ITM Tech Cybersecurity Essentials Booklet - Flipbook - Page 9
File infectors
Macro viruses target the initialisation
sequence of an application to
compromise programs such as Microsoft
Excel or Word.
File infectors find their way in your
system through executable codes like
.exe extensions. The infector becomes
active when you access the .exe file or
the executable code.
Trojans
Trojans are non-replicating viruses that
gain unauthorised access to a system.
Trojans often camouflage themselves in
the form of legitimate software.
System or
boot-record infectors
These infectors attach to executable
codes residing in parts of a disc. Bootrecord infectors can connect to a hard
disk’s Master Boot Records and even
boot sectors of USB flash drives. The
infectors are initialised when someone
boots using the compromised disk or
drive.
Polymorphic viruses
Polymorphic viruses replicate endlessly
to sabotage systems. They use dynamic
encryption keys every time to avoid
detection.
Stealth viruses
Stealth viruses hide under the guise of
system functions. They also infect your
computer’s defenses to stay undetected.
Logic bombs
Logic bombs are pieces of malicious
codes that get initialised when
predefined conditions are met. Attackers
can program logic bombs to serve a
range of purposes.
Worms
Worms don’t need a host file to
propagate themselves on a network or
system. They are self- contained forms
of viruses.
Droppers
Droppers help viruses find their way into
your networks and systems. Most often,
your antivirus will not detect droppers
as they don’t contain the malicious codethey just lead to it!
MALWARE
ATTACK
Malware or malicious software
is designed for compromising a
system for a purpose. A user can
unknowingly download malware
that infects a system and replicates
itself. Malware can be designed to
act in many ways, just like software.
Some popular types of malware
include:
1. Macro viruses
2. Trojans
3. System or boot-record infectors
4. Polymorphic viruses
5. Stealth viruses
6. File infectors
7. Logic bombs
8. Worms
9. Droppers
10. Ransomware
THREATS
Macro viruses
Ransomware
Ransomware can take the form of any
virus that holds a victim’s data hostage
for ransom. Ransomware attacks often
encrypt data or files and demand money
in exchange for decryption keys.
66 days
The number of days to discover a cyberattack
600%
Increase in Cyber
Crime DueTo
COVID-19 Pandemic
9