0% found this document useful (0 votes)
41 views3 pages

Data Science Students' Malware Guide

Uploaded by

azii6756ty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views3 pages

Data Science Students' Malware Guide

Uploaded by

azii6756ty
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

Name

Roll Number

Department Data Science

Subject Introduction to Information & Tehnologies


( IICT )
Submitted to Sir Jamal Shams

Assignment Title Viruses & Its Types

Dawood University of Engineering & Technology, Karachi


DAWOOD UNIVERSITY OF ENGINEERING & TECHNOLOGY
NEW M.A JINNAH ROAD, KARACHI
DEPARTMENT OF DATA SCIENCE
Date : 30,Oct 2024

 Windows update ransomware (Cyborg)


One of the most common types of malware used in these attacks is known as Cyborg
ransomware, a fairly typical form of ransomware that first emerged in 2019. Once active,
Cyborg sweeps through the target PC, encrypting every file it can find. [1]

 SocG0lish

It’s a downloader that is delivered by a drive-by-download, where the user unwittingly


downloads malware from a compromised or malicious website, having been tricked into
clicking fake software or browser-update links.[2]

 RaaS
RaaS is a worrying trend as it makes sophisticated malware tools available to hackers with
little or no experience, helping to make ransomware attacks more widespread and
unpredictable. As this new level of access to malware develops, the number of unexpected
and erratic attacks enabled by RaaS groups looks set to increase in the coming years. [3]

 LockBit 3.0
LockBit 3.0, also known as “LockBit Black,” operates as a Ransomware-as-a-Service (RaaS)
model. It is more modular and evasive than previous versions and is deployed by affiliates
who use various tactics to target businesses and critical infrastructure. After encrypting files,
LockBit 3.0 leaves a ransom note, changes the host’s wallpaper and icons, and may send
encrypted data to a command and control server.[4]

 8Base
8Base is not a ransomware operation, but a data-extortion cybercrime operation. They quickly
become a notorious actor on the cyber threat landscape due to the significant number of
victims claimed on their data leak site. [5]

 Akira
Akira is offered as a ransomware-as-a-service and was discovered in March 2023. It is
malicious software that poses a significant threat to data security. It targets both Windows and
Linux devices, encrypting data and demanding a ransom for decryption. [6]

 Cl0p
The ‘Clop virus’ name comes from the Russian word ‘klop’, which means ‘bed bug’. Cl0p
ransomware, belonging to the popular Crypto mix family, is a dangerous file-encrypting
malware. It actively targets systems with inadequate security, encrypting files and appending
the ‘.Clop’ extension to them.[7]

Subject Teacher 1 Chairman of Data


Science
_____________ _____________________
DAWOOD UNIVERSITY OF ENGINEERING & TECHNOLOGY
NEW M.A JINNAH ROAD, KARACHI
DEPARTMENT OF DATA SCIENCE
Date : 30,Oct 2024

Subject Teacher 2
Chairman of Data Science
_____________
_____________________

You might also like