Presentation is loading. Please wait.

Presentation is loading. Please wait.

Malware and Social Engineering

Similar presentations


Presentation on theme: "Malware and Social Engineering"— Presentation transcript:

1 Malware and Social Engineering
MTI College

2 Objectives What is malware? What are the different types of malware?
What are payloads of malware? What is social engineering? Describe social engineering attacks.

3 Malware “Malware is a software that enters a computer system without the user’s knowledge or consent and then performs an unwanted and usually harmful action.”

4 Malware Oligomorphic Malware : Changes its internal code to one of a set number of predefined mutations whenever it is executed. Polymorphic Malware : Code that completely changes from its original form whenever it is executed. Metamorphic Malware : Can rewrite its own code to thus appear different each time it is executed.

5 Malware - Mission Circulation Infection Concealment
Payload Capabilities

6 Circulation/Infection
Virus (Computer) : Malicious computer code that, like its biological counterpart, reproduces itself on the same computer. Swiss Cheese Infection : Multiple steps (obscurity) to the infected code. This is more difficult to detect. Split Infection : Break the malicious code into parts and disperse throughout normal source code.

7 Swiss Cheese Infection
Multiple steps (obscurity) to the infected code. This is more difficult to detect.

8 Split Infection Break the malicious code into parts and disperse throughout normal source code.

9 Worms A malicious program that uses a computer network to replicate.
Utilize vulnerabilities throughout a network to gain access.

10 Trojan An executable program that masquerades as performing a benign activity but also does something malicious.

11 Concealment Hide itself from the operating system and/or user
Sony Music 2005.

12 Payload Capabilities What is the main goal of the malware?
Political Reasons? Financial Gain? (adware, ransomware) Productivity loss? War? Collect Data? (Spyware) Steal Data? (Spyware) Modify Security? (Back door) Launch Attacks? (Command and Control)

13 Social Engineering Example 1:
In 2007, a mystery man who remains at large burgled safety deposit boxes at an ABN Amro bank in Belgium, stealing diamonds and other gems weighing 120,000 carats, in all. He visited the bank during regular business hours, overcame all of the bank's exceptional security mechanisms, and walked right out the door with €21 million (roughly $27.9 million at the time) worth of gemstones with no one the wiser, using absolutely no technology whatsoever. “He used one weapon -- and that is his charm -- to gain confidence," Philip Claes, spokesman for the Diamond High Council, said at the time. "He bought chocolates for the personnel, he was a nice guy, he charmed them, got the original of keys to make copies and got information on where the diamonds were. "You can have all the safety and security you want," said Claes "but if someone uses their charm to mislead people it won't help."

14 Example 2:

15 Example 3: world-examples/

16 What Is Social Engineering?
“ A means of gathering information for an attack by relying on the weaknesses of individuals” Impersonation Phishing Spear Phishing Whaling Vishing Spam Hoaxes Typo Squatting Watering Hole Attack Dumpster Diving Tailgating

17 Discussion Pick 3 and give examples: Impersonation Phishing
Spear Phishing Whaling Vishing Spam Hoaxes Typo Squatting Watering Hole Attack Dumpster Diving Tailgating


Download ppt "Malware and Social Engineering"

Similar presentations


Ads by Google