Presentation is loading. Please wait.

Presentation is loading. Please wait.

Malware, Anti-malware & Rats

Similar presentations


Presentation on theme: "Malware, Anti-malware & Rats"— Presentation transcript:

1 Malware, Anti-malware & Rats
Richard Gariboldi & Akshay Awasthi

2 Malware Definition

3 Types of Malware •Malware - An umbrella term. Short for malicious software, is any software used to disrupt computer operations. •Virus - A piece of code that is capable of copying itself and typically is used for corrupting the system or destroying data. •Worm - A standalone malware computer program that replicates itself in order to spread to other computers. •Trojan - Any malicious computer program which misrepresents itself to appear useful, routine, or interesting in order to persuade a victim to install it. 

4 Global Malware Activity

5 https://cybermap.kaspersky.com/
Live malware Map

6 https://youtu.be/kieAxktbyyw
Types Of MAlware

7 Total Malware

8 Early Malware 1970’s 1980’s Creeper Virus (1971) Wabbit Virus (1974)
Creeper virus is a computer virus that is most commonly recognized as the first computer virus. In 1971, Bob Thomas at BBN created Creeper as an experimental self-duplicating program that was intended not to inflict damage on, but to illustrate a mobile application. Wabbit Virus (1974) Wabbit was a self-replicating program, that made multiple copies of itself on a computer until it bogs down the system to such an extend that system performance is reduced to nil and the computer eventually crashes. This virus was named wabbit because of the speed at which it was able to replicate. ANIMAL (1974/5) ANIMAL asked a number of questions of the user in an attempt to guess  the type of animal that the user was thinking of, while the related  program PERVADE would create a copy of itself and ANIMAL in every  directory to which the current user had access.  1980’s Jürgen Kraus wrote his master thesis "Selbstreproduktion bei Programmen" (self-reproduction of programs) Stoned (1987) A computer infected with the original version had a one in eight probability[5][6]that the screen would declare: "Your PC is now Stoned!", a phrase found in infected boot sectors of infected floppy disks and master boot records of infected hard disks, along with the phrase "Legalise Marijuana". Later variants produced a range of other messages. The Morris Worm (1988) first to gain significant mainstream media attention. It also resulted in the first felony conviction in the US under the 1986 Computer Fraud and Abuse Act.[1]

9

10 Anti-malware Antimalware (anti-malware) is a type of software program designed to prevent, detect and remediate malicious programming on individual computing devices and IT systems.

11 Video links

12 How It Works Heuristic analysis - a method employed to detect previously unknown computer malware, as well as new variants of virus by checking the behavior of the malware rather than just the signatures. Checking Hashes – a method employed to detect known computer viruses by checking the MD5/SHA1 value of each file against known malware hashes

13 VirusTotal

14 History G Data Software AG (1987) McAfee (1987)

15 RATS Definition

16 How they work

17 What they are used for Remote Access Trojans (RATs) provide cybercriminals with unlimited access to infected endpoints. Using the victim’s access privileges, they can access and steal sensitive business and personal data including intellectual property, personally identifiable information (PII and patient health information (PHI). While automated cyber-attacks (e.g. Man-in-the-Browser) allow cybercriminals to attack browser-based access to sensitive applications, RATs are used to steal information through manual operation of the endpoint on behalf of the victim. Most Advanced Persistent Threat (APT) attacks take advantage of RAT technology for reconnaissance, bypassing strong authentication, spreading the infection, and accessing sensitive applications to exfiltrate data. RATs are commercially available (e.g. Poison Ivy, Dark Comet) and can be maliciously installed on endpoints using drive-by-download and spear-phishing tactics. 

18 How to protect yourself
Antivirus Antimalware Automatic Updates for antimalware as well as System Updates Don’t click the link! If it sounds too good to be true it probably is Be Smart!

19 Extra Links to show how easy this really is


Download ppt "Malware, Anti-malware & Rats"

Similar presentations


Ads by Google