Malaware Monil Adhikari. Understanding Malaware slide 3 Viruses Virus propagates by infecting other programs Automatically creates copies of itself,

Slides:



Advertisements
Similar presentations
Privacy & Other Issues. Acceptable Use Policies When you sign up for an account at school or from an Internet Service Provider, you agree to their rules.
Advertisements

Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
NCS welcome all participants on behalf of Quick Heal Anti Virus and Fortinet Firewall solution.
Unit 18 Data Security 1.
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Computer Viruses.
Threats To A Computer Network
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
Quiz Review.
Issues Raised by ICT.
Security Issues: Phishing, Pharming, and Spam
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Contents  Viruses Viruses  Computer Worms Computer Worms  Trojans Trojans  Spyware Spyware  Adware Adware  Spam Spam  Hoaxes and Scams Hoaxes and.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Video Following is a video of what can happen if you don’t update your security settings! security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Viruses.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Matthew Hardaway CSCI101 Thursday 3:30pm.  Fishing (Encyclopedia Britannica): ◦ Sport of catching fish—freshwater or saltwater— typically with rod, line,
Cyber crime & Security Prepared by : Rughani Zarana.
By Mohammed kiche. Viruses A computer virus is a malware program that when executed replicates by inserting copies of itself modified into other computer.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
People use the internet more and more these days so it is very important that we make sure everyone is safe and knows what can happen and how to prevent.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Types of Electronic Infection
Denial of Service (DoS) DoS attacks are aggressive attacks on an individual computer or groups of computers with the intent to deny services to intended.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Chapter 7 Phishing, Pharming, and Spam. Phishing Phishing is a criminal activity using computer security techniques. Phishers try to acquire information.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
What is Spam? d min.
Internet security  Definition  Types of internet security  Firewalls  Anti spyware  Buffer overflow attack  Phishing  Summary.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
 Malicious Code  Hacking  Natural Disaster  Theft.
Computer Skills and Applications Computer Security.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Cybersecurity Test Review Introduction to Digital Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Unit 3 Section 6.4: Internet Security
Instructor Materials Chapter 7 Network Security
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Malaware Monil Adhikari

Understanding Malaware

slide 3 Viruses Virus propagates by infecting other programs Automatically creates copies of itself, but to propagate, a human has to run an infected program Self-propagating viruses are often called worms Many propagation methods Insert a copy into every executable (.COM,.EXE) Insert a copy into boot sectors of disks PC era: “Stoned” virus infected PCs booted from infected floppies, stayed in memory, infected every inserted floppy Infect common OS routines, stay in memory

slide 4 First Virus: Creeper Written in 1971 at BBN Infected DEC PDP-10 machines running TENEX OS Jumped from machine to machine over ARPANET Copied its state over, tried to delete old copy Payload: displayed a message “I’m the creeper, catch me if you can!” Later, Reaper was written to hunt down Creeper

slide 5 Polymorphic Viruses Encrypted viruses: constant decryptor followed by the encrypted virus body Polymorphic viruses: each copy creates a new random encryption of the same virus body Decryptor code constant and can be detected Historical note: “Crypto” virus decrypted its body by brute- force key search to avoid explicit decryptor code

A computer worm is malware that is able to distribute itself over a network, normally via , without a person having run an infected program. It is able to reproduce itself many times and so your computer could send out hundreds of these worms with devastating effect This can cause your computer to run very slowly and possibly even crash Computer Worms

Phishing Definition from Phishing is a scam where Internet fraudsters send spam or pop-up messages to lure personal and financial information from unsuspecting victims.

Pharming Norton Internet Security defines pharming as: Pharming (pronounced “farming”) is another form of online fraud, very similar to its cousin phishing. Pharmers rely upon the same bogus Web sites and theft of confidential information to perpetrate online scams, but are more difficult to detect in many ways because they are not reliant upon the victim accepting a “bait” message. Instead of relying completely on users clicking on an enticing link in fake messages, pharming instead re-directs victims to the bogus Web site even if they type the right Web address of their bank or other online service into their Web browser.

Spam According to Norton: Spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern as it can be used to deliver Trojan horses, viruses, worms, spyware, and targeted phishing attacks.virusesspywarephishing

Protecting Yourself From Phishing On Guard Online suggests many different ways to protect your computer and information: Do not private information Be careful when opening attachments, regardless of who sent them Update all antivirus and antispyware software regularly Do not reply to popups If you think you have been scammed, report it on

Protecting yourself from Pharming Norton suggests: Keeping your computer updated Review bank statements carefully and regularly Remember that online offers that seem too good to be true…usually are.

Controlling Spam Norton suggests: Install a spam blocker Try reading s in plain-text If you think is spam, do not reply, just delete. Reject all Instant Messages from those not on your buddy list.

Real-time Examples

Byzantine Hades cyber-espionage attacks against US companies and government agencies Attack websites located in China, use same precise postal code as People's Liberation Army Chengdu Province First Technical Reconnaissance Bureau Targeted results in installing a Trojan Gh0stNet / Poison Ivy Remote Access Tool Stole 50 megabytes of , documents, usernames and passwords from a US government agency Same tools used to penetrate Tibetan exile groups, foreign diplomatic missions, etc. slide 14

slide 15 Night Dragon Started in November 2009 Targets: oil, energy, petrochemical companies Propagation vectors SQL injection on external Web servers to harvest account credentials Targeted s to company executives (spear-phishing) Password cracking and “pass the hash” attacks Install customized RAT tools, steal internal documents, deliver them to China

slide 16 zwShell RAT When launched, presents a fake crash error Type “zw.china” into the hidden password field Can create a custom trojan or start a C&C server Select listening port, password for encrypting C&C traffic, custom sound notifications when infected machines connect or disconnect

slide 17 RAT Capabilities “Dropper” program installs RAT DLL, launches it as persistent Windows service, deletes itself RAT notifies specified C&C server, waits for instructions Attacker at C&C server has full control of the infected machine, can view files, desktop, manipulate registry, launch command shell

slide 18 Who Was Behind Night Dragon? C&C servers hosted in Heze City, Shandong Province, China All data exfiltration to IP addresses in Beijing, on weekdays, between 9a and 5p Beijing time Uses generic tools from Chinese hacking sites Hookmsgina and WinlogonHack: password stealing ASPXSpy: Web-based RAT Make in China

slide 19 Sources say hackers using servers in China gained control of a number of Canadian government computers belonging to top federal officials. The hackers, then posing as the federal executives, sent s to departmental technical staffers, conning them into providing key passwords unlocking access to government networks. At the same time, the hackers sent other staff seemingly innocuous memos as attachments. The moment an attachment was opened by a recipient, a viral program was unleashed on the network. The program hunts for specific kinds of classified government information, and sends it back to the hackers over the internet. One source involved in the investigation said spear-phishing is deadly in its simplicity: "There is nothing particularly innovative about it. It's just that it is dreadfully effective."

Restricting Malaware Step 1 – Plan Vulnerabilities in client-side software on workstations. Vulnerabilities in network-accessible software on servers. Social engineering techniques, which often are part of malware-propagation tactics. Removable media, such as USB keys. Weak passwords of network-accessible accounts.

Restricting Malaware Step 2 – Resist Install and maintain a modern anti-virus suite. Lock down the configuration of the operating system. Control what software is installed and allowed to run. Restrict outbound and inbound network access. Protect Web browsing activities. Limit user account access and minimize user privileges. Keep up with security patches. Enforce change management practices. Identify, investigate, and respond to anomalies.

Restricting Malaware Step 3 – Detect Use change detection tool to discover unauthorized modifications Educating end users Training the IT Staff Reviewing security event logs. Employing intrusion detection systems. Verifying DNS Logs.

Restricting Malaware Step 3 – Respond