Email Us

nirmanias07@gmail.com

Call Us
+91 9540600909

Scareware

Scareware

What is Scareware

  • Scareware is a malware designed to trick users into buying or downloading unnecessary and potentially dangerous software by displaying alarming messages.
    • Example: Antivirus 2009, a fake program that tricked and deceived users into buying it.

Purpose:

  • Generates revenue by tricking users into buying counterfeit software.
  • May collect personal or financial information under the guise of providing security solutions.

Key Features:

  • Displays fake alerts or warnings about security threats or system problems.
  • Use fear tactics to trick users into believing their system is at risk.
  • Tricks users into buying or downloading software that claims to fix non-existent problems.

Examples:

  • Fake antivirus software: Pretends to be legitimate antivirus software by showing false scans and threats.
  • Pop-up alerts: Shows frequent pop-ups claiming the system is infected, prompting to take immediate action.

What is Malware?

  • Malware is a form of “malicious software”.
  • It refers to software that is intentionally designed to cause harm to a computer, server, client, or computer network.
  • The term includes viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.

Purpose of creating malware

  • Cybercriminals use malware to steal sensitive information such as banking details or credit card numbers to commit fraud or theft.
  • To steal confidential data from individuals or organizations for blackmail, corporate espionage, or other malicious purposes.
  • To disable systems, networks, or services to cause operational disruptions.
  • Gaining unauthorized access to systems or networks to control them, steal data, or use them as part of a larger botnet for other malicious activities.
  • Surveilling individuals or organizations for espionage or intelligence gathering.
  • Damaging or destroying data and systems to disrupt or harm operations.

Common types of malware

  • Viruses: Programs that attach to legitimate programs and spread to other programs when executed.
    • Example: Melissa virus, which spread via email attachments.
  • Worms: Standalone malware that replicates itself to spread to other computers.
    • Example: I LOVE YOU worm, which spread via email.
  • Trojan horses: Malware disguised as legitimate software that provides unauthorized access when executed.
    • Example: Zeus Trojan, which targeted banking information.
  • Spyware: Secretly monitors and collects information about users without their knowledge.
    • Example: Pegasus spyware, used for surveillance on mobile devices.
  • Adware: Automatically displays or downloads advertisements when a user is online.
    • Example: Fireball, an adware that hijacked the browser to generate revenue.
  • Rootkit: Programs that give unauthorized users administrative access to a computer.
    • Example: Sony BMG’s rootkit, which was found on music CDs.
  • Botnet: A network of infected computers (bots) that are remotely controlled by a hacker.
    • Example: Mirai botnet, which carried out massive DDoS attacks.

What is Cybercrime?

  • Cybercrime includes a variety of criminal activities using digital devices and networks.
  • It includes technology-based crimes such as fraud, identity theft, data breaches, computer viruses, and scams.

Newsletter

Nirman IAS is India's Premier institution established with the sole aim to initiate, enable and empower individuals to grow up to be extraordinary professionals.

Our Courses
Get In Touch

Mukherjee Nagar, Delhi

91 9540600909

nirmanias07@gmail.com

Daily News
September 2024
M T W T F S S
 1
2345678
9101112131415
16171819202122
23242526272829
30  

© All Rights Reserved by Nirman IAS