Lab – Anatomy of Malware Objectives Research and analyze malware Background / Scenario Malware, or malicious software, refers to a variety of malicious software programs that can be used to cause...

1 answer below »

Lab – Anatomy of Malware


Objectives


Research and analyze malware


Background / Scenario


Malware, or malicious software, refers to a variety of malicious software programs that can be used to cause harm to computer systems, steal data, and bypass security measures. Malware can also attack critical infrastructure, disable emergency services, cause assembly lines to make defective products, disable electric generators, and disrupt transportation services. Security experts estimate that more than one million new malware threats are released each day. A McAfee Labs
report
indicates almost 500 million known malware threats at the end of 2015.



Note: You can use the web browser in virtual machine installed in a previous lab to research security related issues. By using the virtual machine, you may prevent malware from being installed on your computer.


Required Resources


· PC or mobile device with Internet access


Conduct a Search of Recent Malware


a. Using your favorite search engine, conduct a search for recent malware. During your search, choose four examples of malware, each one from a different malware type, and be prepared to discuss details on what each does, how it each is transmitted and the impact each causes.


Examples of malware types include: Trojan, Hoax, Adware, Malware, PUP, Exploit, and Vulnerability. Some suggested web sites to search malware are listed below:



McAfee



Malwarebytes



Security Week



TechNewsWorld


b. Read the information about the malware found from your search in step 1a, choose one and write a short summary that explains what the malware does, how it is transmitted, and the impact it causes.


____________________________________________________________________________________


____________________________________________________________________________________


Answered Same DayApr 16, 2021

Answer To: Lab – Anatomy of Malware Objectives Research and analyze malware Background / Scenario Malware, or...

Deepti answered on Apr 22 2021
148 Votes
a. Four examples of malware-
1. Trojan.Agent: A malware usually associated with other detections for
transmission as a part of infection going beyond single family. It is used in detections where sufficient information is not available to identify the malware family. It can install harmful programs to the victim machine without being noticed and can corrupt potential legitimate functions of the victim immediately. There is no specific information available on what Trojan.agent does but it behaves generically like Trojan. It sends information about the victim to the attacker including username, browsing history
2. PwndLocker – Ransomware: This malware encrypts the data on the infected machines and the attacker threatens to release the captured data if ransom is not paid. It is transmitted via email attachment in the form of archive, image or executable file or it may be planted on websites. The impact on the infected machine causes all the data to be locked. Decryption key would be provided after...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here