Background
Rootkit is a kind of software that is malicious and gets activated each time the computer system is booted. They are often difficult to detect because they become activated before the computer operating system completes booting up. Rootkit installs hidden files, user accounts and make processes within the operating system. They are also capable of intercepting information and data packets from network terminals and even the keyboard. Generally rootkits would be a term used to refer to those malware that conceal their activities. This strategy of concealing files activities and processes is referred as stealth techniques (McAfee, 2006).
History
In the early days, rootkits were used by network administrator to get access to a network or computer this technique was known as stealth. However, the same tools were used by attackers to intrude into computers and networks in windows environment; these tools were then referred as rootkits. The stealth techniques began with the computer virus Brian, in 1986. The Brian virus was capable of redirecting and intercepting computer boots sectors elsewhere in the disk. The virus used stealth techniques unlike other viruses at that time that did not conceal their activities. More viruses using more complex stealth techniques were developed in the 1980’s and 1990’s. These early rootkits used two common methods of avoiding detection; they included replacing the bios disk input/output interrupts with different modified results and
Spyware is Software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive.
A backdoor is “a means by which a developer or user reenters a computer system at a later date and time, without going through the normal security processes”. When someone use, or created a backdoor they are trying to hide evidences of their unauthorized access to the system. What is intrusion detection system? Intrusion detection system or IDS is “a computer security system that is intended to detect attacks on systems and to detect the unauthorized use of such systems, networks, and related resources”. Another thing we can find evidence from is the
Rootkit – Rootkit is a software that is downloaded onto a computer to ide the compromised operating system. This can allow other viruses or malware to come and make it look like it’s a necessary file for the computer. Even if you use an anti-virus, it will look at it but will think it’s a necessary file for the computer. The longer the rootkit is installed the harder it is to undo the damages
They are used to gain access to a system to steal data or cause damage to software present in the system.
Each year there are many attempts to illegal gain entry into networks by attackers to steal information. Some attacks are designed to steal information while other may be to attack a system to cause damage or disrupt services. Attack can happen from anywhere in the world due to the internet and networks. A person from China can hack into an American network or such Stuxnet virus attack on Iran nuclear power plan which thought to be from Israel or United States but it is unsure where the virus originated from. According to Merkow & Breithaupt (2006), viruses caused the greatest financial loss over other computer crimes, (p 142). Worm is a type of virus which replicates and can easily infect a machine and then spread out across the network by using transport features of the computer or network.
Do you have children? Do they use the internet? Do you know what they're doing on the internet? They could be doing homework, or they could be talking to a pedophile. How can you protect your child? Harlan Coben wrote an article with his solution to this problem: spyware. However, I don't agree with this, there are other, better ways to protect your child. Still don't believe me? Well listen to this.
June 2010, VirusBlokAda a computer company in Belarus receives an email containing information on a computer located in Iran that appears to have a virus causing it to continually reboot. The virus is using a “zero-day” exploit from a LNK file of Windows Explorer, then infects the computer when a flash drive (USB stick) is installed and scanned and then the virus is automatically copied from the flash drive to the computer. Zero-day exploits are extremely rare occurring in approximately 1 in 1 million viruses. Because of the rarity of “zero-day” exploits, the cyber community usually takes notice and contacts the appropriate vendor, in this case Microsoft, so the vendor can patch the software and eliminate the issue. Microsoft then began building its patch for Stuxnet, but in the background Stuxnet continued on its mission.
This is not yet properly known but as most hacks like this start with a phishing approach, which include sending messages to representatives to motivate them to tap on harmful software's or visit sites where malware is surreptitiously downloaded to their machines. Programmers likewise get into devices through loop holes in an organization's site that can give them access to backend databases. Once on an affected device in an organization's system, attackers can outline system and take Admin level passwords to access other ensured frameworks on the system and look out for important information to make it up to their advantage.
The new form of criminals that sit behind a desk in slipper and being able to steal personal information by using malware. It may seem unbelievable that your identity can be easily stole from you owe personal computer. One of the best ways to avoid a computer from being infected from a malware is to avoid opening any unfamiliar documents on your computer. Any emails that is unknown delete and do not open.
They hack into webpages, send emails with a malicious code. (software, system scurity )They are spread manually. The most common installation methods involve system or security exploitation, and unsuspecting users manually executing unknown programs. You can use the current engine and DAT files for detection and removal.
A rootkit gives attackers full access to the system (hence the term 'root') and typically hides the files, folders, registry edits, and other components it uses. In addition to hiding itself, a rootkit typically hides other malicious files that it may be bundled with. The Storm worm is one example of rootkit-enabled malware. (Note that not all Storm Trojans are
Malwares are mischievous programs crafted to agitate or forbid normal operations to gather selected information which may lead to loss of privacy through
To understand the business of malware, one must understand how malware has evolved in the past twenty-five years. Malware, which includes all kinds of malicious software, was originally created to show the weaknesses of computers. The first type of malware, created in 1986, was a virus called “Brain.A. Brain.A was developed in Pakistan, by two brothers - Basit and Amjad. They wanted to prove that PC is not secure platform, so they created virus that was replicating using floppy disks” (Milošević). Even today malware is still used to check the security of machines.
The internet is a medium that is becoming progressively important as it makes information available in a quick and easy manner. It has transformed communications and acts as a global network that allows people to communicate and interact without being limited by time, boarders and distance. However, the infrastructure is vulnerable to hackers who use the system to commit cyber crime. To accomplish this, they make use of innovative stealth techniques for their malicious purposes in the internet.
Many types of computer virus has been spreading in computers since 1960. The first a computer virus discovered in 1970 and called The Creeper virus on Arpanet browser (anon, 2013)