viruses, hacking, and antivirusspp2k/1150/001/l06.pdf · •viruses that infects popularly traded...

31
Viruses, Hacking, and AntiVirus

Upload: others

Post on 30-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Viruses, Hacking, and AntiVirus

Page 2: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

What is a Virus?

• A type of Malware

– Malware is short for malicious software

• A virus – a computer program

– Can replicate itself

– Spread from one computer to another

Page 3: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

First Viruses

• Creeper Virus detected on ARPANET

• Would display “I'm the creeper, catch me if you can!“

• “Elk Cloner” – attach to Apple DOS 3.3 OS and spread via floppy disk

Page 4: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Types of Viruses

• Viruses that infects popularly traded software

• Macro Viruses: written in scripting languages for Microsoft programs such as Word and Excel

• Viruses in Executables

Page 5: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

How Your Computer Gets Infected

• Binary Executable files (DLL’s, EXE’s)

• An external, physical device

• General Purpose Script files

• System Specific Autorun Script files

• Documents that contain Macros

• Exploitable bugs in a program

• Links to malicious code in PDFs, HTML, other documents

Page 6: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

An Example

• A file could be named “picture.png.exe”

• When opened, the program runs and infects computer

• Spoofing an email address to make it sound legitimate so you’ll download and open an attachment

Page 7: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Malware

• Includes viruses, worms, Trojan horses, spyware, adware

Page 8: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Purpose of Malware

• Used to steal personal, financial, or business information

• Destroy data

• Hijacking computers for various purposes

Page 9: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Cookies

• Cookies are small files deposited on a system during a web site visit

• Can be useful: – Allows web servers to maintain state (position and

information) of a session with a user – Can keep track of your login information, shopping

cart, etc.

• May be harmful – Allows web sites to track information unbeknownst to

user – Source of data for Pop-ups

Page 10: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Worms

• Worms are similar to viruses in the way they are spread

• Doesn’t need user action to spread

• Actively transmits itself over networks to infect other computers

Page 11: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Trojan Horses

• A program that looks like a harmless program but contains malicious code

• Used to install other malware such as backdoors or spyware

Page 12: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Rootkits

• Rootkits: modify OS so malware is hidden

• “Each ghost-job would detect the fact that the other had been killed, and would start a new copy of the recently stopped program within a few milliseconds. The only way to kill both ghosts was to kill them simultaneously (very difficult) or to deliberately crash the system.”

Page 13: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Backdoors

• A way to bypass normal authentication procedures

• Example: a hard coded user and password that gives access to a system or computer

• Easter Eggs

• Many viruses and worms attempt to create backdoors for more viruses

Page 14: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Spyware

• Software that monitors and gathers information about your system or computing

• Can collect personal information, Internet surfing habits, user logins, bank or credit account information

• Can change computer settings

• Keyloggers – collects information about what you type

• Port Sniffers – intercept and log data sent over a network

Page 15: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Port Scanners and Sniffers

• Port Sniffers – intercept and log data sent over a network

• Port Scanner – software that probes a server or computer network for open ports. Use ports to access network.

Page 16: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Bots and Botting

• Programs that take control of a computers normal operation, or operate in stealth mode on a computer

• Can be used to disrupt normal operations

• Can turn a user’s computer into a source of malware attacks on others (Email Spamming)

Page 17: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Adware

• Advertising-supported software: automatically renders unwanted advertisements

• Object is to generate revenue for its author

Page 18: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Non-Malware, Active Threats

• Phishing – Posing as a trustworthy entity to acquire information

• Fake websites

• Email Spoofing

Page 19: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Non-Malware, Active Threats

• (Distributed) Denial of Service, AKA DDOS attack

• Flooding a web server with spurious traffic generated to overwhelm the server’s capabilities thus denying legitimate users or exposing system flaws

• Related to Botting

Page 20: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Scareware

• Holds your PC hostage

Page 21: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Hacking

USES ALL OF THE ABOVE

Page 22: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Additional Hacking

• Password Cracking

• Software bugs: buffer-overrun, SQL Injections

• http://hackertyper.com/

• http://en.wikipedia.org/wiki/Stuxnet

Page 23: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Protecting Your Computer

Page 24: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Signs Your Computer May Be Hacked

• Your computer is running slow

• Processes you don’t recognize are running

• You are asked for personal information via email, or by phone

• You see data or programs disappear or change

• A Pop-up says your machine is infected and you need to scan it right now – and it is not the security software you installed

Page 25: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Anti-Spyware

• When a large number of pieces of spyware have infected a Windows computer, the only remedy may involve backing up user data, and fully reinstalling the OS.

1. Scans incoming network data for spyware

2. Detects and removes spyware

Page 26: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Firewalls

• Similar to Anti-Spyware but controls all incoming and outgoing traffic and what should and shouldn’t be allowed in and out

Page 27: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Anti-Virus

Pros:

• Prevents, detects and removes malware

Cons:

• False Positives, False Negatives

• Slows down your computer

Page 28: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Be Smart!

• Don’t open emails that you don’t recognize

• Don’t download attachments you don’t recognize

• Don’t run programs or install applications you don’t know or trust

Page 29: Viruses, Hacking, and AntiVirusspp2k/1150/001/L06.pdf · •Viruses that infects popularly traded software •Macro Viruses: written in scripting languages for Microsoft programs

Personal Checklist

Passwords are set, sufficiently complex, and not shared

Legitimate Anti-Malware software running

Home wireless network protected by WPA

Firewall software running

Browser settings appropriate

Sensitive files are protected - password and encrypted

Smartphone protected – locate, lock, wipe

Software is kept up to date

I'm being cautious:

- Which web sites I visit

- When I open emails

- Where I leave my laptop, smartphone, USB drive

- When asked for information via email, internet, phone

- When I use public wireless networks

- When I download applications