The Internet has extended its reach over the last 15-20 years, so is malware (malicious software). Also it has evolved and become more complex and applying new tricks every day. Early forms of malware sought to generate attacks on basic areas of computer systems, but today its aims are increasingly evil, focusing on theft and other illicit activities. Malware has become much more of a concern for organizations; Today, in addition to individual computers and the networks of organizations both large and small, Internet connectivity also extends to devices such as gaming consoles and smartphones. And as computing architectures shift, protecting organizations, governments, and citizens from malware has become even more of a challenge for network experts.
How malware has evolved; including new attack tricks
Malware became known to many computer users through widespread infections caused by Melissa (in 1999) and LoveLetter (in 2000). Both were email-based, and LoveLetter spread via an infected email attachment. When the attachment was opened, the malware overwrote a variety of different types of files on the user’s PC and emailed itself to others in the user’s email address book.
The developer(s) of those malwares applied very simple and easy tricks that could exploit the user without creating any suspicion. Melissa was relatively easy to create and attacked weaknesses in important and popular technologies that could be exploited again with even more serious results. For
Ransomware is a type of malware that limits access to a computer system that it affects. Just as its name goes, it then asks for ransom payment to pay to its creator in order for the limitation to be taken away. Some of these malwares encrypt files on the hard drive while others just lock up the system and display messages persuading the user to pay the ransom (Michael). There are two types of ransomware, one that locks the screen and displays a message that prevents you from accessing the computer, and the other that encrypts files on a systems hard drive and prevents one from opening them (Blue).
Another reason that ransomware keeps on multiplying, regardless of great conveyance techniques, for example, email, is that clients have not been legitimately prepared or made mindful of the risks of opening noxious email connections. This pattern features a need among associations to enhance web and email security and client security mindfulness.
To begin with, computer viruses are types of malicious software programs that replicate themselves by changing other computer programs and inserting their own code. This all happens when they get executed. This takes place when computers become infected with the virus, there are many reasons to why computers can become infected. Accepting without reading is by far the most common way a computer can become infected. This happens when a user just automatically accepts what they see on their screen without reading the prompt before continuing. For example, while on the internet an advertisement or a window may appear that says your computer is infected, without completely understanding what you’re getting, you accept the prompt anyways. Another reason to why your computer may become infected is by downloading any infected software. When downloading software such as programs, utilities, games, updates, demos, etc. always make sure you are downloading this software from reliable sources. Always read all prompts about what the program is installing onto your computer. Opening e-mail attachments can cause your
In our technologically advanced society,the number of cyber-attacks continue to grow every day. According to AV-Test there is more than 395,000 new malicious are now registered every single day, and the total amount of malware attacks in circulation is around 425,000,000 marks. (Price, D 2015). Cyber attacks are not only about stealing data or making system offline, but also there can be real world damage too. An attacker can easily hack the details of a government system and can be control it from anywhere in the world. In 2015, there are more than 110,000 Facebook users have fallen victim to a Trojan in just two days. Cyber security experts identified that the malware belongs to a virus group belonging to the ‘kilim family’. The attackers spammed Facebook timelines and Newsfeeds with malicious malware that spread pornographic images and videos. These threads worked by tagging an infected user’s friends in a Facebook post, which when opened, started to play a preview of a porn video.And at the end of that preview it asked them to download a Flash player in order to watch the rest of the vdeo. That fake download is actually the malware downloader. The malware uses a multi-layer redirection architecture, which uses the ow.ly URL shortener, Amazon web service and Box.com cloud storage. The malware comes under the form of a URL or website
Mich78@Usa.com Ransomware is a pesky PC contamination which is particularly modified by the criminal programmers with a specific end goal to infuse and shows awful ads on PC screen. It invades the prevalent Firefox and inserts them with some promotional content of different shapes and sizes. In addition, it causes alterations in settings of browser. Such risk begins their vindictive activities from changing the homepage of browser, default search engine, and new tab page. When the infection completes these changes, it gets the capacity to reroute PC users to foreordained websites that are attempting to build their prominence.
As technology has advanced throughout the years, so has the threat of infected devices compromising enterprise networks. For the most part, the main focus has been to secure the perimeter of the network. This leaves the interior of the network vulnerable to allow attack to originate. This threat has increased exponentially as the use of cell phones, laptops, tablets, among others, has increased as well. Since these mobile devices can be used on unsecure networks such as wireless hotspots, they have the potential to bring viruses, worms as well as other malware into the enterprise network.
POS Malware is very bad and serious type of security breach in the business empires. Every year the cost of security breach is rising. In last year it was 3.8 million dollar per year.
The experts said that the virus was designed to target Simatic WinCC Step7 software; which is an industrial control system made by the German conglomerate Siemens. The system was used to program controllers that drive motors, valves and switches in everything from food factories and automobile assembly lines to gas pipelines and water treatment plants (Zetter, 2011). This happens to be the same software that was used at Natanz facility.
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
Lawton, G. (2008). Is it finally time to worry about mobile malware? Computer, 41(5), 12-14.
Apple’s built-in defenses just aren’t enough to ward off the latest waves of malware, experts claim. So how do we protect ourselves now?
By the year of 2016, investments in online security are expected to reach $86bn (Contu et al, 2012). Although this might seem a large sum of money, it is considered necessary since there is an increase in online risks from all over the world. Professional hackers develop malware on a global scale and on a 24/7 basis. Hackers have five objectives when spreading malware over the Internet: to infect/distribute, to steal, to persist, to control and for intelligence (Morris, 2010).
To understand the business of malware, one must understand how malware has evolved in the past twenty-five years. Malware, which includes all kinds of malicious software, was originally created to show the weaknesses of computers. The first type of malware, created in 1986, was a virus called “Brain.A. Brain.A was developed in Pakistan, by two brothers - Basit and Amjad. They wanted to prove that PC is not secure platform, so they created virus that was replicating using floppy disks” (Milošević). Even today malware is still used to check the security of machines.
Many types of computer virus has been spreading in computers since 1960. The first a computer virus discovered in 1970 and called The Creeper virus on Arpanet browser (anon, 2013)
It was easy for victim to believe the mails are coming from known individuals and therefore where considered “safe” to open and since it was sending mails to all the contacts on victim’s address book it was only required for a few to open the attachments to infect a million more. Love Letter Worm in its first 5 hours costed $750 million while U.S Spread has done estimated damages of US$1 billion and furthermore $15 billion worldwide, governments and people spent about US$15 billion to remove the worm from infected computers. In about ten days of spread the worm was able to infect about 50 million computers worldwide, Government agencies like CIA and the British Parliament and other big Companies closed their mailing systems. (Meserve,2000;