight Delay Report
Pgp pretty good privacy
Secure hashing algorithm
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
Network Attacks
Ad

Similar to Common malware and countermeasures (20)

PPTX
Malware program by mohsin ali dahar khairpur
PPTX
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
DOC
Malware
DOC
Malware
PDF
COMPUTER VIRUSES AND WORMS.pdf
PPTX
PPTX
Virus and its types 2
PPTX
computer viruses
PPTX
MALWARE
PDF
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
PDF
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
PPTX
Information Technology - System Threats
PPTX
information about virus
PPTX
Network security .pptx
PPTX
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
PPTX
Types of Malwares, Information security.
PPT
Ratzan2
PPT
PPT
Historyofviruses
PPTX
Hacking And Virus.pptx
Malware program by mohsin ali dahar khairpur
Lecture 2-1.pptx Lec 04 Risk Management.pptxLec 04 Risk Management.pptxLec 04...
Malware
Malware
COMPUTER VIRUSES AND WORMS.pdf
Virus and its types 2
computer viruses
MALWARE
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
Grey Blob Childcare Brochure_20240604_151807_0000.pdf
Information Technology - System Threats
information about virus
Network security .pptx
Computer VIRUS ppt by AAMIR RAFIQUE.pptx
Types of Malwares, Information security.
Ratzan2
Historyofviruses
Hacking And Virus.pptx

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
cuic standard and advanced reporting.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
KodekX | Application Modernization Development
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
sap open course for s4hana steps from ECC to s4
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
MIND Revenue Release Quarter 2 2025 Press Release
Diabetes mellitus diagnosis method based random forest with bat algorithm
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Per capita expenditure prediction using model stacking based on satellite ima...
cuic standard and advanced reporting.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
KodekX | Application Modernization Development
Spectral efficient network and resource selection model in 5G networks
sap open course for s4hana steps from ECC to s4
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.

Common malware and countermeasures

  • 2. MALWARE (Malicious-Software) Ask yourself this. This power point presentation is named malware. Did you run a scan on it before opening.?
  • 3.  A Malware is a specific set of codes or an application , specifically designed to harm and/or to gain access to a targeted computer , or spread across multiple computers ; over the use of a network or a data storage device.
  • 4. Malware is a Malicious Software As old as the Software itself Any harmful piece of program.
  • 5.  Virus  Worm  Trojan horse  Spyware  Phishing
  • 6. The first malware was a Virus It Appeared in the realms of computer were ELK Cloner and Brain virus. The “ELK Cloner” virus appeared on Apple MAC in 1982 , and was created by Rich Skrenta from Pennsylvania, United States. FIRST MALWARE OF THE WORLD
  • 7. The Brain virus was programmed by two brothers ; Amjad Farooq Alvi and Basit Farooq Alvi , from Lahore Pakistan in 1986.
  • 8.  1990 focused targeting on colleges and universities  Mid 20th century started targeting businesses  After the year 2000 target was The Internet !  To attack or takedown websites • Destroying the online presence and credibility. • Financial Theft. BRIEF HISTORY OF MALWARES.
  • 9. BRIEF HISTORY OF MALWARES. The “Worn Outbreak ERA” From 2000-2003 The “WEB THREAT ERA” From 2004-2008
  • 10.  Current Era of Malwares as termed by experts: BRIEF HISTORY OF MALWARES.
  • 12.  Evolution of Malware over (2003-2010):
  • 14.  Virus replicates into the network by creating copies of itself in the computer files. ◦ Need a file to survive, infect and replicate  Virus is designed to damage or read data on computers or cause interruptions in work  Melissa virus is a top known virus.
  • 15. • Self duplicating malware that spreads out independentl • Eats the Network • Famous of all time and first Worm– Morris Worm • Stuxtnet Worm !
  • 16.  The Trojan Horse by the Greeks  Hides in a legitimate software  Tricks users to install it  Gains privileged access to the OS  Makes a botnet  Non self replicating  NetBus is a well known trojan from 1988
  • 17.  As the name suggests SPYware!  Steals information  Hard to detect  SpyAnytime, CASE, GATOR are spywares
  • 18.  Pretend Play!  Get financial or personal information  Corporate espionage  Fake calls and emails  Common target today is social networking sites
  • 19. Malwares will always be Chasing you! Adopt layers of security for defense ◦ Anti Virus and Scans ◦ Install software from trusted vendors ◦ Avoid opening unknown attachments ◦ Do not insert media on known infected computer ◦ Clean out old files
  • 20. Keep up your security shields ◦ Always re confirm source ◦ Monitor network traffic ◦ Audit logs ◦ Keep OS updated ◦ All other common security measures KEEP YOUR GUARD UP
  • 21. Malwares are now not restricted to computers only , these have made their way into the world of cell phones and tablets. Major affecting the mobiles containing the Android and IOS operating system.
  • 22. STATISTICS ; MALWARE , Type. Malware Distribution by type:
  • 23. In order to countermeasure the threats of malware , the user should: • Installing Anti-Malware Applications. • Often Get the data drive Scan and analyzed. • Gaining basic knowledge about the way malwares work. • Installing Basic internet Security Applications.

Editor's Notes

  • #3: MALWARE is basically a merge of two words. Malicious and Software.
  • #4: Initially the term “Malware was used in the sense of computers” but as technology progressed , malwares made their way into the realms of cell phones and any other computing device , with a standard OS running into it . For example an interesting fact is that certain devices like a GPS mapping device , or a house security devices are also prone to specialized malware attacks , but are less common than the standard computer counterparts.
  • #5: Malware is a broad term used for a Malicious Software and is as old as the Software itself. Without any technical details, any harmful piece of program is a malware. The way that particular malicious software / malware is designed to cause damage and spread into the system or network defines the type of malware. Much in same way as we define a Software as desktop based application, web application, web service, code executable etc. Similarly, malwares; based on their nature and affects, are defined into
  • #6: VirusWormTrojan horseSpywarePhishingApart from the difference in these types, all malwares cause harm in one way or another.
  • #7: Although the functionalities that a virus has were discovered way before ELK Cloner , these were never meant to harm data on a device , and were either appeared by an accident or were by-products of experimentations.An interesting fact about the ELK Cloner is that it was not actually intended to harm any computer , rather it was termed to be prank among students.
  • #8: The main intention of the malware was to replace the booting label of a floppy disk , to replace by a message of their own.Just like Vandalism , they set the tracks for electronic vandalism. The brothers now run a legal and fruitful internet Service provider business , ironically called the “BRAIN TELECOMMUNICATION LIMITED”.Their message that they replaced with the booting message of a floppy device was “Welcome to the Dungeon (c) 1986 Basit & Amjads (pvt) Ltd VIRUS_SHOE RECORD V9.0 Dedicated to the dynamic memories of millions of viruses who are no longer with us today - Thanks GOODNESS!! BEWARE OF THE er..VIRUS : this program is catching program follows after these messages....$#@%$@!!”
  • #9: As time progressed , the aggressiveness of these malwares increased. Up until 1990s the malwares were restricted to college and university as pranks and jokes.The middle of the twentieth century , the malwares started affecting businesses and even damaged the hardware of the devices.After the millennium , Many websites were also attacked , hindering damage on the users of these webpages.Fraud and online hacking using malware for the purpose of financial theft boomed in the decade.Online Bank Hacking and Social engineering also increased.
  • #10: Most experts termed the timeline as ERAs of Malware Evolutions.From 2000 till 2003 is termed as the era of the “WORM OUTBREAK” Focusing mostly on spreading Malwares.From 2004 till 2008 is termed as the era of the “WEB THREAT”. Focusing mostly on online financial thefts and frauds.Currently in 2013 , this era is considered to be the “SOCIAL ATTACKS ERA”
  • #11: This era is based on the platform based malware attacks , as the social networks have provided the option of go-ready sensitive information of an unexperienced user online .
  • #12: Simba.B : Root virus Responsible for gathering users financial Information and sabotaging data.Fake Alert.D. Trojan Malware responsible for data theft and data destruction.Ranson.BE78: Virus responsible for giving illegal access to a users database , to a hacker.Zbot.ANQ: Deadly virus responsible for corrupting important OS related registry files. This virus is specifically hard to detect.
  • #13: Depicting the exponential increase in the evolution in malware from the years 2008 to 2010.<add some stats for 2013 OR just add a line here to state what is the %age increase of malware from 2010 to 2013 >
  • #14: Without the proper knowledge , internet is not actually a safe place for a casual surfer.
  • #15: The distinguishing feature of Virus is that it is programmed to replicate itself and spread in the computer and network by copying itself into neighboring files. It is not a standalone malware and needs to reside in computer files to replicateVirus usually affects the CPU cycles, corrupts the infected files, logs keystrokes , display error / spam messages on the computer screens or when you open a file and most harmful of all, it resides in the boot sector (called root kit virus) and never goes away unless a fresh copy of OS is installed. The Melissa virus, written by David L Smith in homage to a Florida stripper, was the first successful email-aware virus and inserted a quote from The Simpsons in to Word documents. Smith was later sentenced to jail for causing over $80 million worth of damage
  • #16: Distinguishing feature of worm is that it is self replicating and does not need to reside in files to spread out. Usually it affects mostly Network services like bandwith by generating extra traffic or exploiting vulnerability of the networkMorris worm was the world’s first big time damaging worm that spread over the internet back in 1988One of the most recent worms is the Stuxtnet worm that started in 2012 to destroy the Iran’s nuclear system and is still to date active. Iran is trying to over come it
  • #17: The concept of a trojan malware is stolen from the Trojan horse that was used to gain access into the city of Troy that was otherwise too strong to get into. Same concept applies. Malware is hidden in a ligit software piece or a file with a back door for the virus to attack. Users think it is a valid file and install it. Its main purpose is to gain a privileged access to the OS and then elicit the access into the systems and makes it its slave to do damages to other systems. Netbus was introduced in 1988 and makes windows machines its slaveZues steals information by keystroke logging and was introduced in 2007
  • #18: Spyware is a malware program that gets installed on the computer through a file downloaded, game installed, email opened or installed on the computer by an attackerMainly it steals information: It logs all keystrokes, sends activity reports back to the hacker, monitors all traffic, copies data onto a remote computerVery hard to get rid of as they are hidden just like its hard to spot a spy amongst a friendly group of peopleSpyAnytime, CASE, GATOR are spywares that are readilyavaialble
  • #19: Phishing is when some one wants to get credit card information or user ID passwords or other such information to gain access into a system, the person will pretend to be a legitimate receiver of that information by faking its identity. E.g a fake call made to the support team to say that “this is Mr smith’ and my password is expired and email is not working so please tell me my new password over phone” Fake emails are also common to trick users into clicking links and supplying user Ids which are cachted by the hackerA Common target today is social networking sites. In 2006 , a phishing emails tricked users of myspace to give out their user IDs and passwords
  • #20: The best way to protect from Viruses is to ensure:Install and keep updated a good anti virus like Symmetric, nortronAlways scan USBs, DVDs before, preferably scan on another machine before plugging into your PCNever open emails or attachments that are not from a trusted sourceScan the emails and attachments specially if graphic filesAlways install software from their vendor’s original URLsWhen installing a new software, always scan it for virusesIf you know a usb is infected, or has been repeatedly plugged into a public network like a net cafe, never plug it inRemove unwanted files from computer as dormant files are trojansAlways re confirm source of an email and call asking for information
  • #21: Always re confirm source of an email and call asking for informationFor worms affecting networks, have network monitoring and scanning enabledHave system logging enabled to track keyloggers. Although sometimes they delete logs as wellAlways have patched systems as few worms explout known vulerabilities in OSHave good security practices
  • #22: As technology has progressed , we receive the ease of managing our finances online , on the go and mobile ; using our cell phones , which have also come under attack of a number of different malwares , specifically designed to spy on the user as he lives his life.
  • #23: Trojan horses rank as the most number of malware attacks overall.<remove the date from the pic>
  • #24: Install certified anti-virus and anti-spyware software in fresh copies of their OS.Do not accept random files from untrusted sources over the internet.Get the data drive Scan and analyzed by appropriate malware detecting soft-wares.Gaining basic knowledge , about how to operate several portable devices securely. (#Major reason of Malware Spread)Installing Basic internet Security Applications.