Malware
Introduction
According to Gierszewski (2016), malware is developed to damage a computer, client, computer network, or serve. The same author noted that different types of malware exist. Some of the commonly used malware include worms, Trojan horses, spyware, ransomware, scareware, and rogue software. In most cases, the malware developers lock the system and demands for a pay to unlock it. According to Rani & Dhindsa (2020) some malware developers corrupts the system despite the payment. The paper will discuss the techniques used by malware developers to disguise their code and prevention measure.
Prevention of Malware
Different organizations have employed malware developers to come up techniques that are essential in stopping malware from unauthorized sources. The first technique is development of good antivirus software. According to it is essential for organizations to pre-install the software that can detect presence of malware prior invasion. According to Gierszewski (2016) the antivirus is vital as it restricts any entry of unauthorized software to the device. The antivirus is in a position to kill any malware that tries to gain access.
The second technique to overcome the malware is the implementation of social engineering. The social engineering involves sending fake emails to clients that are aimed at getting access to personal. For example, cybercriminals in Japan used home delivery services to spread Trojan spyware through CDs. Institutions such as banks can use the social engineering to detect the malware that can be used by suspicious malware developers. The third technique that can be used is ensuring that an organization discards any message that has high chance of carrying a malware. The cybercrime security officers in different organizations should be in a position to identify the keywords used by malware developers that can be used to extract information.
The fourth technique that is used is link downloads that are developed by third party site. The developers always encourages the users of computers to click in order to download and the process gives access to a third party user. The cybercrime security officer in the organization should be trainers the users of the organization ways to discard and filter for the mails. Lastly, the malware developers in organizations can prevent attacks of malwares through installation of automatic scan. The techniques used by malware developers are classified under three ranks; rank 1 is wrapping, rank 2 obfuscations and rank 3 is packers technique.
Techniques Used by Malware Developers to Evade Detection
The first technique is IceFog which is ranked 1. The technique is classified as wrapping as the malware developer links or attaches a malicious payload to a given file. The method is widely used in windows and OS X malware that are distributed through P2P networks and pirate software.
The second technique is exclusive OR which is rank 2. The technique is classified as an Obfuscation which involves the updating of binary and high-level code is such a way that the functionality of system is not affected. According to Forte & Iskander (2018) the obfuscation works as a piracy and reverse-engineering. The technique has been used by malware authors to bypass and avoid antivirus. The last technique is UPX and Armadillo that is ranked 3. The technique is classified as packers technique as it is applied in compressing and encoding binary files.
References
Forte, D., & Iskander, Y. (2018). Guest Editorial: Hardware Reverse Engineering and Obfuscation. Journal Of Hardware And Systems Security, 2(4), 287-288. https://doi.org/10.1007/s41635-018-0059-9
GIERSZEWSKI, T. (2016). Malware – Malicious Software in IT/OT Systems. AUTOMATYKA, ELEKTRYKA, ZAKLOCENIA, 7(4(26)2016), 158-169. https://doi.org/10.17274/aez.2016.26.09
Rani, S., & Dhindsa, K. (2020). Android application security: detecting Android malware and evaluating anti-malware software. International Journal Of Internet Technology And Secured Transactions, 10(4), 491. https://doi.org/10.1504/ijitst.2020.10028988