We are still actively working on the spam issue.

Difference between revisions of "Malware"

From InstallGentoo Wiki
Jump to: navigation, search
m (pebkac definition)
m (formatting)
(2 intermediate revisions by the same user not shown)
Line 4: Line 4:
 
Viruses are programs designed with the singular purpose of giving someone's computer, device or network a bad day. Traditionally they were created with [[Data Destruction]] or Denial of Service attacks on a local network in mind. They would often make themselves known to a victim with boot errors or screen takeovers.
 
Viruses are programs designed with the singular purpose of giving someone's computer, device or network a bad day. Traditionally they were created with [[Data Destruction]] or Denial of Service attacks on a local network in mind. They would often make themselves known to a victim with boot errors or screen takeovers.
  
Today they are much more subtle and try to hide themselves completely. They also exhibit much more subtle behaviour such as siphoning login credentials or performing reconnaissance for further attacks. Viruses today often have significant financial banking from either organised crime or [https://en.wikipedia.org/wiki/Stuxnet nation states].
+
Today they are much more subtle and try to hide themselves completely. They also exhibit much more subtle behaviour such as siphoning login credentials or performing reconnaissance for further attacks. Viruses today often have significant financial backing from either organised crime or [[Wikipedia:Stuxnet |nation states]].
  
 
Popular infections include Cryptolockers (viruses which encrypt your files and demand a [https://threatpost.com/hollywood-hospital-pays-17k-ransom-to-decrypt-files/116325/ bitcoin ransom] in exchange for the decryption key) and Remote Administration Tools (or RATs, which are commonly used to spy on victims through their own webcam).
 
Popular infections include Cryptolockers (viruses which encrypt your files and demand a [https://threatpost.com/hollywood-hospital-pays-17k-ransom-to-decrypt-files/116325/ bitcoin ransom] in exchange for the decryption key) and Remote Administration Tools (or RATs, which are commonly used to spy on victims through their own webcam).
  
In the late 90s/early 2000s widespread viruses would often make the nightly TV news, such as the [https://en.wikipedia.org/wiki/ILOVEYOU ILOVEYOU virus]. Today they are never mentioned.
+
In the late 90s/early 2000s widespread viruses would often make the nightly TV news, such as the [[Wikipedia:ILOVEYOU |ILOVEYOU virus]]. Today they are never mentioned.
  
 
= Adware =
 
= Adware =
Line 16: Line 16:
  
 
= Methods of Infection =
 
= Methods of Infection =
Most malware infections rely on user [https://en.wikipedia.org/wiki/PEBKAC PEBKAC]. Whether it's an email attachment to the "funniest jokes ever.doc.exe.bat", malicious websites exploiting unpatched browsers or simple user inattention during software installation.
+
Most malware infections rely on user [[Wikipedia:PEBKAC |PEBKAC]]. Whether it's an email attachment to the "funniest jokes ever.doc.exe.bat", malicious websites exploiting unpatched browsers or simple user inattention during software installation.
  
 
For the discerning /g/entooman, adware infection is more likely to occur because of more general security problems such as out of date software with known exploits.
 
For the discerning /g/entooman, adware infection is more likely to occur because of more general security problems such as out of date software with known exploits.
  
 
= Malware Removal =
 
= Malware Removal =
[[Malware removal | Malware Removal main article]]
+
Main article: [[Malware removal | Malware Removal]].
  
Malware removal is often done with a AntiVirus Scanner or Adware Removal tool, however in the post-[[Edward Snowden |snowden]] world these applications have come [http://www.theregister.co.uk/2015/10/06/google_zero_hacker_reports_remote_exec_hole_in_avast_antivirus/ under fire] for being [https://community.f-secure.com/t5/F-Secure-SAFE/14-antivirus-apps-found-to-have/td-p/55317 insecure].
+
Malware removal is often done with an AntiVirus Scanner or Adware Removal tool, however in the post-[[Edward Snowden |snowden]] world these applications have come [http://www.theregister.co.uk/2015/10/06/google_zero_hacker_reports_remote_exec_hole_in_avast_antivirus/ under fire] for being [https://community.f-secure.com/t5/F-Secure-SAFE/14-antivirus-apps-found-to-have/td-p/55317 insecure].
  
 
= See Also =
 
= See Also =

Revision as of 06:18, 11 March 2016

Malware is a catch-all term for unwanted and malicious software. This extends from 1980s viruses to modern day cryptolockers and adware.

Viruses

Viruses are programs designed with the singular purpose of giving someone's computer, device or network a bad day. Traditionally they were created with Data Destruction or Denial of Service attacks on a local network in mind. They would often make themselves known to a victim with boot errors or screen takeovers.

Today they are much more subtle and try to hide themselves completely. They also exhibit much more subtle behaviour such as siphoning login credentials or performing reconnaissance for further attacks. Viruses today often have significant financial backing from either organised crime or nation states.

Popular infections include Cryptolockers (viruses which encrypt your files and demand a bitcoin ransom in exchange for the decryption key) and Remote Administration Tools (or RATs, which are commonly used to spy on victims through their own webcam).

In the late 90s/early 2000s widespread viruses would often make the nightly TV news, such as the ILOVEYOU virus. Today they are never mentioned.

Adware

Adware refers to malware which displays advertising to it's victim. These range from "friendlier" things like an on-by-default browser toolbar installation as part of an unrelated piece of software's installation (e.g. Google Search Bar in a WinZip install) to nastier varities which will hijack browsers and popup ads without any mention of them being installed.

Hardcore /g/entoomen and /tech/nicians consider any application which displays ads as adware (e.g. uTorrent).

Methods of Infection

Most malware infections rely on user PEBKAC. Whether it's an email attachment to the "funniest jokes ever.doc.exe.bat", malicious websites exploiting unpatched browsers or simple user inattention during software installation.

For the discerning /g/entooman, adware infection is more likely to occur because of more general security problems such as out of date software with known exploits.

Malware Removal

Main article: Malware Removal.

Malware removal is often done with an AntiVirus Scanner or Adware Removal tool, however in the post-snowden world these applications have come under fire for being insecure.

See Also