Spywares By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of technology (NYIT)-Jordan’s campus 2006.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Wichita Public Library Rex Cornelius Electronic Resources Webliography online at:
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
SPYWARE Presented by The State Security Office November 17, 2004.
Spyware and Adware Rick Carback 9/18/2005
SECURITY CHECK Protecting Your System and Yourself Source:
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Spyware! THE BAD, THE WORSE, AND THE Ugly … ARE ALL INDICATIONS THAT SPYWARE MAY BE TAKING OVER YOUR COMPUTER!
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
James Tam Computer Security You will learn about some common computerized security threats as well as some ways of minimizing these threats.
What is it and how to make your computer go fast again.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Security Advice Georgie Pepper Campsmount Acadamy.
Chapter Nine Maintaining a Computer Part III: Malware.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
Adware, Spyware, and Malware Anand Dedhia Bharath Raj ECE 4112 Project 28 April 2005.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
What Is Wrong With This Slide? Dr. Steve Broskoske Misericordia University.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
DBS Form 6 As Computer Applications Project Spy ware By L6D Wong Chiu Hung.
Lions? And Tigers? And Bears? Oh my!. In The Wizard of Oz, Dorothy, Tinman and Scarecrow were frightened of what may be out there as they traveled the.
Adware By: Kevin Garnett, Charlie wancy, Go Diego Go, Batman braggster.
Why Should I Improve My PowerPoint Backgrounds? Dr. Steve Broskoske Misericordia University.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Anti-Spyware Solutions for MIT IT Partners Conference, April 19, 2005 Jonathan Hunt Senior Manager Software Service, IS&T.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel.
Malware Spyware & Viruses Overview  What does it look like?  What is it?  How can you prevent it?  What can you do about it when you get it?
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
SPYWARE Spyware, a new class of malicious programs, is just as dangerous as viruses but generally Is underreported. The issues are no longer those of privacy,
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Spyware, Adware & Malware JEEP HOBSON JEEP HOBSON ITE-130 ITE-130 SPRING 2007 SPRING 2007.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
3.6 Fundamentals of cyber security
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Presentation transcript:

Spywares By:Murad M. Ali Supervised By: Dr. Lo'ai Tawalbeh New York Institute of technology (NYIT)-Jordan’s campus 2006

Spyware What Is spyware ?  Spyware Vs Trojan horse  Spyware Vs Virus Computer Get Infected Spyware Symptoms Spyware Prevalence Class of Spyware  Spyware Programs FTC  State Law Preventive Techniques

What Is Spyware ? Applications that send information from your computer to the creator of the spyware Sometimes consists of an apparent core functionality and a hidden functionality of information gathering (Trojan) Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends Can also be used to log keystrokes and send those to whomever

What Is Spyware ? Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware. Spyware can be broken down into two different categories:  surveillance spyware  advertising spyware.

What Is Spyware ? Surveillance software:  Includes key loggers, screen capture devices, and Trojans. These would be used by corporations, private detectives, law enforcement, intelligence agencies, suspicious spouses. Advertising spyware:  Software that is installed alongside other software or via active x controls on the internet, often without the user's knowledge, or without full disclosure that it will be used for gathering personal information and/or showing the user ads.  Advertising spyware logs information about the user, possibly including passwords, addresses, web browsing history, online buying habits, the computer's hardware and software configuration, the name, age, sex,etc.

What Is Spyware ? software that is downloaded onto a person’s computer without their knowledge. Spyware may collect information about a computer user’s activities and transmit that information to someone else. It may change computer settings, or cause “pop-up” advertisements to appear (in that context, it is called “adware”). Spyware may redirect a Web browser to a site different from what the user intended to visit, or change the user’s home page. A type of spyware called “keylogging” software records individual keystrokes, even if the author modifies or deletes what was written, or if the characters do not appear on the monitor. Thus, passwords, credit card numbers, and other personally identifiable information may be captured and relayed to unauthorized recipients.

Spyware Vs Trojan Horse Spyware programs are sometimes installed as Trojan horses of one sort or another.They differ in that their creators present themselves openly as businesses, for instance by selling advertising space on the pop-ups created by the malware. Most such programs present the user with an End-User License Agreement which purportedly protects the creator from prosecution under computer contaminant laws. However, spyware EULAs have not yet been upheld in court.

Spyware Vs Virus Spyware  Motivation Profit  Monitor online activities for commercial gain  Difficult to relate symptoms with spyware infection: Sluggish PC performance, increased pop-up ads, unexplained home page change, mysterious search results.  New technology (less than 5 years)

Spyware Vs Virus Virus  Intent Harmful  Damage computer system, corrupt files and destroy data  Easy to relate symptoms with virus infecton: Corrupt program files, loss of computer storage memory, deletion of critical files.  Old Technology

Computers Get Infected Basic forms of spyware can be picked up simply by visiting a Web page. Spyware may also be picked up through . You are particularly likely to be exposed by downloading software, in particular "freeware" and "shareware" offerings. Many software downloads are "free," but within the End User License Agreement (EULA) are provisions to use information from your computer or your and other contact information. You have to agree to the EULA to download or install, so you essentially agree to allowing someone else to use information about your computer. That's why the definition of spyware is "generally without your knowledge or consent." Often, you've consented. You just don't realize it because you didn't read the fine print. This is why the definition of spyware sometimes includes the lawyerism "potentially unwanted technologies."

Spyware Symptoms Adware forms of spyware often operate silently, monitoring your Web surfing activities and reporting back what sites you have visited to a marketing organization. Others display "pop-up" ads on your computer's desktop or on top of other Web pages. More aggressive spyware will reset your browser's home page (the page that appears when the browser starts up), change the service your browser uses for Web searches, or add new sites to your favorites list. Or produce even more invasive advertisements. The most damaging spyware programs can actually install "trojans" -- computer programs which allow other people to remotely access an infected computer. Such spyware programs can run silently "in the background" and are capable of doing anything that a typical computer program can do which does not require your intervention. Sometimes a spyware-infected computer will run more slowly due to all the activity going on in the background. But just because your computer seems to be running at normal speed doesn't mean you are safe. Increase in system crashes

Spayware Prevalence April 16, 2004; BBC News (UK) - PCs 'infested' with spy programs. Internet provider EarthLink says it uncovered 29.5 million examples of spyware on over 1 million computers scanned between January and March. These parasite programs sometimes come attached to software downloaded from the Web. The details are often included in the license agreement small print that most users click through without reading. But sometimes they do not even need your permission to download, but just bury themselves on a hard drive as you browse the Internet.

Spayware Prevalence In October 2004, America Online (AOL) and the National Cyber Security Alliance (NCSA) released the results of a survey of 329 dial-up and broadband computer users regarding online threats, including spyware. According to the study:  80% of the computers they tested were infected with spyware or adware, and 89% of the users of those computers were unaware of it  the average infected computer had 93 spyware/adware components on it, and the most found on a single computer was 1,059  most users do not recognize the symptoms of spyware — 63% of users with a pop-up blocker said they got pop-up ads anyway, 43% of users said their home page had been changed without their permission, and 40% said their search results are being redirected or changed.

Class of Spyware Tracking Cookies Browser Hijacking  Hosts File  Home Page  Search Page  Error Pages Keyloggers Spybots Malware Adware

Tracking Cookies Cookies that can track your Web activities May include cookies that contain  user names  passwords  other private information that you enter on web sites (SSN, banking info, credit cards)

Browser Hijacking Hosts File  Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades Home Page  Redefine the page that opens up when you start your browser

Browser Hijacking Search Page  Redefine the page that opens up when you enter an undefined URL  Redefine the page that opens up when you click your “Search” button Error Pages  Redefine the pages that open when an error occurs.

Keyloggers Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information

Spybots Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties. A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.

Malware & Adware Malware  Refers to a variety of malicious software, including viruses, worms, Trojan horses. Adware  Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party

Gator, Cydoor, and eZula These three are spyware programs All three are “spybot” or “adware” class programs They are typically packaged with popular free software. They all send and retrieve information from remote servers using the HTTP protocol.

Gator Gator is adware that collects and transmits information about a user’s Web activity. Goal is to gather demographic information and generate a profile of the user’s interests for targeted advertisements. Gator may log and transmit URLs that the user visits, partially identifying information such as the user’s first name and zip code, and information about the configuration and installed software on the user’s machine. Gator can be installed on a user’s computer in several ways. When a user installs one of several free software programs produced by Claria Corporation (the company that produces Gator), such as a free calendar application or a time synchronization client

Cydoor Cydoor displays targeted pop-up advertisements whose contents are dictated by the user’s browsing history. When a user is connected to the Internet, the Cydoor client prefetches advertisements from the Cydoor servers. These advertisements are displayed whenever the user runs an application that contains Cydoor, whether the user is online or offline.

eZula eZula attaches itself to a client’s Web browser and modifies incoming HTML to create links to advertisers from specific keywords. When a client is infected with eZula, these artificial links are displayed and highlighted within rendered HTML. It has been reported that eZula can modify existing HTML links to redirect them to its own advertisers, but we have not observed this ourselves. It is also known as TopText, ContextPro or HotText. It is bundled with several popular filesharing applications (such as Kazaa and LimeWire), and it can also be downloaded as a standalone tool. eZula runs as a separate process (ezulamain.exe) and it includes the ability to self- update

FTC Advice to Consumers The Federal Trade Commission (FTC) issued a consumer alert about spyware in October 2004 offering a list of warning signs that might indicate that a computer is infected with spyware. The FTC alert listed the following clues:  a barrage of pop-up ads;  a hijacked browser — that is, a browser that takes you to sites other than those you type into the address box;  a sudden or repeated change in your computer’s Internet home page;  new and unexpected toolbars;  new and unexpected icons on the system tray at the bottom of your computer screen;  keys that don’t work (for example, the “Tab” key that might not work when you try to move to the next field in a Web form);  random error messages; and  sluggish or downright slow performance when opening programs or saving files

FTC Advice to Consumers The FTC alert also offered preventive actions consumers can take.  update your operating system and Web browser software;  download free software only from sites you know and trust;  don’t install any software without knowing exactly what it is;  minimize “drive-by” downloads by ensuring that your browser’s security setting is high enough to detect unauthorized downloads;  don’t click on any links within pop-up windows;  don’t click on links in spam that claim to offer anti-spyware software; and  install a personal firewall to stop uninvited users from accessing your computer. FTC alert advised consumers who think their computers are infected to get an anti-spyware program from a vendor they know and trust; set it to scan on a regular basis, at startup and at least once a week; and delete any software programs detected by the anti-spyware program that the consumer does not want.

State Laws In March 2004, Utah became the first state to enact spyware legislation, then California joined Utah in enacting spyware legislation in In 2005 Twelve states enacted spyware legislation:  Alaska, Arizona, Arkansas, California, Georgia, Indiana, Iowa, New Hampshire, Texas, Utah, Virginia, and Washington.

Preventive Techniques Don't install any application unless you are certain of what it does or where it came from. Always read the license agreement Software and OS upgrades Utilize browser’s security settings Use Anti-Spyware  Spy Sweeper  Microsoft Windows AntiSpyware  Spyware Doctor  Spyware Slayer  Spy Killer  Spy Remover

Spy Sweeper

Microsoft Windows AntiSpyware

Spyware Doctor

References