Author Topic: Cyber Security Megathread  (Read 2310 times)

Computer Security Megathread
In the time of the internet, there are millions of different viruses and exploits used by internet hackers and criminals. In this Megathread, I will be going over the different types of viruses and ways hackers infect people with them, and later how to remove and protect against viruses. Enjoy!

Types of Viruses

Remote Access Tools
A Remote Access Tool is, basically, a program that lets a host (the "hacker") control a computer (the "slave") either consensually or unknowingly to the "slave". Although there are many different types of RATs, most have a few common features, such as screen/camera capture or image control, file management, shell control, computer control, and registry management. Though some RATs are made by hand, most are premade; including Cybernet, Darkcomet, Blackshades, and Blackhole.

Keyloggers
Keyloggers, as the name suggests, log keys pressed by the infected party and send the logs to the hacker, either by FTP or by email. The main program used to create keyloggers is Project Neptune, though most keyloggers are made by hand, as they are quite basic--all it has to do is copy some text and send it through FTP.

Adware
Adware is a type of virus that promotes products by showing ads or highlighting text on webpages, as some users have experienced. It is usually the easiest virus to remove, as it usually comes with free program installers, and can be removed by simply removing the program via Add or Remove Programs--some viruses, however, are not so easy to remove, which brings us to..

Ransomware
Ransomware is a type of virus that locks down a victim's computer until they pay some amount of money, usually $150-$500, usually under the guise that the FBI/Police/Government has locked down their computer. Most of the time, even if the user pays the ransom the computer is still locked.

Types of Infections

Silent Java Drive By
The Silent Java Drive By is an exploit in Java that enables a hacker to infect a user with a virus through the user's browser. They are almost always made from scratch.

Trojan Horse
Like its name suggests, a Trojan horse infection is basically a legitimate looking program that is either completely a virus or binded to a virus. They are usually something along the lines of fake antiviruses, pirated games, or game hacks; fooling victims into installing a virus.

Another method that hackers use with Trojan horses is E-Whoreing. E-Whoreing is basically a hacker pretending to be a internet whore, who gives out nude or suggestive pictures, research shows, and other types of research. They usually bind viruses to video or picture files.
 
Worms
A worm is a virus that spreads itself between computers, usually from computers on the same internet network or through instant messaging. Most worms are set in action unknowingly by already infected computers. They are usually coded by hand.


It might help your credibility if you hadn't misspelled the thread title.

Fixed the typo in the title.

unless you browse research 24/7 and use a terrible OS, you really shouldn't need to care about any of this

unless you browse research 24/7 and use a terrible OS, you really shouldn't need to care about any of this
I don't browse research 24/7 and i've had a few Trojans before

You should mention that antivirus softwares are generally only about 10% effective and that anybody can download a FUD crypter at their nearest scriptkiddy website, rendering them pretty much entirely useless.

No actual exploits, social engineering, or website hacking. I'm disappointed. Do you know how these things work or do you just know their basic synopses?

No actual exploits, social engineering, or website hacking. I'm disappointed. Do you know how these things work or do you just know their basic synopses?

heptagon

getting fancier and fancier

you should add Foistware
Foistware is a term used to describe software downloaded to a computer without the owner's knowledge, which puts hidden components on a system, and attempts to bait the unsuspecting into purchasing another software remedy.

Software that is installed without the user's knowledge or consent, often bundled with another product.