Every Type of Computer Virus Explained in 8 Minutes

1.15M views1536 WordsCopy TextShare
The Paint Explainer
Every famous type of PC virus gets explained in 8 minutes! Join my Discord to discuss this video: h...
Video Transcript:
malware everything that is intentionally designed to cause disruption to a computer leak private Information Gain unauthorized access to information or systems deprive access to information or which unknowingly interferes with the user's computer security and privacy is considerable as a malware virus a computer virus is a type of malware that when executed replicates Itself by modifying other computer programs and inserting its own code into those programs if this replication succeeds the affected areas are then said to be infected just like with biological viruses viruses generally require a host program writing its own code into it and
when the host program runs executing its own code first it causes infection and damage it usually causes damage due to causing system failure corrupting data wasting Computer Resources increasing maintenance costs or stealing personal information worm a computer worm is a standalone malware computer program that replicates itself in order to spread to other computers most of the time it uses a computer network to spr itself relying on security failures on the target computer to access it when these new worm invaded computers are controlled the worm will continue to scan and infect other computers using these computers
as hosts and this Behavior will continue exponentially increasing its replication worms almost always cause at least some harm to the network even if only by consuming bandwidth whereas viruses almost always corrupt or modify files on a targeted computer many worms are designed only to spread and do not attempt to change the systems they pass through Trojan a trojan horse is any malware that misleads users of its true intent by disguising itself as a standard program Trojans are generally spread by some form of social engineering for example when a user is duped into executing an email
attachment disguise to appear innocuous or by clicking on a fake advertisement the Damage Done by a trojan horse depends on the specific malware as this term only explains how it enters a computer unlike computer viruses and worms Trojans generally do not attempt to inject themselves into other files or otherwise propagate themselves malvertising it's the use of advertising on highly reputable websites to spread malware this is done to push their attacks to web users who might not otherwise see the ads due to firewalls or more safety precautions in general they can be easily spread across a
large number of legitimate websites without directly compromising those websites the interesting thing about infections delivered through malvertising is that they do not require any user action like clicking to compromise the computer and it does not exploit any vulnerabilities on the website rat it stands for remote access Trojan and it's a type of malware that remotely controls a computer through the internet when your computer is ratted the hacker can actually move your mouse type stuff look at your webcam and record it Etc most of the time however it stays silent and acts as a key logger
to gain your personal information back door a back door refers to any method by which authorized and unauthorized users are able to get around normal security measures once they're in cyber criminals can use a back door to steal personal and financial data install additional malware and hijack devices rootkit a rootkit is a program or a collection of malicious software tools that give a threat actor remote access to and control over a computer although this type of software has some legitimate uses such as providing remote enduser support most rootkits open a back door on victim systems
to introduce every type of malware or to use the system for further network security attacks rootkits often prevent detection by deactivating antivirus softwares removal can be complicated or practically impossible especially in cases where the root kit resides in the kernel which is a program at the core of a computer's operating system and generally has complete control over everything spyware it's a type of malware that infects your computer and secretly gathers information about you including the sites you visit the things you download your usernames and passwords payment information and the emails you send and receive after
this information is gathered it's usually sent to a cyber criminal who may sell it use it Etc keylogger a key logger is a malware that secretly records every key pressed on a keyboard and sends it to the cyber criminal data mostly passwords and confidential information can get stolen if there's a key logger on a computer it's a type of spyware ransomware a ransomware is a malware that permanently block access to the victim's personal data and computer unless a ransom is paid while some simple ransomware May lock the system without damaging any files more advanced malware
uses a technique called cryptovirology it exists exclusively as a computer memory based malware for example in the ram so it doesn't write any part of its activity to the computer's hard drive this makes it harder to detect and leaves little evidence they are used by hackers for quick and stealthy operations such as Gathering data quickly since most of them get deleted once the computer gets rebooted adware this term is usually used to describe malware that installs itself on your system without your knowledge often when downloading other software and displays advertisements when the user browses the
internet some of them also act as spyware by collecting data to be sold or used for targeted advertising the most recognizable ones open a popup in an unclosable window Ram scraper it's usually used to describe the type of malware that installs itself on point of sale systems to collect personal information like credit card numbers and pins of consumers DDOS attack it happens when the hacker tries to make a computer or connection unavailable and it's usually done by flooding the targeted computer or resource with Superfluous files in an attempt to over load them and prevent some
or all legitimate requests from being fulfilled in a DDOS attack the incoming traffic flooding the victim originates from many different sources which most of the time are other infected computers used as bots in a botn net browser hijacking it's unwanted software that changes a web browser settings without a user's permission to inject unwanted ads change the homepage or even the search engine as a whole installing its own many browser hijacking programs are accidentally installed while installing other software that has them as a bundle in their installer and they often come without uninstall instructions or are
presented in a way that is designed to be confusing for the average user to trick them into installing unwanted extra software cryptojacking cryptojacking is the act of secretly exploiting a computer to mine cryptocurrencies its goal is to stay as silent as possible and mine as many coins as it can for profit if your computer becomes a victim of this practice it greatly slows down and risks breaking some of its Hardware in the long run Rogue security software it's a form of Internet fraud that misleads users into believing there is a virus on their computer and
aims to convince them to pay for a fake malware removal tool that actually installs malware on their computer it's usually spread through malvertising fishing it's a scam where attackers deceive people into revealing sensitive information or installing malware most of the time it's done by email where the attacker acts as a reputable Source such as your bank and sends the victim to a website that completely mirrors the real one once the victim logs in using their password it gets sent to the attacker it can also be perpetrated through phone calls where the attacker spoofs his number
to appear as if it is coming from a legitimate institution or through SMS hybrid malware this term refers to the Contemporary use of two or more types of malware by an attacker in a single attack most of the time these combinations consist of Trojans and worms or adwares and viruses Brute Force attack it consists of an attacker submitting many passwords or passphrases with the hope of eventually guessing correctly the attacker systematically checks all possible passwords and passphrases until the correct one is found through automated software this attack is more efficient with shorter and simpler passwords
while longer passwords might take hundreds of years to be cracked it's why on most websites when you fail to enter the correct password it blocks your account or system for a short period of time wiper a wiper is a class of malware intended to erase a computer's memory against the user's will destroying all useful information in the process social engineering this one isn't a tech iCal malware or virus but it's a very widespread method to install them or to gain confidential information without installing anything it's the psychological manipulation of people into performing actions or divulging
confidential information fishing is an example of social engineering shout out to these guys who support my channel through patreon you can end up on this list as well check out the link in the description
Copyright © 2024. Made with ♥ in London by YTScribe.com