
Cyber EOP - Types of Threats By Mr. B
Presentation
•
Professional Development
•
12th Grade
•
Medium
Cyber Professor - Mr. B
Used 2+ times
FREE Resource
26 Slides • 28 Questions
1
Understanding Common
Malware Types and Their
Real-World Examples
Key Malware Threats to Be Aware of in 2024
2
Multiple Choice
What type of malware disables a victim's access to data until a ransom is paid?
Trojan
Spyware
Ransomware
Adware
3
Introduction to Malware
Malware refers to malicious software designed to damage, disrupt, or
steal data from systems.
In this presentation, we’ll cover common types of malware, what they do,
and real-world examples.
4
Explanation Slide...
Ransomware is a type of malware that locks or encrypts a victim's data, demanding a ransom for access restoration. Unlike Trojans, spyware, or adware, ransomware specifically targets data access for financial gain.
5
Ransomware: Holding Data Hostage
What It Does: Disables access to data until a ransom is paid.
Example:RYUK – Used to target critical infrastructure.
Real-World Case: The city of Baltimore was attacked by RobbinHood
ransomware, costing more than $18M.
6
Multiple Choice
Which malware type makes changes to files that are native to the operating system?
Fileless Malware
Wiper Malware
Keyloggers
Bots
7
Multiple Choice
What type of malware disables a victim's access to data until a ransom is paid?
Trojan
Spyware
Ransomware
Adware
8
Explanation Slide...
Fileless malware operates in memory and can manipulate native operating system files without leaving traditional traces, making it a significant threat. Other options like wiper malware and keyloggers do not specifically alter OS-native files.
9
Fileless Malware: Hiding in Plain Sight
What It Does: Modifies native OS files without installing new software.
Example:Astaroth – Alters legitimate Windows tools to steal credentials.
Key Point: Hard to detect, 10x more successful than traditional malware.
10
Multiple Choice
What is the primary function of spyware?
To collect user activity data without their knowledge
To serve unwanted advertisements
To disguise itself as desirable software
To replicate itself across networks
11
Multiple Choice
Which malware type makes changes to files that are native to the operating system?
Fileless Malware
Keyloggers
Wiper Malware
Bots
12
Explanation Slide...
The primary function of spyware is to collect user activity data without their knowledge, often for malicious purposes. This distinguishes it from other software types that may serve ads or replicate themselves.
13
Spyware: Monitoring Users Without Consent
What It Does: Collects sensitive data (passwords, browsing habits)
without user knowledge.
Example:DarkHotel – Targets high-profile individuals via hotel Wi-Fi.
Impact: Reduces performance and compromises sensitive data.
14
Multiple Choice
Which malware type is known for hijacking browsers to change default search engines?
Trojan
Ransomware
Worms
Adware
15
Multiple Choice
What is the primary function of spyware?
To disguise itself as desirable software
To collect user activity data without their knowledge
To serve unwanted advertisements
To replicate itself across networks
16
Explanation Slide...
Adware is a type of malware that often hijacks browsers to change default search engines and display unwanted ads. Unlike Trojans, ransomware, or worms, adware specifically targets browser settings.
17
Adware: The Ad Overload
What It Does: Serves unwanted advertisements based on user activity.
Example:Fireball – Infected 250M devices, hijacked browsers.
Risk: Breaches user privacy and enables ad click fraud.
18
Multiple Choice
What does a Trojan disguise itself as?
Malicious code
A legitimate application
A network worm
Desirable code or software
19
Multiple Choice
Which malware type is known for hijacking browsers to change default search engines?
Trojan
Worms
Ransomware
Adware
20
Explanation Slide...
A Trojan disguises itself as desirable code or software to trick users into downloading it, unlike malicious code which is overtly harmful. This deception is key to its ability to infiltrate systems.
21
Trojans: The Disguised Threat
What It Does: Disguises itself as legitimate software, often used to take
control of devices.
Example:Emotet – Banking Trojan, highly persistent and costly.
Real-World Case: Emotet has caused $1M in remediation costs per
incident.
22
Multiple Choice
Which malware was developed to target Iran's nuclear program?
Triada
Stuxnet
Emotet
Zacinlo
23
Multiple Choice
What does a Trojan disguise itself as?
Malicious code
A legitimate application
Desirable code or software
A network worm
24
Explanation Slide...
Stuxnet is a well-known malware specifically designed to disrupt Iran's nuclear program by targeting its industrial control systems, making it the correct answer.
25
Worms: The Self-Replicating Menace
What It Does: Spreads across networks by replicating itself.
Example:Stuxnet – Used to sabotage Iran’s nuclear program.
Impact: Exploits software vulnerabilities, spreads rapidly.
26
Multiple Choice
What is a keylogger primarily used for?
To serve advertisements
To launch DDoS attacks
To erase user data
To monitor user keystrokes
27
Multiple Choice
Which malware was developed to target Iran's nuclear program?
Triada
Emotet
Stuxnet
Zacinlo
28
Explanation Slide...
A keylogger is primarily used to monitor user keystrokes, capturing what users type on their keyboards. This can include sensitive information like passwords and personal messages, making it a tool for spying rather than for advertising or data deletion.
29
Rootkits: Silent Control of Your System
What It Does: Provides remote control over the infected system.
Example:Zacinlo – Infects via fake VPN, conducts ad fraud.
Real-World Case: Zacinlo removes competing malware to maintain
control.
30
Multiple Choice
What type of malware is known for creating a network of bots?
Wiper Malware
Bots/Botnets
Fileless Malware
Spyware
31
Keyloggers: Tracking Keystrokes
What It Does: Monitors and records user keystrokes.
Example:Olympic Vision – Used to steal business email data.
Threat: Can capture sensitive data such as passwords and banking
information.
32
Explanation Slide...
Bots/Botnets are a type of malware specifically designed to create networks of infected devices, known as bots, which can be controlled remotely. This distinguishes them from other types of malware like Wiper or Spyware.
33
Multiple Choice
What is a keylogger primarily used for?
To monitor user keystrokes
To serve advertisements
To launch DDoS attacks
To erase user data
34
Multiple Choice
Which malware type infects mobile devices?
Mobile Malware
Ransomware
Worms
Adware
35
Bots: Automated Tools for Attacks
What It Does: Bots perform automated tasks, often forming networks
(botnets) for massive attacks.
Example:Echobot – Targets IoT devices, used in DDoS attacks.
Impact: Can disrupt networks and services on a large scale.
36
Explanation Slide...
Mobile Malware specifically targets mobile devices, making it the correct choice. While ransomware, worms, and adware can affect various systems, Mobile Malware is designed for mobile platforms.
37
Multiple Choice
What type of malware is known for creating a network of bots?
Wiper Malware
Fileless Malware
Bots/Botnets
Spyware
38
Multiple Choice
What is the main purpose of wiper malware?
To serve unwanted advertisements
To collect user data
To disguise itself as legitimate software
To erase user data beyond recoverability
39
Mobile Malware: Attacking Mobile Devices
What It Does: Targets mobile phones, often through apps or phishing.
Example:Triada – Pre-installed on Android devices to show spam ads.
Key Risk: Increasingly targeting smartphones, impacting both consumers
and businesses.
40
Explanation Slide...
Wiper malware is specifically designed to erase user data beyond recoverability, making it a destructive threat. Unlike other malware types, its primary goal is data destruction rather than data theft or advertisement.
41
Multiple Choice
Which malware type infects mobile devices?
Worms
Mobile Malware
Ransomware
Adware
42
Multiple Choice
Which malware example is known for targeting hotel Wi-Fi networks?
DarkHotel
Echobot
Triada
Fireball
43
Wiper Malware: Data Destruction
What It Does: Erases data beyond recoverability.
Example:WhisperGate – Used in cyberattacks on Ukrainian government
systems.
Key Point: Used to cover tracks and disrupt organizations’ operations.
44
Explanation Slide...
DarkHotel is a malware specifically designed to target hotel Wi-Fi networks, exploiting vulnerabilities to steal sensitive information from guests. The other options do not have this specific focus.
45
Multiple Choice
Which malware type is known for erasing data and ensuring it can't be recovered?
Ransomware
Trojan
Fileless Malware
Wiper Malware
46
Multiple Choice
What type of malware is Olympic Vision?
Adware
Worm
Keylogger
Trojan
47
Conclusion
Malware continues to evolve, becoming stealthier and more damaging.
Prevention strategies include using up-to-date antivirus, strong
passwords, and employee education.
CrowdStrike Falcon® offers comprehensive protection through innovative
malware detection technologies.
48
Explanation Slide...
The primary function of bots in a botnet is to perform automated tasks, such as sending spam or launching attacks, without human intervention. This allows the botnet to operate efficiently and at scale.
49
Multiple Choice
What is the primary function of bots in a botnet?
To erase data
To monitor keystrokes
To disguise as legitimate software
To perform automated tasks
50
Multiple Choice
Which malware type is known for erasing data and ensuring it can't be recovered?
Ransomware
Trojan
Wiper Malware
Fileless Malware
51
Multiple Choice
What is the main characteristic of fileless malware?
It installs software on the victim's device
It makes changes to existing files without installation
It is easily detected by antivirus software
It requires user interaction to spread
52
Multiple Choice
What type of malware is designed to steal sensitive information such as passwords?
Adware
Spyware
Ransomware
Wiper Malware
53
Multiple Choice
Which malware type is often spread through email attachments or links?
Trojan
Worms
Fileless Malware
Keyloggers
54
Multiple Choice
What is the main goal of ransomware?
To collect user data
To encrypt files and demand payment
To display unwanted ads
To monitor user activity
Understanding Common
Malware Types and Their
Real-World Examples
Key Malware Threats to Be Aware of in 2024
Show answer
Auto Play
Slide 1 / 54
SLIDE
Similar Resources on Wayground
50 questions
Inglés I
Presentation
•
12th Grade
44 questions
7.05 & 7.06
Presentation
•
12th Grade
49 questions
Note Taking Refresher
Presentation
•
12th Grade
50 questions
9/6 Virus Structure and Reproduction
Presentation
•
12th Grade
50 questions
Leg Branch Lesson 2
Presentation
•
12th Grade
51 questions
Mandatory Live Session 4
Presentation
•
12th Grade
50 questions
Quizizz para Conocedores
Presentation
•
12th Grade
51 questions
Tree leaf quiz
Presentation
•
11th - 12th Grade
Popular Resources on Wayground
20 questions
"What is the question asking??" Grades 3-5
Quiz
•
1st - 5th Grade
20 questions
“What is the question asking??” Grades 6-8
Quiz
•
6th - 8th Grade
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
34 questions
STAAR Review 6th - 8th grade Reading Part 1
Quiz
•
6th - 8th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
47 questions
8th Grade Reading STAAR Ultimate Review!
Quiz
•
8th Grade
Discover more resources for Professional Development
10 questions
Fire Safety Quiz
Quiz
•
12th Grade
20 questions
“What is the question asking??” English I-II
Quiz
•
9th - 12th Grade
10 questions
Fire Prevention
Quiz
•
9th - 12th Grade
20 questions
Grammar
Quiz
•
9th - 12th Grade
16 questions
AP Biology: Unit 1 Review (CED)
Quiz
•
9th - 12th Grade
20 questions
verbos reflexivos en español
Quiz
•
9th - 12th Grade
11 questions
Expectations Review
Quiz
•
9th - 12th Grade
10 questions
Climate Change and Its Impact
Interactive video
•
9th - 12th Grade