MALWARE
Group 5
Angel Marcena
John Loyd Anastacio
Justine Claire Baltazar
Carla Mae Foronda
Mikyla Drapite
Melissa Jane Rumbaoa
WHAT IS MALWARE?
Malware, short for malicious software, refers to any software
intentionally designed to harm, exploit, or compromise
computer systems, networks, or data, with the primary
purpose of stealing sensitive information, disrupting
operations, gaining unauthorized access, or extorting money
from victims, often used by cybercriminal for financial gain.
ORIGINS AND PURPOSE
OF MALWARE
Purpose: The primary goal of malware is to steal
sensitive data, disrupt system operations, gain
unauthorized access, or demand ransoms from users or
organizations.
Origin: Early examples of malware include the "Creeper"
virus, which was a simple program that spread across
networks, and the "Elk Cloner" virus, a prank program
created by a teenager that infected Apple computers
through floppy disks.
DIFFERENT TYPES
OF MALWARE
DIFFERENT TYPES OF MALWARE
Virus: Self-executing malware that spreads by
infecting other programs or files.
Worm: Self-replicating malware that spreads without
needing a host or human intervention.
Trojan Horse: Malicious software disguised as legitimate
to gain system access and execute harmful functions
Spyware: Collects user data and monitors activity
without the user's knowledge.
DIFFERENT TYPES OF MALWARE
Ransomware: Encrypts a victim's data and demands
a ransom for decryption.
Rootkit: Provides administrator-level access to a
system, allowing deeper control for attackers.
Backdoor Virus/RAT: Creates a hidden entry point for
remote access without alerting the user or security.
Adware: Tracks user browsing behavior to display
targeted advertisements.
DIFFERENT TYPES OF MALWARE
Keyloggers: Monitors and records user actions,
including keystrokes and activities on the computer.
WHAT IS VIRUS
AND TYPES OF
VIRUS?
WHAT IS VIRUS ?
A computer virus is a malicious program that spreads itself
between computers without the user's knowledge, causing
harm like corrupting files or stealing data. Cybercriminals
create them to gain control of systems and steal information
by deceiving users.
Resident Virus: Hides in RAM and can interfere with
system operations, even attaching to antivirus software
files.
Multipartite Virus: Infects the entire system by
executing unauthorized actions on the operating
system, folders, and programs.
TYPES OF VIRUS
Direct Action Virus: Targets specific file types, mainly
executable files (.exe), making it easier to detect and
remove due to its focused nature
Browser Hijacker: Infects web browsers and redirects
users to malicious websites, easily identifiable.
Overwrite Virus: Overwrites content of files, infecting
entire folders and programs.
TYPES OF VIRUS
Web Scripting Virus: This virus hides within website
code, including links, ads, images, and videos. It can
infect systems when users download malicious files or
visit compromised websites.
File Infector Virus: This virus targets executable files
(.exe) and can slow down programs or damage system
files when a user runs them.
TYPES OF VIRUS
Network Virus: These viruses spread through network
connections and replicate themselves through shared
resources.
Boot Sector Virus: This virus is often found on USB
drives or in email attachments. When activated, it can
infect the system's master boot record, potentially
causing damage to the system.
TYPES OF VIRUS
HOW TO PREVENT
MALWARE
To prevent malware, prioritize email security, phishing
education, system patching, hardware maintenance,
vulnerability assessment, and regular file backups for
ransomware.
Antivirus software, backed by Kaspersky, Symantec, and
Trend Micro, is widely used for malware protection, while
endpoint security provides broader network protection
with anti-spyware, firewalls, and intrusion prevention.
MALWARE PROTECTION
HOW TO DETECT
MALWARE
The text explains that malware infection is highly likely, even
with preventative measures. It details how to detect malware,
recommending advanced visibility tools and network
monitoring tools, especially SIEM tools for corporate
environments. These tools analyze network traffic and logs
for signs of infection.
Removing malware is difficult and depends on the type of
malware. CSO offers resources for removing rootkits,
ransomware, and cryptojacking, including a guide to
auditing the Windows registry. Tech Radar is suggested as
a source for free malware removal tools.
MALWARE REMOVAL
MALWARE EXAMPLES
There is a long, storied history of malware, dating back to
infected floppy disks swapped by Apple II hobbyists in the
1980s and the Morris Worm spreading across Unix machines
In 1988. Some of the other high-profile malware attacks have
included:
1. ILOVEYOU (2000) A computer worm that
spread rapidly through email attachments
disguised as a love letter.
2. SQL Slammer (2003) A worm that exploited
vulnerabilities in Microsoft SQL servers.
3. Conficker (2008) A worm that targeted
unpatched Windows systems, spreading through
malicious code injections and phishing emails.
4. Zeus (late 2000s) A Trojan keylogger
designed to steal banking credentials by
recording keystrokes.
5. CryptoLocker (2013) One of the first major
ransomware attacks that encrypted victims’ files.
6. Stuxnet (2010) A highly advanced worm
developed by U.S. and Israeli intelligence
agencies.
MALWARE TRENDS
Malware trends refer to the changes in how cybercriminals
create and use malware over time. These trends show which
types of malware are popular, who is being targeted, and
how attacks are evolving.
Key Factors in Malware Trends: Hackers follow the
money – They choose attack methods that give them the
most profit. Some malware types become less popular –
For example, cryptomining malware has declined
because cryptocurrency values dropped. Ransomware is
getting more targeted – Instead of attacking random
people, hackers now focus on businesses and
governments, demanding large ransoms.
MALWARE ATTACKS
ON BUSINESSES SPIKE
Malware attacks on businesses are on the rise, with a
significant increase in the number and sophistication of
these attacks. This trend is particularly concerning as
businesses rely heavily on digital infrastructure for
operations.
CRYPTOMINING
ATTACKS DECLINE
Malwarebyte Labs report has seen a shift away from
cryptomining starting in the second quarter of 2018.
Cryptomining attacks involve cybercriminals hijacking
computing resources from unsuspecting victims to mine
cryptocurrencies without their consent.
Kujawa notes that small and medium-sized
businesses(SMBs) are becoming more popular targets.
Ransomware detections actually declined by 26
percent worldwide in 2018, according to the
Malwarebytes report.
RANSOMWARE BECOMING
MORE TARGETED
THANK YOU