spyware, viruses and malware what the fuss is all about
TRANSCRIPT
![Page 1: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/1.jpg)
Spyware, Viruses and Malware
What the fuss is all about
![Page 2: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/2.jpg)
Malware, or Malicious Code, refer tovarious types of software that can causeproblems, damage, disrupt your computer.
Installed without user knowledge orapproval
What is Malware?
![Page 3: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/3.jpg)
Motivation for Malware
Fun/Hobby/Spreading of ideological orpolitical message
Experimental/Research/Proof of Concepts
Vandalism/Graffiti
Revenge
Profit/Extortion
![Page 4: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/4.jpg)
Types of Malware
Virus– software program– exist on local drive– reproduction using a host (e.g. files, emails)– simple self-modification, encryption, polymorphic, metamorphic– Melissa, Chernobyl, I Love You….
![Page 5: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/5.jpg)
Types of Malware
Worms– stand alone software application– reproduced by itself– spread by exploiting vulnerabilities in the system– Netsky, SoBig, CodeRed, Sasser….
![Page 6: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/6.jpg)
Types of Malware
Trojan– disguised as legitimate software – ActiveX, BHO, shareware, pop-ups advertisement, pirated software– remains hidden– usually do not replicate itself– Adware, Spyware, Backdoor (rootkit, zombies), Dropper, NetBus, SubSeven, GAIN (Kazaa)
![Page 7: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/7.jpg)
Types of Malware
Others– Key Logger– Dialer– Browser Hijack– hybrids
![Page 8: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/8.jpg)
How did it get there?
Zero day exploits
Drive by downloads
Vulnerabilities in available services; DCOM, RPC,p2p, lsass, etc
Default passwords
Email attachment, opened by user or emailprogram
p2p downloads, double extensions
![Page 9: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/9.jpg)
How did it get there?
User Error
User has installed the malware
Social Engineering (but it said, “I love you!”)
Poor or nonexistent passwords
![Page 10: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/10.jpg)
Countermeasures
Antivirus
– Scanning and identifying using unique pattern of individual malware (Signature)– searching is done based on definition of known virus byte patterns (virus dictionary)– some uses heuristic/pattern analysis (suspicious behaviour)– scan for virus, worms, spyware and adware– Norton, McAfee, AVG, ZoneAlarm, Avast
![Page 11: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/11.jpg)
Countermeasures
Firewall
– rule-based (filter based on ports, IP address, application….)– hardware/software– network layer, application layer, application– personal, network based– stateless/stateful– part of Intrusion Prevention System (IPS)– IPFilter, pf, ipfw, Netfilter, Cisco, Dlink, McAfee, Norton, ZoneAlarm, Windows, Avast, Jetico
![Page 12: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/12.jpg)
Countermeasures
Education
– Educating end-users to: • Constantly apply OS patches available • Enable and constantly update antivirus • Delete emails from unknown sender • Operate in least privileged mode • Enable a personal firewall
![Page 13: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/13.jpg)
Once malware has been identified, it isbest to remove it while in safe mode.
Some malware has additional processesthat strive to stop you from removing it.
Deleting startup locations and files whilein safe mode, you can usually restore asystem to working condition but notnecessarily trusted state.
Removal Notes
![Page 14: Spyware, Viruses and Malware What the fuss is all about](https://reader035.vdocuments.us/reader035/viewer/2022081008/56649e7a5503460f94b7a69a/html5/thumbnails/14.jpg)
Some notes on Malware
Remember that a machine compromisedby malware has effectively been ‘hacked’ andthat it is usually best to return the machine toa trusted state by removing important data andrebuilding using best practices.
Keep in mind the following;• Change all Passwords associated with this machine• Hardening• Patching