120 likes | 273 Views
This guide aims to differentiate between two major types of computer malware: Trojans and Worms. Trojans, like the notorious Zlob Trojan, disguise themselves as legitimate software while secretly performing harmful activities. Worms, such as the Koobface worm, autonomously replicate across systems, often targeting social media to steal personal information. Removal instructions for both types of malware are provided, emphasizing the importance of disabling system restore, updating antivirus software, and conducting full system scans. Protect yourself with the right measures against these threats.
E N D
Jason Long IST 110 Zachary Ziobro 5/31/09 Computer Baddies
Objectives • To Differentiate between different types of computer malware • Specifically to differentiate between Trojan Horse’s and Worms • To give specific examples of aforementioned malware and to give removal instructions for each.
Trojan Horse • A Trojan Horse is aptly named, it functions much like the Trojan horse of mythology. • A Trojan appears to be performing a desirable computer function. • But, in the background it is busy stealing data, destroying data, and performing other unsanctioned activities.
Zlob Trojan • The Zlob Trojan first appeared in 2005 but gained much attention in 2006 • The Zlob Trojan appears to be a needed video component • However, it creates pop-ups, similar to normal windows pop-ups, that auto-download fake anti-virus software
Removal • The Zlob Trojan is removed in the following manner, similar to many trojans. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a number of registry valuesthat the Trojan has created.
Worms • Worms are malicious computer programs that active and attempt to replicate themselves across as many computers a possible. • Worms are different from normal computer viruses in that they do not need a host computer program to operate and spread, they can do it autonomously. Though commonly they attempt to hide other malicious files within themselves.
Koobface • The Koobface worm targets myspace and facebook users. • It attempts to get users to download “a flash player update.” When in reality the link downloads the worm which seeks out credit card numbers. • It then sends messages to facebook and myspace accounts in an attempt to get other users to download it.
Removal • The Koobface worm is removed in the following manner, similar to a number of other worms. • 1: Disable System Restore, this trojan plants itself in the restore points. • 2: Update your anti-virus • 3: Run a full system scan • 4: Then you must manually delete a registry valuethat the worm has created.
Synopsis 1 in 4 computers in the United States is infected with some sort of malware, including Trojans and worms. This Chart illustrates that number.
Conclusion • Trojans are Worms are very insidious types of malware, that are dangerous for your computer and also can scam away your personal information. • You should take measures to protect yourself from these malware with some kind of anti-virus.
Refrences • http://en.wikipedia.org/wiki/Trojan_Horse • http://www.symantec.com/security_response/writeup.jsp?docid=2008-080315-0217-99&tabid=3 • http://www.symantec.com/security_response/writeup.jsp?docid=2005-042316-2917-99&tabid=3 • http://en.wikipedia.org/wiki/Computer_worm • http://www.theinquirer.net/inquirer/news/1044664/four-computers-infected • http://hypertextbook.com/facts/2004/DianeEnnefils.shtml