How Spyware works?. Introduction Spyware is an umbrella name for many types of malicious codes Spy on ones behavior May watch web pages one visit and.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Keep Your PC Safe (Windows 7, Vista or XP) Nora Lucke 02/05/2012 Documents - security.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Thank you to IT Training at Indiana University Computer Malware.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
Spyware and Adware Rick Carback 9/18/2005
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Spyware and other annoying Pop-ups. What are we going to learn? What is spyware What is the threat Where does it come from Why does spyware exist How.
Spyware & It’s Remedies CS 526 Research Project Spring 2008 Presented By - Ankur Chattopadhyay Erica Kirkbride University Of Colorado At Colorado Springs.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Chapter 4 Personal Security
Computer Applications Reading Scheme Spyware Chan Yui Ming (6) L6A.
XP Browser and Basics1. XP Browser and Basics2 Learn about Web browser software and Web pages The Web is a collection of files that reside.
What is spyware? Supervisor dr. lo’ay tawalbeh Search By Mahmoud al-ashram Soufyan al-qblawe.
Free Software Alternatives: Avast! Anti-virus
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
 Meaning of spyware Spyware is a program that can be installed on computers, and which collects small pieces of information about users without their.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
 What is Computer Security  Key Components  Levels  Challenges  Attacks  Desktop Security  Why it is important  Virus/Worms/Trojans  Tips  Web.
Viruses & Destructive Programs
Presentation By Deepak Katta
Trojan Horse Implementation and Prevention By Pallavi Dharmadhikari Sirisha Bollineni VijayaLakshmi Jothiram Vasanthi Madala.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Basic Computer Security Sankardas Roy Department of Computing and Information Sciences Kansas State University.
With Microsoft Windows 7© 2012 Pearson Education, Inc. Publishing as Prentice Hall1 PowerPoint Presentation to Accompany GO! with Microsoft ® Windows 7.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Malware Fighting Spyware, Viruses, and Malware Ch 4.
1 Spyware, Adware, and Browser Hijacking. ECE Agenda What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention,
1 All Your iFRAMEs Point to Us Mike Burry. 2 Drive-by downloads Malicious code (typically Javascript) Downloaded without user interaction (automatic),
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
How to remove spyware from your PC using Spybot S&D? A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 49 The Dangers of Spyware and Phishing.
1 Protect Against Spywares – SpywareBlaster. 2 Content Introduction – - What is Spyware? - Danger - Sign of Trouble Solution Cleaning -- Spybot Protection.
Troubleshooting Windows Vista Security Chapter 4.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
1 Spyware. ECE 4112-Internetwork Security2 Agenda Cookies Browser hijacking Bundled software Key loggers Spyware prevention and deletion.
Spyware By: Sydney Langley. Spyware Is software installed on your computer without your consent Spyware monitors or controls your computer use.
Eng. Hector M Lugo-Cordero, MS CIS4361 Department of Electrical Engineering and Computer Science February, 2012 University of Central Florida.
Chapter 18 Technology in the Workplace Section 18.2 Internet Basics.
CSCE 201 Web Browser Security Fall CSCE Farkas2 Web Evolution Web Evolution Past: Human usage – HTTP – Static Web pages (HTML) Current: Human.
Protecting Students on the School Computer Network Enfield High School.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Spybot-S&D Course: Fall 2004 Presented By: Ataul Bari Instructor: Dr. A. K. Aggarwal.
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Chapter 11 Working with Credit Card Methods of Processing Credit Cards Preparing for Cyber Cash Authoring a Credit card Transaction.
1 Lab 12: Spyware A Window’s User’s Worst Nightmare.
XP Browser and Basics COM111 Introduction to Computer Applications.
Spyware By Rachel Gaines. 55% of online users have been infected with Spyware.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Presenter: Le Quoc Thanh SPYWARE ANALYSIS AND DETECTION.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Sydney Baize Mrs. Shirley Miller BPC110. “In the most familiar sense, a hacker is anyone who attempts to break into computer systems by surreptitious.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Computer Security Keeping you and your computer safe in the digital world.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Windows Vista Configuration MCTS : Internet Explorer 7.0.
Protect Your Computer Against Harmful Attacks!
HOW DO I KEEP MY COMPUTER SAFE?
Presentation transcript:

How Spyware works?

Introduction Spyware is an umbrella name for many types of malicious codes Spy on ones behavior May watch web pages one visit and report that information May allow people to record the information Install without knowledge or by tricking Spyware is an umbrella name for many types of malicious codes Spy on ones behavior May watch web pages one visit and report that information May allow people to record the information Install without knowledge or by tricking

Introduction A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can also reduce the privileges of specific vulnerable Internet-facing processes such as Internet Explorer. Since Windows Vista, by default, a computer administrator runs everything under limited user privileges. When a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows. A typical Windows user has administrative privileges, mostly for convenience. Because of this, any program the user runs has unrestricted access to the system. As with other operating systems, Windows users are able to follow the principle of least privilege and use non-administrator accounts. Alternatively, they can also reduce the privileges of specific vulnerable Internet-facing processes such as Internet Explorer. Since Windows Vista, by default, a computer administrator runs everything under limited user privileges. When a program requires administrative privileges, a User Account Control pop-up will prompt the user to allow or deny the action. This improves on the design used by previous versions of Windows.

How Spyware invades PC? Spyware invades PCs through: – Installing Free program installs spyware on PC – Clicking on a pop-up ad downloads and installs spyware on PC Often runs even when the program that it rides upon is not running – At the start up – Watches web activities and tracks every web site – Reports to the spyware website about the web activities done by us – Spyware website creates profile of every individual – Website delivers targeted ads to the individual Spyware invades PCs through: – Installing Free program installs spyware on PC – Clicking on a pop-up ad downloads and installs spyware on PC Often runs even when the program that it rides upon is not running – At the start up – Watches web activities and tracks every web site – Reports to the spyware website about the web activities done by us – Spyware website creates profile of every individual – Website delivers targeted ads to the individual

Examples CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites. CoolWebSearch search enginehosts fileDNS FinFisher, sometimes called FinSpy is a high-end surveillance suite sold to law enforcement and intelligence agencies. Support services such as training and technology updates are part of the package. FinFisher Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites. Internet Optimizer CoolWebSearch, a group of programs, takes advantage of Internet Explorer vulnerabilities. The package directs traffic to advertisements on Web sites including coolwebsearch.com. It displays pop-up ads, rewrites search engine results, and alters the infected computer's hosts file to direct DNS lookups to these sites. CoolWebSearch search enginehosts fileDNS FinFisher, sometimes called FinSpy is a high-end surveillance suite sold to law enforcement and intelligence agencies. Support services such as training and technology updates are part of the package. FinFisher Internet Optimizer, also known as DyFuCa, redirects Internet Explorer error pages to advertising. When users follow a broken link or enter an erroneous URL, they see a page of advertisements. However, because password-protected Web sites (HTTP Basic authentication) use the same mechanism as HTTP errors, Internet Optimizer makes it impossible for the user to access password-protected sites. Internet Optimizer

Example HuntBar, WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements. HuntBar ovieland, also known as Moviepass.tv and Popcorn.net, is a movie download service that has been the subject of thousands of complaints to the Federal Trade Commission (FTC), the Washington State Attorney General's Office, the Better Business Bureau, and other agencies. Consumers complained they were held hostage by a cycle of oversized pop-up windows demanding payment of at least $29.95, claiming that they had signed up for a three-day free trial but had not cancelled before the trial period was over, and were thus obligated to pay. [29][30] The FTC filed a complaint, since settled, against Movieland and eleven other defendants charging them with having "engaged in a nationwide scheme to use deception and coercion to extract payments from consumers." ovielandFederal Trade CommissionWashingtonState Attorney General's OfficeBetter Business Bureau pop-up windows [29][30]complaintsettledeleven other defendantsdeceptioncoercion HuntBar, WinTools or Adware.Websearch, was installed by an ActiveX drive-by download at affiliate Web sites, or by advertisements displayed by other spyware programs—an example of how spyware can install more spyware. These programs add toolbars to IE, track aggregate browsing behavior, redirect affiliate references, and display advertisements. HuntBar ovieland, also known as Moviepass.tv and Popcorn.net, is a movie download service that has been the subject of thousands of complaints to the Federal Trade Commission (FTC), the Washington State Attorney General's Office, the Better Business Bureau, and other agencies. Consumers complained they were held hostage by a cycle of oversized pop-up windows demanding payment of at least $29.95, claiming that they had signed up for a three-day free trial but had not cancelled before the trial period was over, and were thus obligated to pay. [29][30] The FTC filed a complaint, since settled, against Movieland and eleven other defendants charging them with having "engaged in a nationwide scheme to use deception and coercion to extract payments from consumers." ovielandFederal Trade CommissionWashingtonState Attorney General's OfficeBetter Business Bureau pop-up windows [29][30]complaintsettledeleven other defendantsdeceptioncoercion

How spyware morphs itself to escape detection Polymorphic spywares – Change filename and location and also size of files – Cool web search and About:Blank home page hijacking Install at multiple locations at the hard disk Anti-spyware if detects any such spyware; other spywares are still alive in the machine Spyware can inject itself in some other application Silent Spyware vs. destructive program Hiding itself in the windows registry files Polymorphic spywares – Change filename and location and also size of files – Cool web search and About:Blank home page hijacking Install at multiple locations at the hard disk Anti-spyware if detects any such spyware; other spywares are still alive in the machine Spyware can inject itself in some other application Silent Spyware vs. destructive program Hiding itself in the windows registry files

How spyware invades Privacy By sending information to other server Key logger keeps track of keys pressed By installing other malicious software on the system By sending information to other server Key logger keeps track of keys pressed By installing other malicious software on the system

How home page and search page hijackers work? Home page hijacker changes browsers’ start page – New home page includes many pop-up ads Search page hijacker changes normal search engine to a new one and overflows systems with so many pop ups. Even if the browser settings are changed, these spywares run at start up and change the default settings to the new ones Disguise themselves as add-ins to browser (Browser Helper Objects BHOs) Home page hijacker changes browsers’ start page – New home page includes many pop-up ads Search page hijacker changes normal search engine to a new one and overflows systems with so many pop ups. Even if the browser settings are changed, these spywares run at start up and change the default settings to the new ones Disguise themselves as add-ins to browser (Browser Helper Objects BHOs)

How dialers work? Installed similar to spyware Checks presence of modem Surreptitiously dials 900 phone number (Charging 4$ per minute or more) Keeps call connected for 10 minutes or more Could not prove the call Outdated due to DSL, Ethernet and Data Cards these days Installed similar to spyware Checks presence of modem Surreptitiously dials 900 phone number (Charging 4$ per minute or more) Keeps call connected for 10 minutes or more Could not prove the call Outdated due to DSL, Ethernet and Data Cards these days

How Keyloggers work? Often installed in two parts –.exe file Automatically launches as startup –.dll file.exe file launches.dll file and it does most of the damage Records all keystrokes Keystrokes recorded may be sent to the attacker directly or saved in a file and sent at regular intervals Attacker examines the key strokes and gets necessary information Often installed in two parts –.exe file Automatically launches as startup –.dll file.exe file launches.dll file and it does most of the damage Records all keystrokes Keystrokes recorded may be sent to the attacker directly or saved in a file and sent at regular intervals Attacker examines the key strokes and gets necessary information

How rootkits work? Used by intruder to gain access to someones’ PC without being detected Made of series of files and tools Can be installed similar to shareware Replace important components of OS with new software of same size, creation date etc. Installs backdoor daemon, automatic program Many also install keyloggers or sniffers May also send the log of the system Used by intruder to gain access to someones’ PC without being detected Made of series of files and tools Can be installed similar to shareware Replace important components of OS with new software of same size, creation date etc. Installs backdoor daemon, automatic program Many also install keyloggers or sniffers May also send the log of the system

Following the spyware money trail Someone who wants to make money from spyware signs up for an affiliate program with a website or merchant The person gets a code that identifies him, so he can be paid for every link or click to the merchant Some merchants monitor those who sign up for affiliate programs, but many do not. Those wanting to make money from spyware are not often spyware authors. They make deal with spyware author in which spyware will include links to persons’ affiliate program ID. Someone who wants to make money from spyware signs up for an affiliate program with a website or merchant The person gets a code that identifies him, so he can be paid for every link or click to the merchant Some merchants monitor those who sign up for affiliate programs, but many do not. Those wanting to make money from spyware are not often spyware authors. They make deal with spyware author in which spyware will include links to persons’ affiliate program ID.

How antispyware works? Searches signature of spyware Compares signatures with signature base Also checks suspicious behavior Then antispyware deletes spyware. – May not be deleted completely – Hence specific software is required to delete all spywares Includes real-time protection Searches signature of spyware Compares signatures with signature base Also checks suspicious behavior Then antispyware deletes spyware. – May not be deleted completely – Hence specific software is required to delete all spywares Includes real-time protection

Thank you Sharada Valiveti