follow

help me to improve quality

donate

Pages

Friday 16 September 2016

malwares and its types



hello every one,
in this post,i will talk about malware.
in this post,i will tell you about strengh,and ability of malware,
and what malware can do.
i am writing this post because i think if you do not know power and capacity of nasty malware then you cant protect your self from malware,

so what is malware?


malware means molecious software,
molecious software is software which is specifically designed to  damage your computer.
in this post i will explain all different kind of malwares.
so without wasting any time lets get started


1)what is virus?


virus is one kind of molecious software,which can destroy your software and hardware both,

it have ability to damage your operating system,your application,and it can also destroy your hard-drive and mother board,and it can also stil
your data.
but there is few weakens of virus
1-it will not harm you unless you run that virus or 
click on that virus. 
2-if i made any virus for windows operating system
then it will not work in android ,ios and other 
operating software

what is macro virus?

it is virus which is made by using macro language.A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless. A typical effect is the undesired insertion of some comic text at certain points when writing a line. A macro virus is often spread as an e-mail virus. A well-known example in March, 1999 was the Melissa virus virus.


2)what is worm?



A worm is one kind of molecious software which is similar to a virus by design and it is considered to be a sub-class of a virus.


Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.that means it can harm you even if you do not run it.that is the main difference between virus and worm

 A worm takes advantage of file or information and transport features on your system, which allows it to travel unaided.
The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself , creating a huge devastating effect. One example would be for a worm to send a copy of itself to everyone listed in your e-mail address book. Then, the worm replicates and sends itself out to everyone listed in each of the receiver's address book, and the manifest continues on down the line. 
Due to the copying nature of a worm and its capability to travel across networks the end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding. 


3)what is Trojan Horse?


The Trojan Horse, at first glance it will appear to be useful software but it will actually damage your computer if you install it or run on your computer.you will normally find trojans in the form of free pc games and pc tuners,etc...
Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source. 

When a Trojan is activated on your computer, the results can vary. 
Some Trojans are designed to be more annoying than malicious (like changing your desktop, adding silly active desktop icons) or they can cause serious damage by deleting files and destroying information on your system. 
Trojans are also known to create a backdoor on your computer that gives malicious users access to your system, and it possibly allows confidential or personal information to be compromised.but Unlike viruses and worms, Trojans do not reproduce by infecting other files nor do they self-replicate.





4)what is rootkit ?


The word rootkit comes from the days when it was mainly used in a Linux environment.  Root is the term for administrative access, and kit is a term for programs that operate to the admin level and execute programs at that level.  In this way rootkits can allow someone to operate functions on a computer at the administrator level,so it can easily access logs and monitor user activity, and more.

Rootkits aren’t always malware – they can be used for good and legitimate purposes.  However, when your computer becomes infected with a rootkit it’s generally a bad thing.

Rootkits are one of the most difficult types of infections to remove.  The rootkit itself is not harmful, however they are used to hide malicious software: worms, bots, etc.  Rootkits normally activate themselves before the operating system boots up, and than it enables the attacker to gain control of the infected computer in very critical ways. that is the main reason to give "boot time scanner feature"in antivirus softwares. However, these days rootkits are mostly used to install mask malware.  A rootkit can hide on a computer for years before being detected.


5)what is ransomware?


i think, it is the most dangerous malware,because same ransomware can infect all operating system because it is one kind of java-script,that means if your operating system supports java-script then ransomware can easily harm you and as far as i know almost all operating system supports java-script including apple ios,android , windows and Linux.

Ransomware is a kind of intelligent malware, but unlike other malware that merely corrupt your data,and delete files or does some other suspicious behavior,but this malware can locks your entire system, files and apps, and then it demands money from you, if you want to unlock your data.

and I said that, it is intelligent malware because this malware helps directly the attacker to earn money. Other kinds of malwares, like viruses, trojan horses etc, merely corrupt the system or steal some sensitive data, but rarely result in some monetary benefit to the attacker (unless the malware steals some sensitive information like credit card numbers etc).

Types of Ransomware

Ransomwares are normally classified into two types, encrypting ransomware and non-encrypting ransomware.

Encrypting ransomware are those who encrypt the files, programs etc of your system and demand a money to un-encrypt them. Usually encryption is done using a strong hashing algorithm that can take several thousands of years for a normal desktop PC to break them. So the only way that the user gets back his files is by giving the money and obtaining the unlock key. This is the most harmful ransomware for its attacking mechanism.

Another type of ransomware is the non-encrypting one. This one doesn’t encrypt your files, but rather blocks access to them and shows irritating messages when you try to access them. This is a less harmful ransomware and the user can easily get rid of them by taking backup of important files and installing the operating system again.


6)what is adware?


Adware is a form of software that downloads or displays unwanted ads when you are online,and it collects marketing data and other information without your knowledge and  it redirects search requests to certain advertising websites.and it can also change homepage of your browser. 

that means,basically it is the programs that are designed to display advertisements on your computer, and redirect your search requests to advertising websites, and collect marketing-type data about you – for example, the types of websites that you visit – so that customized advertises can be displayed.



7)what is spyware?


spyware is one kind of malware which is used to spy on you.it can also collect your browsing data.and all of your browsing data for example visited website,password and history are saved in form of cookies files in your computer and if any hacker will get those cookie files then hacker can easily get some info about you and then that hacker can use that info against you.

Spyware is a type of malware that is installed on a computer without your knowledge in order to collect your private information. Spyware is often hidden from you in order to gather information about internet interaction, keystrokes (also known as keylogging), passwords, and other valuable data. Spyware can also negatively affect a computer’s performance by installing additional software, redirecting web browser searches, changing computer settings, reducing connection speeds, changing the homepage or even completely disrupting network connection ability etc... Spyware can also be used as a type of adware, where the software delivers  pop-up ads in addition to tracking user behavior. Typically, spyware is installed when a you installs a piece of free software that hacker actually wanted.and When the desired software is installed, the spyware will  start collecting data from your activities. 

you can also be tricked into installing the spyware through a Trojan horse as well as it pretending to be a free piece of security software. 


8)what is Keylogger?Why is it so           Dangerous?



All of you have heard about viruses and malware – but not many of you knows exactly what a keylogger is and why you should do everything possible to protect yourself from this.

actually keylogger is one kind of spyware.
A keylogger is a piece of software — or a hardware device — that logs every key you press on your keyboard.that means ,it can record everything which you type in your keyboard. and It can capture personal messages, passwords, credit card numbers, and everything else you type.

Keyloggers are usually installed by malware programs in order to get your personal information and credit card details.

How a Keylogger Would Get On Your Computer

Many times you can get infected when you download files from the internet. You have heard about “free and cracked” software – that is actually cracked editions of commercially available software.

When you download cracked or pirated software or music – there is a good chance that the software can include malware that installs itself at the same time in the background without your knowledge.

How Keylogger works?

it runs hidden in the background,and it makes a note of each keystroke you type. and then later it scans through the saved file of all the keystrokes for certain types of text — for example, it could look for sequences of numbers that look like credit card numbers or website and email passwords and then it sends all information to hacker.


9)what is dialer malware?


Dialer Malware automatically inserts and modifies the numbers depending on the time of day, country or area code dialed.and It can dial specific numbers without your  knowledge and thus cause you fat telephone bills.

that means,Dialer is a piece of software which is designed to dial a telephone number automatically.

Automated dialers can store names and telephone numbers and enable to you easily contact people without remembering phone numbers, or be tracked by Caller ID.

Most automated dialers will retrieve contact information from other databases, such as your Microsoft Outlook Contacts list.

Some automated dialers will also dial a telephone number at regular intervals until a person answers the phone. When the person answers the telephone, the automated dialer will sound an alarm to let you know that the called party is on the line.

i think,These can be easily blocked with Call Blockers and Anti-Dialers.


10)what is browser hijacker?


A browser hijacker is a type of malware that is designed to change your browser's settings. and it can cause troubles such as

1)Your search is getting redirected to different websites
2)Your homepage or search engine is changed without your permission
3)Webpages loads slowly
4)You see multiple toolbars on your web browser which you did not installed
5)You get multiple pop-up alerts for advertisements etc...

from Where browser hijacker comes 


Many browser hijackings come from add-on software, also known as browser extensions, browser helper objects, or toolbars. Often, these items may improve your experience on a website by providing interactive content, such as animations. However, some add-on software can cause your computer to stop responding or display content that you don't want, such as pop-up ads.




11)what is scareware ?


scareware is one kind of malware which try to scare you.
normally this kind of software found in the form of pc tuners,pc cleaners,best free antivirus software,etc...
and they shows many errors and viruses in your computer even if everything is perfect in your computer and then when you click on fix all error or remove all viruses and then it shows you one pop up in which they ask you to buy their product.

The aim of scareware is quite simple.they just want to sell their useless software in order to make money.

In many respects scareware acts like a Trojan,

How Scareware Works?

There are 3 main ways in which scareware will trick you somehow –

1)Getting you to pay up – You buy the fake antivirus product, which is bad enough, but then the scammers take your credit card details too!

2)Zombie time – Many scareware programs will ensnare the victim machines into a botnet which can then be used for sending spam or engaging in DDoS attacks.

3)Identity theft – Scareware can install keystroke loggers and Trojans which will record what you do online and search your files for anything containing your private or financial information.



12)what is A Bootkit?


To understand what a bootkit is, we’ll first explain where the terminology comes from. A bootkit is a variant of a rootkit, a type of malware with the ability to conceal itself from your operating system and antivirus software. Rootkits are notoriously difficult to detect and remove. Each time you fire-up your system, the rootkit will grant an attacker continuous root level access to the system.

A rootkit can be installed for any number of reasons. Sometimes the rootkit will be used to install more malware, sometimes it will be used to create a “zombie” computer within a botnet, it can be used to steal encryption keys and passwords, or a combination of these and other attack vectors.
Boot-loader level (bootkit) rootkits replace or modify the legitimate boot loader with one of its attackers’ design, affecting the Master Boot Record, Volume Boot Record, or other boot sectors. This means that the infection can be loaded before the operating system, and thus can subvert any detect and destroy programs.
Their use is on the rise, and security experts have noted a number of attacks focused on monetary services, of which “Nemesis” is one of the most recently observed malware ecosystems.





0 comments:

Post a Comment