Malicious Software
Understanding Malware and Cyber Threats
Viruses, Worms, Trojans, and More
What is Malicious Software?
Malware (malicious software) refers to any software intentionally designed to cause harm to a computer system, network, or user.
Common Goals:
- Steal sensitive information
- Disrupt system operations
- Gain unauthorized access
- Financial gain
- Espionage and surveillance
Effects of Malware
- Data Loss: Deletion or corruption of files
- System Disruption: Crashes and performance issues
- Financial Loss: Theft and extortion
- Privacy Breach: Identity theft and surveillance
- Reputation Damage: Business and personal impact
Computer Virus
Definition: Malicious program that attaches itself to legitimate files and spreads when infected files are executed
Characteristics:
- Requires host file to survive
- Self-replicating
- Spreads through file sharing
- Can remain dormant
Types:
- File infector viruses
- Boot sector viruses
- Macro viruses
Virus Lifecycle
- Infection: Virus attaches to host file
- Dormant Phase: Waits for trigger condition
- Propagation: Spreads to other files/systems
- Triggering: Activates based on condition
- Execution: Delivers malicious payload
Example:
User opens infected email attachment →
Virus infects system files →
Spreads via USB drives →
Activates on specific date →
Deletes critical files
User opens infected email attachment →
Virus infects system files →
Spreads via USB drives →
Activates on specific date →
Deletes critical files
Computer Worm
Definition: Standalone malicious program that replicates and spreads independently across networks
Key Differences from Virus:
- No host file required
- Self-contained program
- Network propagation
- Exploits system vulnerabilities
Famous Examples:
- Morris Worm (1988)
- ILOVEYOU (2000)
- Conficker (2008)
Worm Propagation Methods
- Email: Spreads through email attachments
- Network Scanning: Finds vulnerable systems
- File Sharing: Exploits P2P networks
- Removable Media: USB drives, CDs
- Instant Messaging: Social media platforms
Propagation Example:
1. Worm scans IP range for vulnerable systems
2. Exploits security flaw to gain access
3. Copies itself to target system
4. Continues scanning from new location
5. Exponential spread across network
1. Worm scans IP range for vulnerable systems
2. Exploits security flaw to gain access
3. Copies itself to target system
4. Continues scanning from new location
5. Exponential spread across network
Trojan Horse
Definition: Deceptive software disguised as legitimate programs that performs malicious actions
Characteristics:
- Appears beneficial or harmless
- Requires user interaction
- Does not self-replicate
- Creates backdoors
Common Disguises:
- Free software downloads
- Software updates
- Games and utilities
- Email attachments
Types of Trojans
- Remote Access Trojans (RATs): Remote control
- Banking Trojans: Steal financial information
- Rootkit Trojans: Hide malicious activities
- DDoS Trojans: Launch distributed attacks
- Spy Trojans: Monitor user activities
Banking Trojan Example:
User downloads "free game" →
Trojan installs silently →
Monitors banking websites →
Steals login credentials →
Transfers money to attacker accounts
User downloads "free game" →
Trojan installs silently →
Monitors banking websites →
Steals login credentials →
Transfers money to attacker accounts
Logical Bomb (Time Bomb)
Definition: Malicious code triggered by specific conditions or events
Trigger Conditions:
- Specific date/time
- User actions
- System events
- File operations
- Network conditions
Example Scenarios:
• Delete files on Friday 13th
• Activate when employee is terminated
• Trigger after 30 days without payment
• Execute when specific file is accessed
• Delete files on Friday 13th
• Activate when employee is terminated
• Trigger after 30 days without payment
• Execute when specific file is accessed
Keylogger
Definition: Software that records keystrokes to capture sensitive information
Types:
- Software Keyloggers: Installed programs
- Hardware Keyloggers: Physical devices
- Browser Keyloggers: Web-based capture
Captured Information:
- Login credentials
- Credit card numbers
- Personal messages
- Confidential documents
Sniffer (Network Sniffer)
Definition: Tool that intercepts and monitors network traffic to capture data packets
Legitimate Uses:
- Network troubleshooting
- Performance monitoring
- Security analysis
Malicious Uses:
- Password interception
- Email content capture
- Credit card theft
- Sensitive data extraction
Protection: Use HTTPS and encrypted protocols to protect against sniffing
Backdoor
Definition: Hidden entry point that bypasses normal authentication mechanisms
Types:
- Software Backdoors: Code-based access
- Hardware Backdoors: Physical access points
- Cryptographic Backdoors: Weak encryption
Creation Methods:
- Trojan installation
- System compromise
- Insider threats
- Supply chain attacks
Modern Malware Trends
- Ransomware: Encrypts files for ransom
- Fileless Malware: Lives in memory only
- AI-Powered Malware: Adaptive and evasive
- Mobile Malware: Targets smartphones/tablets
- IoT Malware: Infects connected devices
- Cryptojacking: Unauthorized cryptocurrency mining
Ransomware - Modern Threat
Definition: Malware that encrypts victim's files and demands payment for decryption
Attack Process:
- Initial infection (email, web, USB)
- File encryption using strong cryptography
- Ransom note display
- Payment demand (usually cryptocurrency)
- Threatened file deletion if not paid
Famous Examples:
• WannaCry (2017) - Global outbreak
• Petya/NotPetya (2017) - Ukraine focus
• Ryuk (2018+) - Targeted attacks
• WannaCry (2017) - Global outbreak
• Petya/NotPetya (2017) - Ukraine focus
• Ryuk (2018+) - Targeted attacks
Malware Type Comparison
| Type | Replication | Host Required | User Action | Primary Goal |
|---|---|---|---|---|
| Virus | Yes | Yes | Yes | Damage/Spread |
| Worm | Yes | No | No | Network Spread |
| Trojan | No | No | Yes | Stealth Access |
| Keylogger | No | No | Varies | Data Theft |
| Backdoor | No | No | No | Remote Access |
Common Infection Vectors
- Email Attachments: Malicious files in messages
- Web Downloads: Infected software/files
- Removable Media: USB drives, CDs
- Network Vulnerabilities: Unpatched systems
- Social Engineering: Tricking users
- Supply Chain: Compromised software distribution
Malware Detection Methods
- Signature-based: Known malware patterns
- Heuristic Analysis: Suspicious behavior detection
- Behavioral Monitoring: Runtime activity analysis
- Machine Learning: AI-powered detection
- Sandboxing: Isolated execution environment
Modern Approach: Combine multiple detection methods for comprehensive protection
Malware Prevention
- Antivirus Software: Real-time protection
- Regular Updates: OS and software patches
- Email Security: Filter attachments and links
- User Education: Security awareness training
- Network Segmentation: Limit spread impact
- Backup Strategy: Regular data backups
Incident Response
If Malware is Detected:
- Isolate: Disconnect affected systems
- Identify: Determine malware type and scope
- Contain: Prevent further spread
- Eradicate: Remove malware completely
- Recover: Restore systems and data
- Learn: Update defenses based on incident
Anti-Malware Tools
- Antivirus/Anti-malware: Signature and behavior-based
- Firewalls: Network traffic filtering
- EDR Solutions: Endpoint detection and response
- SIEM Systems: Security information management
- Threat Intelligence: Real-time threat data
Security Best Practices
- Keep all software updated
- Use reputable antivirus software
- Enable automatic updates
- Regular system backups
- Email attachment caution
- Avoid suspicious downloads
- Use strong passwords
- Employee security training
Future Malware Challenges
- AI-Enhanced Malware: Adaptive and intelligent
- Quantum Computing: Breaking current encryption
- IoT Proliferation: More attack surfaces
- Supply Chain Attacks: Trusted source compromise
- Living-off-the-Land: Using legitimate tools maliciously
Key Takeaways
- Malware takes many forms with different goals
- Understanding types helps choose appropriate defenses
- Prevention is better than cure
- Multi-layered security approach is essential
- User education is critical component
- Rapid response minimizes damage
Remember: Vigilance, education, and robust security measures are your best defense against malware
Thank You
Questions & Discussion
End of Cyber Security Slide Series

