1 / 14

Spyware, Viruses and Malware

Spyware, Viruses and Malware. What the fuss is all about. What is Malware?. Malware, or Malicious Code, refer to various types of software that can cause problems, damage, disrupt your computer. Installed without user knowledge or approval. Motivation for Malware.

amy
Télécharger la présentation

Spyware, Viruses and Malware

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Spyware, Viruses and Malware What the fuss is all about

  2. What is Malware? Malware, or Malicious Code, refer to various types of software that can cause problems, damage, disrupt your computer. Installed without user knowledge or approval

  3. Motivation for Malware Fun/Hobby/Spreading of ideological or political message Experimental/Research/Proof of Concepts Vandalism/Graffiti Revenge Profit/Extortion

  4. Types of Malware Virus – software program – exist on local drive – reproduction using a host (e.g. files, emails) – simple self-modification, encryption, polymorphic, metamorphic – Melissa, Chernobyl, I Love You….

  5. Types of Malware Worms – stand alone software application – reproduced by itself – spread by exploiting vulnerabilities in the system – Netsky, SoBig, CodeRed, Sasser….

  6. Types of Malware Trojan – disguised as legitimate software – ActiveX, BHO, shareware, pop-ups advertisement, pirated software – remains hidden – usually do not replicate itself – Adware, Spyware, Backdoor (rootkit, zombies), Dropper, NetBus, SubSeven, GAIN (Kazaa)

  7. Types of Malware Others – Key Logger – Dialer – Browser Hijack – hybrids

  8. How did it get there? Zero day exploits Drive by downloads Vulnerabilities in available services; DCOM, RPC, p2p, lsass, etc Default passwords Email attachment, opened by user or email program p2p downloads, double extensions

  9. How did it get there? User Error User has installed the malware Social Engineering (but it said, “I love you!”) Poor or nonexistent passwords

  10. Countermeasures Antivirus – Scanning and identifying using unique pattern of individual malware (Signature) – searching is done based on definition of known virus byte patterns (virus dictionary) – some uses heuristic/pattern analysis (suspicious behaviour) – scan for virus, worms, spyware and adware – Norton, McAfee, AVG, ZoneAlarm, Avast

  11. Countermeasures Firewall – rule-based (filter based on ports, IP address, application….) – hardware/software – network layer, application layer, application – personal, network based – stateless/stateful – part of Intrusion Prevention System (IPS) – IPFilter, pf, ipfw, Netfilter, Cisco, Dlink, McAfee, Norton, ZoneAlarm, Windows, Avast, Jetico

  12. Countermeasures Education – Educating end-users to: • Constantly apply OS patches available • Enable and constantly update antivirus • Delete emails from unknown sender • Operate in least privileged mode • Enable a personal firewall

  13. Removal Notes Once malware has been identified, it is best to remove it while in safe mode. Some malware has additional processes that strive to stop you from removing it. Deleting startup locations and files while in safe mode, you can usually restore a system to working condition but not necessarily trusted state.

  14. Some notes on Malware Remember that a machine compromised by malware has effectively been ‘hacked’ and that it is usually best to return the machine to a trusted state by removing important data and rebuilding using best practices. Keep in mind the following; •Change all Passwords associated with this machine •Hardening •Patching

More Related