MALWARE DETECTION AND ANALYSIS 
MALWARE DETECTION AND ANALYSIS  krdwn
Every electronic device may it be a mobile phone or a computer, they are always on the brink of getting violated in terms of privacy and data breach. Computer Emergency Response Teams (CERT) around the globe have fresh prepared reports each day regarding a new type of malicious attack they tackled. For instance, on 21st December, 2021, a school in Florida, USA was data breached and all the sensitive information of 50000 students and staff members were in the intruder’s hold until the ransom was paid. Another recent attack includes a Ransomware attack on Nvidia by threatening them into open-sourcing their GPU drivers on 3rd March, 2022. The latest news also points out the Micro backdoor malware being confirmed by CERT- Ukraine on 7th March, 2022. It had phishing emails like “dovidka. zip” and malicious code as well which was written in VBScript and saved in the file named “file. htm”. These statistics proves that everyday there is some cyber-crime committed on a massive scale. The need for the solutions to tackle these problems is of immense importance for the organizations.
These attacks that compromise the network or the data of a system of an individual or an organization are called Cyber Attacks and one of those attacks is coined as ‘Malware’. A malware is a code that is malicious. There are numerous kinds of attacks that fall under the heading ‘malware’, for example- trojans, backdoors, droppers, ransomwares etc. The kind of work CERT- UA did on Micro backdoor Malware by confirming its existence is a process known as ‘Malware Detection’ and the way the malicious code and phishing emails were analyzed as to know how bad it could have been if it had got executed on the system is called ‘Malware Analysis’. Having an Emergency Response Team or Cyber Incident Response Team readily available is crucial during the time of crisis to nullify or significantly reduce the impact of the malicious code entering into the system or into the network. 
Every electronic device may it be a mobile phone or a computer, they are always on the brink of getting violated in terms of privacy and data breach. Computer Emergency Response Teams (CERT) around the globe have fresh prepared reports each day regarding a new type of 
malicious
 attack
 they tackled. 
For instance
, on 21st 
December, 2021
, a school in Florida, USA was data breached and all the sensitive information of 50000 students and staff members were in the intruder’s hold until the ransom 
was paid
. Another recent 
attack
 includes a Ransomware 
attack
 on Nvidia by threatening them into open-sourcing their GPU drivers on 3rd 
March, 2022
. The latest news 
also
 points out the Micro backdoor malware 
being confirmed
 by CERT- Ukraine on 7th 
March, 2022
. It had phishing emails like “
dovidka
. 
zip
” and 
malicious
 code 
as well
 which 
was written
 in VBScript and saved in the file named “file. 
htm
”. These statistics proves that 
everyday
 there is 
some
 cyber-crime committed on a massive scale. The need for the solutions to tackle these problems is of immense importance for the organizations.
These 
attacks
 that compromise the network or the data of a system of an individual or an organization 
are called
 Cyber 
Attacks
 and one of those 
attacks
 is coined
 as ‘Malware’. A malware is a code 
that is
 malicious
. There are numerous kinds of 
attacks
 that fall under the heading ‘malware’, 
for example
- 
trojans
, backdoors, droppers, 
ransomwares
 etc. The kind of work CERT- UA did on Micro backdoor Malware by confirming its existence is a process known as ‘Malware Detection’ and the way the 
malicious
 code and phishing emails 
were analyzed
 as to know how 
bad
 it could have been if it had 
got
 executed on the system 
is called
 ‘Malware Analysis’. Having an Emergency Response Team or Cyber Incident Response Team 
readily
 available is crucial during the time of crisis to nullify or 
significantly
 reduce
 the impact of the 
malicious
 code entering into the system or into the network. 
Do not write below this line