Malware, Identity Theft,Phishing and its type

                                             


                                                                MALWARE

Malware, short for malicious software, is any program or code designed to harm, exploit, or disrupt computer systems, networks, and devices. It is a major cybersecurity threat used by hackers to steal sensitive data, damage systems, or gain unauthorized access. Malware can spread through infected email attachments, malicious websites, USB drives, or software downloads.


Types of Malware

Virus 

A malicious program that attaches itself to a legitimate file or software, replicates, and spreads when the infected file is executed.

Worm 

A self-replicating malware that spreads across networks without human intervention, consuming system resources and slowing down operations.

Trojan Horse

A deceptive program that appears harmless but, once executed, allows hackers to access or control a system.

Spyware

Secretly monitors user activity, capturing sensitive information such as login credentials, credit card details, and keystrokes.

Adware  

Unwanted software that displays intrusive advertisements and may track user browsing habits for targeted marketing.

Fileless Malware

A sophisticated attack that operates in system memory instead of files, making it harder to detect and remove.

Keylogger

Records keystrokes on a keyboard to steal sensitive data, including usernames, passwords, and banking details.


IDENTITY THEFT



Identity theft is a form of cybercrime where a malicious actor steals someone’s personal information—such as name, Social Security number, credit card details, or banking credentials—to commit fraud or other crimes. Criminals use stolen identities to make unauthorized transactions, apply for loans, or engage in illegal activities, often leaving victims with financial losses and damaged reputations. Identity theft can occur through various means, including phishing attacks, data breaches, skimming devices, or social engineering tactics. To protect against identity theft, individuals should safeguard their sensitive data, use strong passwords, enable two-factor authentication, and monitor their financial statements for any suspicious activity.

  


Types Of Identity Theft

Financial Identity Theft 

This occurs when a thief uses someone’s financial information, such as credit card or banking details, to make unauthorized purchases, withdraw money, or apply for loans in the victim’s name.

Criminal Identity Theft

In this type, the criminal impersonates another person when caught by law enforcement, using stolen personal details to avoid penalties, fines, or arrest warrants.

Medical Identity Theft

Here, fraudsters use someone else’s identity to obtain medical services, prescriptions, or health insurance benefits, which can lead to incorrect medical records and financial burdens for the victim.

Tax Identity Theft

Cybercriminals steal personal information to file fraudulent tax returns and claim refunds, often before the legitimate taxpayer files their own return.

PHISHING

Phishing is a form of cyberattack in which attackers impersonate legitimate entities to deceive individuals into revealing sensitive information, such as usernames, passwords, credit card details, or personal data. It is one of the most common tactics used by cybercriminals to gain unauthorized access to accounts, steal money, or spread malware.

Phishing attacks typically occur through fraudulent emails, messages, or websites that appear to be from trusted organizations like banks, social media platforms, or government agencies. These messages often contain urgent requests, fake warnings, or enticing offers designed to trick victims into clicking malicious links or downloading harmful attachments.

Types of Phishing

Email Phishing

The most common type, where attackers send fraudulent emails that appear to be from legitimate sources, tricking recipients into clicking malicious links or downloading harmful attachments.

Spear Phishing

A highly targeted form of phishing where attackers tailor emails to specific individuals or organizations, using personal information to make the attack seem more credible.

Clone Phishing 

Attackers copy legitimate emails, replacing original links or attachments with malicious ones, and resend them to victims, making the scam appear authentic.

Smishing (SMS Phishing) 

Phishing attacks conducted through text messages, where attackers send fake messages pretending to be banks, delivery services, or government agencies to steal sensitive data.


RANSOMWARE



Ransomware is a type of malicious software (malware) that encrypts a victim's data or locks them out of their system, demanding a ransom payment to restore access. It is one of the most dangerous and financially damaging forms of cyberattacks, affecting individuals, businesses, and even government institutions.

Ransomware typically spreads through phishing emails, malicious attachments, or infected websites. Once activated, it encrypts files or locks the entire system, displaying a ransom note demanding payment, usually in cryptocurrency, to prevent tracking. Some advanced ransomware also threatens to leak sensitive data if the ransom is not paid.







There are two main types of Ransomware :


Locker Ransomware

Restricts access to the system by locking the screen, preventing the victim from using their device.

Crypto Ransomware 

Encrypts important files, making them inaccessible until a decryption key is provided upon payment.


DoS ATTACK


A Denial-of-Service (DoS) attack is a cyberattack in which an attacker overwhelms a system, network, or website with excessive traffic or malicious requests, making it unavailable to legitimate users. The goal of a DoS attack is to disrupt normal operations, causing downtime, financial losses, and reputational damage.

DoS attacks work by exhausting system resources such as bandwidth, memory, or processing power. Attackers often use automated scripts or botnets—networks of infected computers—to generate massive amounts of traffic to the target system. This flood of requests slows down or completely crashes the system, preventing real users from accessing it.

Types of DoS Attacks


Volume-Based Attacks 

Overload the target with excessive data packets (e.g., UDP flood, ICMP flood).

Protocol Attacks 

Exploit weaknesses in network protocols to consume resources (e.g., SYN flood, Ping of Death).

Application-Layer Attacks

Target web applications by sending fake requests that consume server resources (e.g., HTTP flood ).


 
                                                                Prepared By Narashiman (22USC030) III B.Sc Computer Science

Comments

Post a Comment

Popular posts from this blog

Radio Waves

Microwave

DISPLAY CONTROLLER