A Review on Assessing Extent of Malware Damage and Basic Countermeasures

Authors

  • Omkar Mandar Pradhan
  • Harshita Kansara
  • Durvankur Sanjay Balkawade
  • Navnath Shete

Abstract

In today's era of a digital world, Malware is a threat that looms above our heads. Attackers find a way to infect our systems to access our data and possibly disrupt our lives. Malware comes in many different forms and factors. The Malware could be harmful or a simple inconvenience, and it could cause a system-wide breakdown or even attempt to set up a backdoor. We chose the topic to get hands-on experience on at least some kinds of feasibly accessible Malwares. Learning about different Malware and testing a few of them out was a great way of understanding them clearly. In this research paper, We will be discussing kinds of Malware, their possible impacts, and some countermeasures. As Important as countermeasures against Malware is, understanding different types of malware threats is just as important.

We will be testing some malware threats in a virtual environment using two different virtual machines configured to be vulnerable enough to get a good look at the damage done. We are using virtual environments supporting snapshots to revert the system to a working state if some malware affects it a way that leaves it unusable.

We tested Malware that can establish a reverse TCP connection to give the attacker access to the system. We also tried some minor malware, which can kill random processes, delete arbitrary files, copy the largest files, mess with extensions, mess with environment variables and insert keyloggers.

Downloads

Download data is not yet available.

References

Baker, K. (2021, August 19). THE 11 MOST COMMON TYPES OF MALWARE. Retrieved from crowdstrike: https://www.crowdstrike.com/cybersecurity-101/-malware/types-of-malware/

Cyber Edu. (n.d.). What is Malware? Retrieved from Forcepint: https://www.forcepoint.com/cyber-edu/malware

Kaspersky. (2023). kaspersky>home security> resource center> threats. Retrieved from kaspersky: https://www.kaspersky.com/resource-center/threats/types-of-malware

Microsoft. (n.d.). Microsoft Edge Developer. Test IE11 and Microsoft Edge Legacy using free Windows 10 virtual machines you download and manage locally. Microsoft. Retrieved from https://developer.microsoft.com/en-us/microsoft-edge/-tools/vms/

OWASP. (n.d.). Kali Linux. Virtual Machines. Retrieved from https://www.kali.org/-get-kali/#kali-virtual-machines

Porup, J. (2019, March 25). What is Metasploit? And how to use this popular hacking tool. Retrieved from CSO India: https://www.csoonline.com/article/3379117/what-is-metasploit-and-how-to-use-this-popular-hacking-tool.html

screetesec. (n.d.). Git Repo. Retrieved from FatRat Git Repo: https://github.com/-screetsec/TheFatRat

Additional Files

Published

30-05-2023

How to Cite

Omkar Mandar Pradhan, Harshita Kansara, Durvankur Sanjay Balkawade, & Navnath Shete. (2023). A Review on Assessing Extent of Malware Damage and Basic Countermeasures. Vidhyayana - An International Multidisciplinary Peer-Reviewed E-Journal - ISSN 2454-8596, 8(si7), 317–332. Retrieved from http://j.vidhyayanaejournal.org/index.php/journal/article/view/827