02.03.2018 Views

Sybex CEH Certified Ethical Hacker Version 8 Study Guide

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Malware 181<br />

In past decades, what we now call malware was not so vicious in nature; it was more<br />

benign. Software in this class was able to infect, disrupt, disable, and in some cases corrupt<br />

software, including the operating system. However, it generally just annoyed and irritated<br />

system owners; nastier forms were rare.<br />

In recent years, though, this software category has come to include applications that<br />

are much more malignant. Current malware is designed to stay stealthy in many cases and<br />

employs a myriad of features designed to thwart detection by the increasingly complex<br />

and accurate antimalware systems, such as antivirus software and antispyware. What<br />

hasn’t changed is the fact that malware consumes resources and power on a host system or<br />

network, all the while keeping the owner in the dark as to its existence and activities.<br />

Making the situation worse in today’s world is that current malware types have been<br />

influenced by the criminal element. The creation of botnets () and theft of information are<br />

becoming all too common.<br />

Malware is a contraction of malicious software. Keep this in mind. The<br />

term accurately describes the purpose of this type of software.<br />

If we define malware to include any software that performs actions<br />

without the user’s knowledge or consent, this could include a large amount<br />

of software on the average system. It is also important to recognize that<br />

most malware is hostile in nature. Criminals use malware in a variety<br />

of ways to capture information about the victim or commit other acts.<br />

As technology has evolved, so has malware, from the annoying to the<br />

downright malicious.<br />

Another aspect of malware that has emerged is its use to steal information. Malware<br />

programs have been known to install what is known as a keylogger on a system. The<br />

intention is to capture keystrokes as they’re entered, with the intention of gathering<br />

information such as credit card numbers, bank account numbers, and similar information.<br />

For example, malware has been used to steal information from those engaging in online<br />

gaming, to obtain players’ game account information.<br />

In the Crosshairs<br />

One of the highest-profile incidents concerning the dangers of malware involves the U.S.-<br />

based retailer Target. In late November through early December, 2013, Target became<br />

the victim of a data breach that compromised at least 110 million customer accounts:<br />

an estimated 40 million included credit, debit, and PIN information, and the remaining<br />

70 million involved name, address, e-mail, and phone information. This attack, the fallout<br />

of which is still being assessed, represents the second largest data breach in history.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!