Overview
This lecture explains different types of malware, how they infect computers, their impacts, and measures to protect against them.
Types of Malware
- Malware includes software like viruses, worms, trojan horses, rootkits, spyware, ransomware, and cryptomining malware.
- Malware can steal data, encrypt files, display unwanted ads, or allow attackers remote access.
- Some malware types self-replicate (viruses, worms), while others disguise themselves as harmless programs (trojans).
Infection Methods and Vulnerabilities
- Malware exploits vulnerabilities in operating systems or applications to gain access.
- Outdated security patches increase risk; keeping systems updated prevents many attacks.
- Users can infect their systems by clicking malicious links or downloading infected files.
- Some malware, like worms, spread automatically without user action.
Trojan Horses
- Trojans appear to be legitimate software but contain hidden malware.
- Trojans often require user interaction to install.
- Once installed, trojans can download additional malware or open backdoors for attackers.
- Antivirus software may detect and block trojans, but up-to-date threat databases are essential.
Rootkits
- Rootkits hide deep within the operating system, often at the kernel level, making detection difficult.
- They can evade standard antivirus scans.
- Secure Boot (in UEFI BIOS) helps prevent rootkit and boot sector virus infections by verifying operating system integrity.
Viruses and Boot Sector Viruses
- Viruses are malware that replicates with user action, often spreading via networks or removable drives.
- Boot sector viruses infect the boot process and load before the operating system, making them hard to remove.
- Secure Boot protects against boot sector viruses.
Spyware and Keyloggers
- Spyware monitors user activity, collects browsing habits, and may include keyloggers to capture keystrokes.
- Keyloggers record everything typed, including passwords and sensitive information, and send it to attackers.
- Spyware is often installed through trojans and can bypass network encryption.
Ransomware
- Ransomware encrypts user files and demands payment (usually in cryptocurrency) for decryption keys.
- The best recovery is deleting affected files and restoring from a clean backup rather than paying the ransom.
Cryptomining Malware
- Cryptomining malware uses system resources to mine cryptocurrency for attackers, causing significant performance issues.
- Users may notice high CPU usage as a sign of infection.
Key Terms & Definitions
- Malware — malicious software designed to damage, disrupt, or gain unauthorized access to computer systems.
- Trojan Horse — malware disguised as legitimate software that tricks users into installing it.
- Rootkit — malware that hides deep within the operating system to evade detection.
- Virus — self-replicating malware that spreads with user action.
- Boot Sector Virus — malware that infects the boot sector, running before the OS loads.
- Spyware — software that secretly monitors user activity and collects data.
- Keylogger — type of spyware that records keyboard input.
- Ransomware — malware that encrypts files and demands payment for their release.
- Cryptomining Malware — malware that hijacks system resources to mine cryptocurrency.
Action Items / Next Steps
- Keep your operating system and all applications updated with the latest security patches.
- Run and regularly update antivirus and anti-malware software.
- Enable Secure Boot in your system BIOS/UEFI settings.
- Make regular backups of important data to recover from ransomware or similar attacks.