0% found this document useful (0 votes)
5 views4 pages

Unit Iv

Uploaded by

pmahakalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Unit Iv

Uploaded by

pmahakalkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

UNIT-IV

Malware (short for malicious software) is any software program or code that is intentionally
designed to disrupt, damage, steal, or gain unauthorized access to computer systems,
networks, or data.
👉 In simple terms: Malware is harmful software created to exploit or harm computers and
users.
Key Points in Definition:
 Intentional: Created with a malicious purpose.
 Types: Includes viruses, worms, trojans, ransomware, spyware, adware, etc.
 Effects: Can steal information, damage files, slow down systems, or give attackers
control over devices.

Introduction to Malware Analysis History

Malware analysis is the process of dissecting malicious software to understand its behavior,
origin, and potential impact

. The history of malware analysis mirrors the evolution of malware itself, progressing from
basic techniques for examining simple programs to sophisticated, multi-layered approaches
for analyzing complex and evasive threats.

Early days (1970s–1990s)

 1971: The first "anti-virus". In response to the experimental, but non-malicious,


Creeper worm on the ARPANET, programmer Ray Tomlinson created Reaper—the
first known program designed to find and delete another program.

 Malware spread via physical media: Before widespread internet access, malware
primarily spread through infected floppy disks. Early malware analysis consisted of
manually investigating the code of these isolated infections.

o 1986: The Brain virus was the first IBM PC virus to spread globally through the
boot sectors of floppy disks.

 Simple static analysis: Analysts studied malware files without executing them. This
involved examining the binary code for unique strings and patterns—the basis for
early signature-based detection.
 Early reverse engineering: As malware became more complex, analysts used basic
debuggers and disassemblers to translate machine code into human-readable
assembly language to understand program logic.

The internet era (1990s–2000s)

 Mass-mailing worms: Malware like the Melissa (1999) and ILOVEYOU (2000) worms,
which spread rapidly via email, forced analysts to develop faster, more automated
methods for processing large numbers of samples.

 Emergence of dynamic analysis: As malware writers developed obfuscation


techniques like polymorphism and encryption to evade signature-based detection,
analysts turned to dynamic analysis. This involved running malware in a safe,
controlled environment, called a "sandbox," to observe its behavior.

 Sandbox technology: Early sandboxes, such as Cuckoo Sandbox (open-source) and


commercial products, automated the monitoring of a malware's actions, including
file and registry changes and network traffic.

 Behavioral analysis: This technique moved beyond simple file signatures to observe
and flag anomalous behavior, such as a process making unusual network connections
or attempting to modify system files.

The modern era (2010s–present)

 Sophisticated and evasive malware: Modern malware often detects if it's running in a
virtual or sandboxed environment and alters its behavior to avoid analysis. This cat-
and-mouse game requires analysts to use more advanced and stealthy techniques.

 Advanced Persistent Threats (APTs) and Nation-state attacks: The discovery of


sophisticated malware like Stuxnet (2010), designed for industrial sabotage, and
Flame (2012), for cyberespionage, showed a shift toward targeted attacks with
specific political or corporate objectives. Analyzing these required advanced reverse
engineering and an understanding of geopolitical motivations.

 Cloud-based automation: The sheer volume of new malware has made manual
analysis impractical. Cloud-based analysis platforms, such as Hybrid Analysis and
VirusTotal, automate the entire analysis process, leveraging artificial intelligence and
machine learning to analyze and report on threats at scale.

 Memory forensics: This advanced technique involves examining memory dumps from
a compromised system to find artifacts of fileless malware, code injection, and
rootkits.

 Integration of AI and machine learning: AI models are now used to rapidly classify
and detect new malware variants by recognizing patterns in code and behavior. This
has enhanced signature-based techniques and enabled proactive detection of
unknown threats.

The future of malware analysis

The history of malware analysis is one of constant adaptation. As malware continues to


evolve with the use of AI and emerging technologies, analysis techniques must advance to
keep pace. The field will likely continue to emphasize automation, AI-driven analysis, and
threat intelligence sharing to stay ahead of increasingly sophisticated and targeted threats.

1. Virus

 Definition: Malicious code that attaches itself to files or programs and spreads when
the infected file is executed.

 Effect: Can corrupt files, slow down systems, or crash programs.

2. Worm

 Definition: Standalone malware that spreads automatically across networks without


user action.

 Effect: Can consume bandwidth, slow networks, or delete files.

3. Trojan Horse (Trojan)

 Definition: Malware disguised as legitimate software to trick users into installing it.

 Effect: Provides unauthorized access to attackers; may steal data.

4. Ransomware

 Definition: Malware that encrypts files and demands payment to unlock them.

 Effect: Loss of access to important files or systems.

5. Spyware

 Definition: Software that secretly monitors user activity and collects sensitive
information.

 Effect: Passwords, credit card info, and browsing habits can be stolen.

6. Adware

 Definition: Malware that displays unwanted advertisements or pop-ups.

 Effect: Slows system performance; may redirect users to malicious websites.


7. Rootkit

 Definition: Malware designed to gain administrative (root) access and hide its
presence.

 Effect: Enables attackers to control systems stealthily.

8. Keylogger

 Definition: Malware that records keystrokes to capture sensitive information.

 Effect: Can steal passwords, banking details, and private messages.

9. Botnet / Bots

 Definition: Malware that turns infected devices into “bots” controlled by an attacker.

 Effect: Can be used for large-scale attacks like DDoS.

Type of
Definition Effect / Damage Example
Malware

Malicious code attached to Corrupts files, slows


Virus CIH Virus
files/programs system, crashes programs

Self-replicating malware that Consumes bandwidth, WannaCry (also


Worm
spreads across networks deletes files ransomware)

Trojan Horse Malware disguised as Provides unauthorized


Zeus Trojan
(Trojan) legitimate software access, steals data

Encrypts files and demands Loss of access to


Ransomware CryptoLocker
payment files/systems

Monitors user activity Steals passwords,


Spyware Pegasus
secretly banking info

Displays unwanted ads/pop- Slows system, redirects


Adware Fireball
ups to malicious sites

Gains admin access and Gives stealth control over


Rootkit Sony Rootkit
hides presence system

Steals passwords, credit


Keylogger Records keystrokes Ghost Keylogger
card info

Turns devices into remote- Launches DDoS, spam


Botnet / Bots Mirai Botnet
controlled bots campaigns

You might also like