Malware Definition and Classification

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or

Already have an account? Sign In »

Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2
Video Transcription
00:10
Welcome to Paolo after Network Cyber Security Academy Secure Business Systems Administration presentation on malware, specifically malware, definitions, classifications and an examination of advanced malware.
00:26
The term malware is a general classifications for malicious software that attempts to exploit vulnerabilities on a targeted endpoint.
00:34
Malware is typically designed for one of two objectives. Access to data and resource is for financial gain or disruption or damage to an end point or network.
00:44
Malware infections and propagation typically occur when an end user is tricked too quick on an infected wink or install an infected application. However, malware can also be triggered when a user simply visits an infected website.
01:02
There are many malware classifications with the two most common being virus and worm.
01:07
While both viruses and worms may be identical in their attack postures and payloads, the core difference between the attack types is how they are stored and how they are propagated. Ah, virus must reside within a host object, such as an infected document
01:23
where a worm can exist autonomously as an independent file
01:27
with both malware types. The general first objective of the attack is for the malware to replicate
01:37
the term advanced malware applies to malware that has the ability to escalate and Attackers posture or deliver multiple payloads.
01:45
Advanced malware is generally designed to be part of a chain of orchestrated events, which could be targeting defender tools such as inhibiting or removing anti virus utilities. Or the malware can modify, morph and exist in stealth mode. Intel may commanding Control Signal
02:05
triggers the malware into action.
02:08
Some examples of advanced malware types are Trojans, which successfully mask the malware as a benign or harmless file, and Ransomware, which progresses through a tax stages and ultimately encrypting an endpoint target and then demanding payment from the attacker poor releasing the encryption keys
02:29
that are needed to make available the targeted files or systems.
02:36
Advanced malware typically takes advantage of infected systems by establishing back doors or openings for further attacks. A root kit or a beutke. It is commonly installed, which is a collection of tools that the attacker can use to achieve an escalation of privilege. Another common advanced malware objective
02:54
is to establish a point of presence
02:57
via spyware or adware, which can continue to harvest credentials or to continue. The in faction
03:06
advanced smaller is also commonly associated with large scale organized criminal attacks that seek to infect vast numbers of targeted endpoints.
03:15
While anti malware tools on a local device are functional and important locally, a successful defense against advanced muller attacks often requires the employment of an enterprise suite of protection tools and services.
Up Next