TC

Malware

2.1.1 Types of Malware

  • Cybercriminals use many different types of malicious software, or malware, to carry out their activities.
  • Malware is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system.
  • Knowing what the different types are and how they spread is key to containing and removing them.
  • Common malware types listed in the material: Spyware, Adware, Backdoor, Ransomware, Scareware, Rootkit, Virus, Trojan horse, Worms.
  • Roles and relationships (quick orientation):
    • Spyware: tracks online activity and can log keystrokes; may capture sensitive information; can modify security settings; often bundles with legitimate software or Trojan horses.
    • Adware: automatically delivers advertisements, usually in a web browser; often accompanies spyware.
    • Backdoor: bypasses normal authentication to grant unauthorized, remote access to resources; runs in the background and is hard to detect.
    • Ransomware: holds a computer system or its data captive until payment is made; encrypts data to block access; can leverage specific system vulnerabilities; often spread via phishing emails or software vulnerabilities.
    • Scareware: uses scare tactics (e.g., fake OS warnings) to trick users into running a program that infects the system.
    • Rootkit: listed among common types but not described in detail in this excerpt; typically used to conceal presence and gain covert control.
    • Virus: a program that replicates and attaches to executable files; usually requires end-user interaction to activate; can be harmless or destructive; can mutate to avoid detection; spread via USB drives, optical disks, network shares, or email.
    • Trojan horse: masquerades as legitimate software but performs malicious actions; often does not self-replicate; may appear in image files, audio files, or games; acts as a decoy to bypass users.
    • Worms: self-replicating malware that can spread without user participation; does not require a host program to run; exploits vulnerabilities to propagate; includes a payload to damage systems or networks; historically responsible for large-scale incidents (e.g., Code Red).
  • Note: While this section lists several types, detailed descriptions for all terms (e.g., Rootkit) may not be provided in this excerpt.

2.1.1 Types of Malware (detailed descriptions for select types)

  • WORMS
    • Definition: a type of malware that replicates itself in order to spread from one computer to another.
    • Key distinction: unlike a virus, worms can run by themselves and do not require host programs or user participation after initial infection.
    • Common pattern: exploit system vulnerabilities, propagate themselves, and carry a payload to damage systems or networks.
    • Significance: worms can spread very quickly across networks and have caused major internet-wide incidents.
    • Notable example: Code Red worm infected
    • Example quantified: the Code Red worm infected 3\times 10^{5} servers in just 19\,\text{hours}.
  • TROJAN HORSE
    • Definition: malware that carries out malicious operations by masking its true intent.
    • Perception vs. reality: may appear legitimate but is dangerous.
    • Common vectors: often found in image files, audio files, or games.
    • Replication: Unlike viruses, Trojans do not self-replicate.
    • Function: acts as a decoy to sneak malicious software past unsuspecting users.
  • VIRUS
    • Definition: a computer program that, when executed, replicates and attaches itself to other executable files (e.g., documents) by inserting its own code.
    • Activation: most viruses require end-user interaction to initiate activation; can be programmed to act on a specific date or time.
    • Range of effects: can be relatively harmless (e.g., display a funny image) or destructive (e.g., modify or delete data).
    • Mutation: viruses can mutate to avoid detection.
    • Spread vectors: commonly spread by USB drives, optical disks, network shares, or email.
  • SCAREWARE
    • Definition: malware that uses scare tactics to trick you into taking a specific action.
    • Mechanism: mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program.
    • Consequence: if you run the program, your system becomes infected with malware.
  • BACKDOOR
    • Definition: malware used to gain unauthorized access by bypassing normal authentication procedures.
    • Capability: enables remote access to resources within an application and the ability to issue remote system commands.
    • Behavior: operates in the background and is difficult to detect.
  • RANSOMWARE
    • Definition: malware designed to hold a computer system or the data it contains captive until a payment is made.
    • Mechanism: usually works by encrypting data so you cannot access it.
    • Exploitation: can take advantage of specific system vulnerabilities to lock down access.
    • Delivery vectors: commonly spread through phishing emails with malicious attachments or via software vulnerabilities.
  • ADWARE
    • Definition: malware that delivers advertisements to a user, typically in a web browser.
    • Co-occurrence: often bundled with spyware and other software; can be noticeable via frequent pop-ups.
  • SPYWARE
    • Definition: software designed to track and spy on you.
    • Capabilities: monitors online activity, can log keystrokes, and capture sensitive information (e.g., online banking details).
    • Mechanism: can modify security settings on devices and often bundles with legitimate software or Trojan horses.
    • Goal: primarily to gather data for theft or targeted advertising.

2.1.2 Symptoms of Malware

  • Regardless of type, look for a set of common symptoms:
    • Increase in CPU usage, leading to slower device performance.
    • Computer freezes or crashes frequently.
    • Decreased web browsing speed.
    • Unexplainable problems with network connections.
    • Modified or deleted files.
    • Presence of unknown files, programs, or desktop icons.
    • Unknown processes running.
    • Programs turning off or reconfiguring themselves.
    • Emails being sent without your knowledge or consent.
  • Practical implication: these symptoms suggest a malware infection and warrant scanning, malware removal, and possible system restoration.

2.1.3 What Do You Think?

  • Match the descriptions to the correct malware type:

    • Malware designed to track your online activity and capture your data → Spyware
    • Software that automatically delivers advertisements → Adware
    • Malware that holds a computer system captive until a payment is made to the attacker → Ransomware
    • Malicious code that attaches to legitimate programs and usually spreads by USB drives, optical media, network shares or email → Virus
    • Malicious code that replicates itself independently by exploiting vulnerabilities in networks → Worms
  • Connections and implications (summary of relevance and applications):

    • Understanding types helps in targeted defense: different types have distinct propagation methods and payloads.
    • Network and system hardening: patching vulnerabilities reduces worm-like spread; application whitelisting and least privilege reduce Trojan/Backdoor impact.
    • User education: awareness of scams (phishing) reduces ransomware effectiveness; recognizing scareware prompts is crucial.
    • For incident response: differentiate behavior (e.g., self-replication vs. decoy behavior) to locate the root cause and remove persistence mechanisms.
    • Real-world relevance: many incidents rely on user interaction (phishing, drive-by downloads) to initiate infections; cybersecurity practices aim to minimize attack surface and improve detection.