Hybrid Threats-Maikol Silva

docx

School

Palm Beach State College *

*We aren’t endorsed by this school

Course

4408

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by DeaconStingrayMaster676

Report
1 Hybrid Threats Maikol Silva Palm Beach State College CNT4408 Professor Elliot January 23rd, 2024
2 Hybrid Threats Hybrid malware is a complex attack that combines two or more types of threats. The cybersecurity risks emanate from integrating two threats to form a single and powerful attack against a system or a network ( Malware Spotlight: Hybrid Malware , n.d.). Cybercriminals create hybrid threats because they can benefit from the individual strengths of each malware. A single threat can combine viruses, worms, and Trojans to create a potent attack. As a result, this gives it the capability to exploit tight defenses. The Zeus malware is one of the most common examples of a hybrid threat. Due to its complex nature, Zeus has numerous cybersecurity capabilities, from installing itself in the computer device to stealing data and compromising financial details (Higgins & Higgins, 2024). TDSS is another example of a hybrid malware with potent capabilities. The threat can bring to life other malware in the computer network and block programs from running (Dell, 2023). In addition, TDSS can introduce malicious content within the computer’s hard disk. Even after infection, the Windows programs and other anti-malware systems cannot detect TDSS. Other examples of hybrid threats include Trojan-worm and ransomware worms. As the names suggest, these threats combine the strengths of two attacks (Chen, 2023). More importantly, as cybercriminals continue to innovate, more hybrid malware will emerge.
3 References Chen, S. (2023, November 2).  The Comprehensive Guide to 11 Types of Malware in 2023 . TitanFile.  https://www.titanfile.com/blog/types-of-computer-malware/#:~:text=Examples %20of%20hybrid%20malware%20include,or%20trojans%20and%20worms%2C %20respectively . Dell. (2023, October 3).  Google Redirects, TDSS, TDL3, or Alureon removal guide . Dell US.  https://www.dell.com/support/kbdoc/en-us/000138961/google-redirects-tdss-tdl3-or- alureon-removal-guide Higgins, M., & Higgins, M. (2024, January 18).  Zeus malware: Its history and how it works . NordVPN.  https://nordvpn.com/blog/zeus-virus/#:~:text=Zeus%2C%20also%20known %20as%20Zbot,account%2C%20and%20launch%20more%20attacks . Malware Spotlight: Hybrid Malware . (n.d.). https://resources.infosecinstitute.com/topics/malware-analysis/malware-spotlight- hybrid-malware/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help