6.2.1.11 Lab - Anatomy of Malware

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Lab – Anatomy of Malware

Objectives
Research and analyze malware

Background / Scenario
Malware, or malicious software, refers to a variety of malicious software programs that can be used to cause
harm to computer systems, steal data, and bypass security measures. Malware can also attack critical
infrastructure, disable emergency services, cause assembly lines to make defective products, disable electric
generators, and disrupt transportation services. Security experts estimate that more than one million new
malware threats are released each day. A McAfee Labs report indicates almost 500 million known malware
threats at the end of 2015.
Note: You can use the web browser in virtual machine installed in a previous lab to research security related
issues. By using the virtual machine, you may prevent malware from being installed on your computer.

Required Resources
 PC or mobile device with Internet access

Conduct a Search of Recent Malware


a. Using your favorite search engine, conduct a search for recent malware. During your search, choose four
examples of malware, each one from a different malware type, and be prepared to discuss details on
what each does, how it each is transmitted and the impact each causes.
Examples of malware types include: Trojan, Hoax, Adware, Malware, PUP, Exploit, and Vulnerability.
Some suggested web sites to search malware are listed below:
McAfee
Malwarebytes
Security Week
TechNewsWorld
Lampion Trojan: https://cyware.com/news/newly-discovered-lampion-trojan-found-targeting-portuguese-
users-fce0a97a
Wannacry Ransomware: https://www.us-cert.gov/sites/default/files/FactSheets/NCCIC
%20ICS_FactSheet_WannaCry_Ransomware_S508C.pdf
Firefox 73 Vulnerability: https://threatpost.com/mozilla-firefox-73-browser-update-fixes-high-severity-rce-
bugs/152831/
PUP.(Optional): https://blog.malwarebytes.com/detections/pup-optional/
b. Read the information about the malware found from your search in step 1a, choose one and write a short
summary that explains what the malware does, how it is transmitted, and the impact it causes.
- The WannaCry ransomware attack was a May 2017 worldwide cyberattack by the WannaCry
ransomware cryptoworm, which targeted computers running the Microsoft Windows operating system by
encrypting data and demanding ransom payments in the Bitcoin cryptocurrency. This randsomeware
spread through email spam.

You might also like