Overview Of The Malware Treats Of High, Medium And Low Risk

Kovter Risk: High

Kovter is a Trojan that just keeps on growing, it started off as police ransomware, where it stayed in a computer system and waited for the right moment to strike this is an extremely bad Trojan as this installs parts of shell spawning techniques. It comes from spam mail and this is bad for a company like Games Workshop because this software can be used as a ransomware as it steals information through a backdoor without the person knowing. This is bad because Games workshop has millions of people’s info and kovtor could use this to their advantage by putting a ransom on their information. The treat for Kovter is big as it could get onto the computers in Games workshop and steal so much information which can be sold on for profits. Games workshop will have to install antiviruses on their devices and try have safety procedures in place for the protection of their files, staff and customer.

Fake Apps

Risk: Medium

Games Workshop has two main apps for its customers and with most apps with in game purchases there will always be a fake or a app with a crack this can hurt consumers these apps will mostly have viscous malware or miners that will steal personal information or use loads of cup power which will reduce the performance of the device the user is using it. This can also do other stuff like send viscous spam emails with malware to other users on the mobile the list is endless just depends on the type of damage the hacker wants to do. The treats can be endless and deadly depending on what the hack has to do. If it some ransomware all the data could be deleted or if it’s a miner it will damage the device mostly the CPU. The best option is to inform consumers that they should not download apk’s or free apps and they should get contact to Google or Apple to remove any fake apps or they could have barcodes that are on the product that proves the site is real.

Phishing

Risk: High

Phishing is a cybercrime in which its targets are contacted through most social aspects of the internet, the criminals pretend to be real individuals with power or sound like a massive institution to lure individuals into providing data about themselves or a particular business they could be working for. Phishing would be mostly for staff and consumers it would target staff to get more information about the business, Phishing has been around for a long time allowing it to develop and exploit more than ever. Phishing can come in an email designed to help or ask about an appointment a staff member would open the pdf. This will allow a back route to servers allowing access to very precious information. Like past work, work for the future consumer information (credit cards info, home addresses). Phishing can be dealt with in different ways there can be a closed access of emails allowed on emails, there could be work emails just for work and filters for spam emails to be extra safe the company could stop any outside emails from entering the system. Phishing is pretty low if it is controlled but if its inside the system it could damage the company and their image which would or could cost them millions.

WannaCry

Risk: High

Wannacry is a ransomware worm that is spread out by mail spam. It was made by a Korean hacker and first appeared in 2017 and is still going to this day it spreads on computers with older operating systems but has evolved. It now has two parts – the worm and the ransomware. Ransomware allows the hacker to block off information and charge for it. Wannacry gets in through a backdoor and this means that most attacks are on private computers but business are not immune. In mid-2017, thousands of computers are affected. The best way to protect from wannacry is by updating your system regularly and load automatic ones and install a ransomware antivirus.

Emotet

Risk: High

Emotet is a complex Trojan that spreads quickly and drops banking trojans. The initial infection which occurs from balsam emails with spiteful links, macro-enabled Word attachments, PDFs with linked files. This program tries to steal personal and close kept online banking details. This malware could be very costly if it enters the systems. Games workshop can protect themselves from this by keeping their bank details to very high authorities of the business as well as stopping employees using their bank details on personal stuff. It could also install antivirus to.

FBI Virus

Risk: Low

The FBI Virus (also known as the FBI Money pack scam) is an attacking malware that shows itself as an official FBI alert, claiming that your computer is blocked due to copyright and related law violations, it attempts to trick you by making you believe that you have visited an illegal site and will search your system and meaning it will make sure you are unable to close down the app. The goal of the hacker is to make sure you pay 200 dollars so you can inlock your computer. Games Workshop can stop this malware by teaching their employees how to stop these incise of a treat. the easiest way to stop this malware is to turn on safe mode and run an anti-malware software and from here remove the suspicious files.

Suspicious. Emit

Risk: High

Suspicious. Emit is a malware threat that allows access to your computer. The malware uses code to thwart detection which alters the internal processes of the operating system so that your antivirus or spyware can’t detect it if it’s doing something. The software self-defence mechanism which stops any security related application from accessing it. The malware puts a autorun file on the user computer allowing it to access all files if needed if the user opens another file on another computer then the computer is affected. This malware can access personal information and can contact remote hosts and propagate to other computer. Games Workshop can remove this malware by installing an antivirus and it’s very difficult to remove it manually.

Sirefef

Risk: High

Sirefef (aka 0access) uses underground features to hide its presence and will disable your systems and can come in different ways which includes rootkit, virus or a Trojan horse. As a rootkit it goes through the back and hides itself by altering the possessing often operating system so that the antivirus can’t detect it. In a virus form it will come as an application and load off its payload. It could capture sensitive information, deleting very important files and allowing backdoor access to our computer over the internet. In a Trojan it hides as a useful tool and then starts attacking accordingly. It tries to stop windows firewall and windows defender service it will also change your internet browser settings and it will control your remote hosts. It creates a folder to store other bad malware on your computer. It is very difficult to remove, and it can be stopped by taking precautions.

15 April 2020
close
Your Email

By clicking “Send”, you agree to our Terms of service and  Privacy statement. We will occasionally send you account related emails.

close thanks-icon
Thanks!

Your essay sample has been sent.

Order now
exit-popup-close
exit-popup-image
Still can’t find what you need?

Order custom paper and save your time
for priority classes!

Order paper now