Malware

Malware in United States

Malware

Overview of Malware in relation to cyber crime: [1] Most forms of malware become installed on computer systems after an inadvertent action of an unsuspecting computer user. Viruses, spyware, and rootkits can compromise a computer through an infected email or an email attachment being opened, or by an unsuspecting user visiting a phonyWeb site cleverly disguised as a legitimate site. Worms are the one type of malware that can propagate itself through flaws or holes in a computer’s operating system, i.e., without any end user action at all. Most people use the term ”virus” instead of ”malware,” and while viruses are a specific type of malware, not all instances of malware are viruses. Established and commonly known forms of malware now include the following: Worms:Worms are a specific form of malware that propagates through a network of computers, usually by exploiting flaws in computer operating systems. As previously mentioned, worms are a unique form of malware in that they can pass through computer systems without any action by an end user. Many worms attempt to exploit flaws in the Microsoft Windows operating system because it is used on so many personal computers; however, worms can and have been developed to exploit weaknesses in other operating systems such as Linux, Unix, and Macintosh systems. Viruses: Viruses are different from worms in that they require some user action to spread from one system to another. Viruses are most commonly spread through emails and email attachments, although they can be spread by other means. Many viruses operate by infecting one computer, then reading a user’s address book to make subsequent emails look like they came from them. This tactic fools people into believing the malicious email came from a friend or acquaintance. On May 4, 2000, the ”ILoveYou” virus was spread across the world in a matter of hours by emails with an irresistible ”I Love You” in the subject line. Rootkits: Rootkits attempt to take control of a computer system by attaching themselves to a portion of the operating system and then concealing their existence. Many rootkits modify a system’s operating system in such a way that they often return when a system is rebooted, even after they appear to be removed. Rootkits are a particularly troublesome form of malware because they are so difficult to detect and clean. Keystroke loggers: Keystroke loggers do what their name implies—they log or save the keystrokes made by a computer user in a file that can be accessed at a later time. Keystroke loggers can be used to steal credit card numbers, passwords, and personal information such as Social Security numbers. Spyware: Spyware is used to collect information on the computer of an unsuspecting user for a variety of purposes. Some spyware will collect information on the Web sites a person visits; others will collect personal information such as Social Security numbers, passwords, etc. Excessive spyware can seriously degrade the performance of a computer by using up memory, CPU cycles, and other resources. Adware: Adware or advertising-supported software is any software package that automatically plays, displays, or downloads advertising material to a computer after the software is installed on it or while the application is being used. It is separate from spyware in that it collects Web browsing history and then sends the data to a host to file browsing habits of an Internet user. More often adware is responsible for target pop-up ads that are geared towards the most popular interests that the browser user enters. Botnets: A botnet is a network of infected computers that can communicate with each other to coordinate attacks or other actions. Many computers infected by bots do not appear to be infected at all because these bots often remain dormant for months or years before being activated. Computers infected with dormant bots are often called ”zombies” because they can be used to attack other systems or networks without the computer owner even knowing they exist. Botnet networks can be used to send spam, propagate spyware, or launch denial of service attacks.

Resources

Notes and References

  1. By Dave Pecora

See Also

  • Types of Cybercrime
  • Cybercriminal

Further Reading

Christodorescu, M., Jha, S.,Maughan, D., Song, D., &Wang, C. (eds.). (2006). Malware detection. Advances in Information Security. New York: Springer Publishing; Harley, D., Bechtel, K., Blanchard, M., & Diemer, H.K. (2007). AVIEN malware defense guide for the enterprise. Rockland, MA: Syngress Publishing; Kleinbard, D., and Richtmyer, R. (2000, May 5). The I love you virus sweeps the US. Money.CNN.com. Retrieved from http://money.cnn.com/2000/05/ 05/technology/loveyou/; McMillan, M. (2006, May 23). Settlement ends the Sony Rootkit Case. PC WorldWeb site: http://www.pcworld.com/article/id,125838-page,1/ article.html; McQuade, S.C. (2006). Understanding and managing cybercrime. Boston: Allyn & Bacon; Skoudis, E., and Zletser, L. (2003). Malware: Fighting malicious code. The Radia Perlman Series in Computer Networking and Security. Upper Saddle River, NJ: Pearson-Prentice Hall.


Posted

in

,

by

Tags: