Curriculum
Course: GRC Masterclass
Login

Curriculum

GRC Masterclass

Information Technology and Security Principles

0/52

Governance and Security Frameworks

0/44
Text lesson

Malware

Malware

Overview

  • Malware (malicious software) is a term for any software intentionally designed to cause damage, steal data, or disrupt operations.

 

Types of Malware

1. Viruses

  • Definition: Malicious code that attaches itself to clean files, spreading to other files when executed.
  • Characteristics: Requires user action (e.g., opening a file) to activate.
  • Example: The ILOVEYOU virus (2000) that spread via email attachments.

2. Worms

  • Definition: Standalone malware that replicates itself to spread to other computers.
  • Characteristics: Can spread without user interaction, often exploiting vulnerabilities in software.
  • Example: The Morris Worm (1988), one of the first worms, caused significant disruption to the early internet.

3. Trojans

  • Definition: Malware disguised as legitimate software, tricking users into installing it.
  • Characteristics: Does not replicate itself but can open backdoors for other malware.
  • Example: Emotet Trojan, used for banking fraud and delivering additional malware.

4. Ransomware

  • Definition: Malware that encrypts a victim’s data, demanding a ransom for decryption.
  • Characteristics: Often spread via phishing emails or malicious downloads.
  • Example: WannaCry Ransomware (2017), which affected organizations globally, including healthcare systems.

5. Spyware

  • Definition: Software that secretly monitors user activities and collects data without consent.
  • Characteristics: Often used to steal sensitive information like login credentials.
  • Example: Keyloggers, which capture keystrokes to steal passwords.

6. Adware

  • Definition: Software that displays unwanted advertisements on a user’s device.
  • Characteristics: Often bundled with free software downloads.
  • Example: Fireball Adware, which hijacked browsers to generate ad revenue.

7. Rootkits

  • Definition: Malware designed to gain root-level (administrator) access to a system while hiding its presence.
  • Characteristics: Often used to control compromised systems.
  • Example: Stuxnet Rootkit, which targeted industrial control systems.


Common Malware Distribution Methods

  1. Email Attachments and Phishing Links

    • Cybercriminals often send emails containing malicious attachments or links.
  2. Drive-by Downloads

    • Involuntary downloads that occur when visiting compromised websites.
  3. Malicious Advertisements (Malvertising)

    • Ads that lead to malware-infected sites, even on legitimate platforms.
  4. Removable Media

    • USB drives or external hard drives infected with malware.
  5. Exploiting Vulnerabilities

    • Malware exploits unpatched software vulnerabilities to infect systems.

Signs of Malware Infection

  • Unusual System Behavior: Slow performance, frequent crashes, or unknown programs running.
  • Pop-up Ads: Excessive pop-ups, especially if not using a browser.
  • Unauthorized Changes: Altered system settings or files without user permission.
  • Missing Files: Files disappearing or being encrypted.
  • Unusual Network Activity: Unexpected high bandwidth usage indicating data exfiltration.

Prevention and Mitigation Strategies

  1. Install and Update Antivirus Software

    • Use reputable antivirus software and keep it updated.
  2. Enable Firewalls

    • Protect systems from unauthorized access by using firewalls.
  3. Keep Software Updated

    • Regularly patch operating systems and applications to fix vulnerabilities.
  4. Educate Users

    • Conduct training on recognizing phishing emails and safe internet practices.
  5. Regular Backups

    • Maintain regular data backups to restore systems in case of ransomware attacks.
  6. Implement Access Controls

    • Use multi-factor authentication (MFA) and the principle of least privilege (PoLP).

Case Studies

Case Study 1: WannaCry Ransomware Attack (2017)

  • Background: Exploited a vulnerability in Microsoft Windows (EternalBlue exploit).
  • Impact: Affected over 200,000 systems in 150+ countries, with significant disruptions in healthcare.
  • Lesson Learned: Importance of timely patching and regular backups.

https://www.sdxcentral.com/security/definitions/what-is-ransomware/case-study-wannacry-ransomware/

Case Study 2: The Target Data Breach (2013)

  • Background: Attackers used malware to steal credit card information from point-of-sale (POS) systems.
  • Impact: Compromised data of over 40 million customers.
  • Lesson Learned: Need for enhanced security monitoring and third-party vendor assessments.

https://medium.com/thedeephub/complete-case-study-target-data-breach-2-ba4bb365a82e


Assignments

  1. Research Assignment: Write a detailed report on a malware attack that occurred within the last year. Include information on the type of malware, how it was distributed, and its impact.


Recommended Resources

Books

  • “Malware Analysis and Detection Engineering” by Abhijit Mohanta
  • “The Art of Memory Forensics” by Michael Hale Ligh, et al.

Online Courses

  • “Malware Analysis and Reverse Engineering” on Udemy
  • “Introduction to Cyber Security” on Coursera

Tools for Malware Analysis

  • Wireshark: Network protocol analyzer.
  • Malwarebytes: Anti-malware software.
  • Kali Linux: A popular distribution for penetration testing and malware analysis.

 

 

Lesson Materials

Layer 1