CS 450 - Nathan Digangi.  Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code.

Slides:



Advertisements
Similar presentations
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
By Hiranmayi Pai Neeraj Jain
7 Effective Habits when using the Internet Philip O’Kane 1.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
AVG 8.5 Product Line Welcome to a safe world …. | Page 2 Contents  Components Overview  Product Line Overview  AVG 8.0 Boxes.
Trojan Horse Program Presented by : Lori Agrawal.
Computer Viruses.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Network Security. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Objectives  Give examples of common network.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
1 Networking and Security: Connecting Computers and Keeping Them Safe from Hackers and Viruses Networking fundamentals Network architecture Network components.
Malware Fundamentals POLITEHNICA University of Bucharest 14 th of January 2015 Ionuţ – Daniel BARBU.
GET CONTROL! Avoid The Headache… Five Simple Steps to a Safer Computer – NUIT Tech Talk.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
Trojan Horse Chris Wise & Jacob Summers. Overview What is Trojan Horse? Types of Trojan Horses? How can you be infected? What do attackers want?
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Online Annoyances Spam – electronic junk mail
Protecting Your Computer & Your Information
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
CSCE 201 Attacks on Desktop Computers: Malicious Code Hardware attacks.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
 a crime committed on a computer network, esp. the Internet.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Systems Security Part I ET4085 Keamanan Jaringan Telekomunikasi Tutun Juhana School of Electrical Engineering and Informatics Institut Teknologi.
CS 510 : Malicious Code and Forensics. About the course Syllabus at
Malicious Software.
Computer Skills and Applications Computer Security.
Trojans Daniel Bartsch CPSC 420 April 19,2007. What is a Trojan? Trojans are malware Named after Odysseus’s mythical trick Embedded in a program Cause.
BACKDOORS By: Himie Freeman, Joey Adkins, Kennedy Williams, and Erin Bethke.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Cybersecurity Test Review Introduction to Digital Technology.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
By: Matthew Newsome.  The Internet was created so the US Department of Defense can share information between each other, which took place in the 1960’s.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Network Protection Against: Worms, Viruses, and Root Kits Ryan Del Vecchio Cosc. 352 October 1, 2008.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
What they are and how to protect against them
Level 2 Diploma Unit 11 IT Security
Various Types of Malware
Level 2 Diploma Unit 11 IT Security
NET 311 Information Security
Viruses and Virus Protection
Malware CJ
Presentation transcript:

CS Nathan Digangi

 Secret, undocumented routine embedded within a useful program  Execution of the program results in execution of secret code  Not self-replicating (except when attached to a worm)  Hidden in seemingly legitimate applications, activeX controls, or other program exploits

 Botnet node  Data theft  File modification  Keystroke logging  Screen captures  Backdoors  RAT – Remote Access Tool or Remote Administration Tool  Widely used by “Script Kiddies”

 2004  Nuclear RAT (Remote Administration Tool) – Windows NT kernel backdoor  Vundo – Popup advertisements and DOS attacks  Bitfrost – Windows backdoor  2005  Zlob – Popup advertisements. Disguises itself as required video codec  Bandook RAT – Windows backdoor. Uses process hijacking and kernel patching to bypass firewalls  2006  Leap or Oompa Loompa – First ever Mac OSX malware trojan that is spread through a worm using iChat  2007  Storm Worm – Botnet trojan spread through an worm  2008  Mocmex – Trojan that infected digital photo frames  Torpig – Turns off antivirus, steals data, and installs more malware  Bohmini.A – backdoor RAT that exploits security flaws in Adobe Flash with Internet Explorer 7.0 and Firefox 2.0 under Windows XP SP2.  2010  Alureon – Trojan and rootkit that intercepts system network traffic and searches it for usernames, passwords, and credit card data. Caused BSoD problems after a Patch Tuesday update.

 Bypass normal authentication, security, and access routines (RAT)  Provide secret functionality or hidden areas in a program (Easter Eggs)  Symmetric backdoor – Anyone can use the backdoor who finds it, usually by port scanning  Asymmetric backdoor – can only be used by the attacker who plants it because of the use of encryption methods. (more difficult to detect)

 Sobig and Mydoom – Worms that installed a backdoor used for spamming  Sony BMG rootkit – distributed on millions of CDs in 2005 as copy protection.  Silently installed itself automatically on windows computers to change the way the CD played and collect usage data  Caused resource drain and created security holes that could be exploited by malware  Beast – Windows NAT with a GUI client and a built-in firewall bypasser and the ability to disable antivirus  Sub7 – Windows NAT with GUI client and a robust set of features. New version released on March 9 th.

 Netbus  RAT  Server installed via a Trojan horse  In 1999, NetBus was used to plant child pornography on the work computer of a law scholar at Lund University. The 3,500 images were discovered by system administrators, and the law scholar was assumed to have downloaded them knowingly. He lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.

 Back Orifice (BO)  RAT  Created by a Hacker organization called the “Cult of The Dead Cow”  Designed to demonstrate the lack of Security in Windows  Script Kiddies

 Wikipedia  BitDefender.com  Dmoz.org (Open Directory Project)  Security in Computing (Pfleeger & Pfleeger)  Lecture Slides