Scareware |
What is Scareware
- Scareware is a malware designed to trick users into buying or downloading unnecessary and potentially dangerous software by displaying alarming messages.
- Example: Antivirus 2009, a fake program that tricked and deceived users into buying it.
Purpose:
- Generates revenue by tricking users into buying counterfeit software.
- May collect personal or financial information under the guise of providing security solutions.
Key Features:
- Displays fake alerts or warnings about security threats or system problems.
- Use fear tactics to trick users into believing their system is at risk.
- Tricks users into buying or downloading software that claims to fix non-existent problems.
Examples:
- Fake antivirus software: Pretends to be legitimate antivirus software by showing false scans and threats.
- Pop-up alerts: Shows frequent pop-ups claiming the system is infected, prompting to take immediate action.
What is Malware?
- Malware is a form of “malicious software”.
- It refers to software that is intentionally designed to cause harm to a computer, server, client, or computer network.
- The term includes viruses, worms, Trojan horses, ransomware, spyware, adware, and scareware.
Purpose of creating malware
- Cybercriminals use malware to steal sensitive information such as banking details or credit card numbers to commit fraud or theft.
- To steal confidential data from individuals or organizations for blackmail, corporate espionage, or other malicious purposes.
- To disable systems, networks, or services to cause operational disruptions.
- Gaining unauthorized access to systems or networks to control them, steal data, or use them as part of a larger botnet for other malicious activities.
- Surveilling individuals or organizations for espionage or intelligence gathering.
- Damaging or destroying data and systems to disrupt or harm operations.
Common types of malware
- Viruses: Programs that attach to legitimate programs and spread to other programs when executed.
- Example: Melissa virus, which spread via email attachments.
- Worms: Standalone malware that replicates itself to spread to other computers.
- Example: I LOVE YOU worm, which spread via email.
- Trojan horses: Malware disguised as legitimate software that provides unauthorized access when executed.
- Example: Zeus Trojan, which targeted banking information.
- Spyware: Secretly monitors and collects information about users without their knowledge.
- Example: Pegasus spyware, used for surveillance on mobile devices.
- Adware: Automatically displays or downloads advertisements when a user is online.
- Example: Fireball, an adware that hijacked the browser to generate revenue.
- Rootkit: Programs that give unauthorized users administrative access to a computer.
- Example: Sony BMG’s rootkit, which was found on music CDs.
- Botnet: A network of infected computers (bots) that are remotely controlled by a hacker.
- Example: Mirai botnet, which carried out massive DDoS attacks.
What is Cybercrime?
- Cybercrime includes a variety of criminal activities using digital devices and networks.
- It includes technology-based crimes such as fraud, identity theft, data breaches, computer viruses, and scams.