1 Malware/Spyware Group 26 Jay Kim and Jimmy Patel
ECE Internetwork Security 2 Outline Definitions Categories of Spyware Lab material
ECE Internetwork Security 3 Definitions Malware is a malicious software designed specifically to disrupt or harm a computer system Spyware is computer software that gathers and reports information about a computer user without the user's knowledge or consent
ECE Internetwork Security 4 Notorious Spyware Gator One of the most annoying Bargain Buddy Finds you bargains, records your profile Various Internet SearchBars Search Bar that records every move
ECE Internetwork Security 5 How did my computer get infected? Bundled Spyware Often included in Free/Shareware Kazaa, iMesh, and etc Installs more than what it promises Sometimes mentioned in the agreement form
ECE Internetwork Security 6 How did my computer get infected? Tricky and dishonest Installers
ECE Internetwork Security 7 How did my computer get infected? You can buy them! Shady companies sell their software with extra *special features –For instance, a Child Monitor program for Internet Browsing that also monitors you.
ECE Internetwork Security 8 Types of Spyware Adware Annoying Pop-up Ads Profiles online surfing and spending habits Tailors Ads based on profile Even when you uninstall the program that installed the Adware, the Adware usually sticks around
ECE Internetwork Security 9 Types of Spyware Snoopware Sometimes sold as Child monitor Keeps track of your internet history Keylogger Records keystrokes to obtain password, credit card numbers, and sensitive information
ECE Internetwork Security 10 Some Simple Solutions Firewall Anti-popup Browser feature Paying closer attention Not downloading shady software and being careful when downloading
ECE Internetwork Security 11 Privacy Software Ad-Aware, Spybot Search and Destroy Searches RAM, Windows Registry, external storage for known data-mining, tracking, adware, malware Live update tool which downloads the latest signatures from their web servers
ECE Internetwork Security 12 Lab Material Install a Spyware Observe the effects –Extra “features” installed –Registry changed –Cookie monitoring internet history Ad-Aware –Learn the capabilities –Undo the damage
ECE Internetwork Security 13 Lab Material Get your credit card number stolen!
ECE Internetwork Security 14 Lab Material Keylogging Code Examine a custom keylogger written in C –Try to figure out what the code does Learn how keylogging is done in Windows –WH_KEYBOARD message Hook
ECE Internetwork Security 15 Future Addition Monitor the behavior of Spyware on network VC6 project files available for Keylogger Add features for non-evil educational purpose (i.e. Override User Input, Jumble keys)
ECE Internetwork Security 16 References