MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Computer Virus Presented by Cora Banks MOT-19 Ms.Cross.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Downloading + Viruses. Downloading Modems (56K) V.90 DSL (digital subscriber line) Cable Modem Satellite.
Malicious Attacks Angela Ku Adeline Li Jiyoung You Selena Yuen.
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses. Where the name came from This is a phrase coined from biology to describe a piece of software that behaves very much like a real virus.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
1 Computer Security: Protect your PC and Protect Yourself.
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Viruses.
Unit 2 - Hardware Computer Security.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Computer Safety Workshop Presented by Roy Coleman April 14, 2015 © 2015 Roy Coleman.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
This Is A PowerPoint Presentation On Computer Viruses. This Presentation Will Show You What Can Be Done To Deal With The Viruses. Mr Owen 10C.
By Michael Carlisle CpSc 420 December 6, Worms – A Definition!  Worm – a program that copies itself from one computer to another.
Types of Electronic Infection
Company LOGO Malicious Attacks Brian Duff Nidhi Doshi Timmy Choi Dustin Hellstern.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
Viruses : Notorious Pests James Barnes II Worms and Viruses Worms and Viruses | Solutions | Worms and Viruses | Myth | Prevention | Final WordSolutions.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
C OMPUTER V IRUSES Julia White. W HAT ARE COMPUTER VIRUSES ? Computer viruses are small software programs that are designed to spread from one computer.
Presented by: Maha, Marina and Aleks Viruses,Wormsand Trojans.
Malware & Phishing By: mackenzie olson. Internet fraudsters send out spam, pop-ups, appealing websites, and desirable downloads.
How to protect your computer By: Emily, Jackie and Kathleen.
Computer security By Isabelle Cooper.
Viruses According to Microsoft.com, viruses are “small software programs...that interfere with computer operation” Harm data, spread to others through.
Safety and Security issues of using ICT Alys brooks.
Antivirus software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
W elcome to our Presentation. Presentation Topic Virus.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Chapter 40 Internet Security.
Computer Virus’s.
Computer Worms & Viruses
Protect Your Computer Against Harmful Attacks!
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
COMPUTER CRIME.
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

MyDoom By: Philippe Bissohong

Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network and does not need to be attach to a software. ► Discovered by Craig Schmugar, a McAfee employee. ► Source unknown  Deliberate act of sabotage or vandalism against SCO Group  Most likely a Linux or an open source supporter retaliating against SCO group law suit and public statement against Linux

TIMELINE ► January 26, 2004: Fastest spreading worm. ► February 1, 2004: With millions of computer affected, begins the Distributed denial of service attack against SCO Group. ► February 2, 2004: SCO Group move their site to a different address ► February 3, 2004: Beginning of Distributed denial of service attack against Microsoft. But Microsoft remains functional. ► February 12, 2004: MyDoom is programmed to stop spreading but the infected files remains on your computer. ► July 26, 2004: A MyDoom deviation shut down Google and slow down other search engine like AltaVista and Lycos.

MALWARE ► Program to send a flood of traffic to a specific host for a period of time ► When executed, it copied itself in the window system folder, leaving a back door to hackers for remote control of your system. ► Add an entry in the registry so it is activated every time window starts up ► Block HTTP access to certain site like Microsoft and other popular antivirus sites. Preventing update to anti-virus software or download of removal tools.

TRANSMISSION ► Mainly transmitted via  From: Spoof sender that looks like somebody you might know.  Subject : "Error", "Mail Delivery System", "Test" or "Mail Transaction Failed"  Message: Blank or random error messages.  Include Attachment ► If executed, steals your addresses and also generates random to resend the worm. ► Also transmitted through peer to peer(P2P) file sharing. (kazaa)  Sneak in your share folder with the effort of spreading that way.

UNDER CONTROL ► Various things were done to keep the attack under control  Alternative addresses were created by SCO Group and Microsoft.  Disinfection tools were created to detect and remove MyDoom.  Worm expired on his own after February 12.  Anti-virus softwares updated their software.  $250,000 reward was offer for information leading to the worm creator.

LESSON ► Install and Enable a Firewall. ► Install and maintain your anti-virus software up- to-date. ► Make sure your anti-virus checks every files that is open. ► Install security updates. ► Never download, install or run an attachment unless you trust the sender. ► When in doubt or already infected, seek help immediately.

SOURCES ► F-Secure internet security  ► Wikipedia  ► Sophos  a.html

THE END