Lab Exercise 2: Malware Awareness

Instructions

  1. Scenario Presentation: Read each scenario description.
  2. Analysis: Analyze each scenario and identify any signs of malicious activity or security breaches. Consider factors such as unusual behavior, unauthorized access, unexpected changes, and suspicious communications.

Scenario 1: Suspicious Pop-up Messages

You are browsing the internet on your computer when suddenly, a series of pop-up messages start appearing on your screen. The messages claim that your device is infected with a virus and prompt you to click on a link to download a supposed antivirus software to fix the issue. The pop-ups continue to appear despite attempts to close them, and your computer’s performance begins to slow down noticeably.

Scenario 2: Unexplained Network Activity

You notice that your smartphone is consuming an unusually large amount of data even though you haven’t been using any data-intensive applications. Upon further investigation, you discover that the device is sending and receiving data packets at regular intervals, even when you are not actively using it. Additionally, you observe unfamiliar network connections in the device’s network settings, indicating potential unauthorized access.

Scenario 3: Encrypted Files

You attempt to open a document on your work computer, but you receive an error message stating that the file is encrypted and cannot be accessed. You realize that several other files on your computer are also encrypted and inaccessible. You did not encrypt these files yourself, and you cannot recall any recent software updates or changes that would explain the encryption. Additionally, you notice that the filenames of the encrypted files have been changed to random strings of characters.

Scenario 4: Rogue Software Installation

You discover that a new application has been installed on your tablet without your knowledge or consent. The application claims to offer free games and entertainment but lacks user reviews or ratings in the app store. Upon opening the application, you notice that it behaves strangely, displaying intrusive advertisements and requesting unnecessary permissions, such as access to your contacts and camera. Despite attempts to uninstall the application, it reappears shortly afterward.