1 / 10

Evolution of Malware

Evolution of Malware. Jennifer Leggette and Michael Tyler. Four Phases :. Experiments Pranks Malicious/For Profit Future of Malware. Experiments. Purpose: benign or caused accidental damage, mostly wanted to spread Why: Programmers wanted to gain experience Example: Creeper. Creeper.

lois
Download Presentation

Evolution of Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Evolution of Malware Jennifer Leggette and Michael Tyler

  2. FourPhases: Experiments Pranks Malicious/For Profit Future of Malware

  3. Experiments • Purpose: benign or caused accidental damage, mostly wanted to spread • Why: Programmers wanted to gain experience • Example: Creeper

  4. Creeper • Originated in the early 1970’s in Cambridge, Massachusetts • Spread through ARPAnet • Displayed: I’M THE CREEPER: CATCH ME IF YOU CAN

  5. Pranks • Some were harmless while others were highly damaging • First malware prank: Elk Cloner, written by a high school student which the purpose was to display a poem on the screen once in every 50 boot ups.

  6. Code Red • July 2001 • Exploited buffer overflow • Defaced websites and launched denial of service attacks • Affected site read: • “HELLO! Welcome to http://www.worm.com! Hacked by Chinese!”

  7. ExploreZip • Microsoft Office, C source and C++ source files

  8. Malicious/For Profit • Adware • Display advertisements • Spyware • Gain information about the user without their knowledge • Ransomware • Prevents user from using system as normal

  9. Fake antivirus software

  10. Future of Malware • Espionage • Cyberwarfare • New Platforms

More Related