Page 36 - TP_iPlus_V2.1_Class7
P. 36

Ransomware

                  Ransom is the money demanded for the release of a kidnapped hostage. Similarly, ransomware is
                  malicious software used to access the data of the host system illegally by encrypting it. The victim of
                  the attack has to pay a huge amount of money to the attacker to regain access to their data.
                  Rootkit


                  Rootkit is a type of malware that gains administrator access to the host system. Once the attacker
                  gains access to the system, the rootkit gets hidden but retains special access to the system. The
                  detection of rootkit is difficult as it has special access to the system, it bypasses the tracking software.
                  Backdoor


                  A backdoor is a method or software used to bypass normal authentication or security measures
                  to  gain  unauthorized  remote  access  to  a  computer  or  network.  Backdoors  can  be  installed
                  through malicious software or vulnerabilities in legitimate software, allowing attackers to control
                  the system covertly.

                   i +  THE MOST DANGEROUS MALWARES KNOWN

                  •  Wabbit Virus (1974) is a self-replicating virus that creates multiple copies of itself, causing
                     system slowdowns and crashes.

                  •  ILOVEYOU Virus (2000) spread via email with a subject line of "I Love You," containing a
                     malicious attachment that appeared as a harmless text file.
                  •  Code Red Worm (2001) would spread itself with the message: “Hacked By Chinese!”

                  •  Mydoom Worm (2004) scraped addresses from infected machines, then sent copies of itself
                     to those addresses.

                  •  Storm Worm (2007) attacked millions of computers with an email about approaching bad
                     weather.
                  •  Zeus, also known as Zbot Trojan horse (2007) was made with an intention to steal banking
                     information of United States Department of Transportation.

                  •  Emotet (2014) is considered one of the most destructive and dangerous Trojans. It spreads
                     through spam emails to steal banking information.

                  •  Pegasus (2016) is commercial spyware. It secretly infects a smartphone (Android or iOS) and
                     tracks the device completely for every action.

                     Info Byte

                        Most  malware  programs are  distributed  over  the  Internet,  often  bundled  with  other
                      software.



                   i +  ANTIVIRUS

                  Antivirus software is a set of programs designed to identify, prevent, and remove malware from
                  your computer. It helps protect your system by detecting viruses and other malicious threats



                    34
                         iPlus (Ver. 2.1)-VII
   31   32   33   34   35   36   37   38   39   40   41