Malware Lecture 7
Malware Lecture 7
• Malware
• Usage of Malware
• Types of Malware
• How Malware Spreads?
• How Can You Protect Computer?
• Symptoms
• Anti-Malware Program
Malware
• 1988 – Jerusalem
Infected both .EXE and .COM files
Friday 13th it deleted all programs in the infected system
Boot sector viruses – Yale from USA, Stoned form New Zealand, Ping Pong from Italy
first self-encrypting virus
Stuxnet worm – target Iran, specifically industrial to cool the fans or reduce the fan
of a nuclear reactor.
Defences Against Worms
• Modus operandi of true worms is to exploit a known vulnerability
• Key defence – latest patches
• Host-based IDS – detects unauthorized system activity
• Network-based IDS – detects signatures of known worms
• Antivirus software for email worms
• Don’t run executables or open files from unknown sources!
Adware and Spyware
• Annoying and deceptive software
• Information gathering programs
• Designed to monitor user behavior
• Includes – spyware, adware and spam
Storm
• Uses email spamming and phishing websites
• Begins gathering infected computers into the storm botnet
• Infected 1.7 million computers
• Responsible for blasting out 20 percent of spam sent worldwide
• Storm 2.0 strain 2010
relays junk e-mail advertising male enhancement pills and adult websites
Action
• Keystroke logging – passwords to get keys to decrypt the packets
• Sniffing Traffic – watching for clear text passwords
• Installing Advertisement Add-ons
Set up a fake website with some advertisement
Negotiate a deal with hosting companies that pay for clicks on adds
Bots click on the pop-ups
• Manipulating online polls/games
• Mass identity theft – “phishing mails”
• Spreading new malware
How Malware Spreads?
• Malware is a program that must be triggered or somehow
executed before it can infect your computer system and spread to
others.
• Here are some examples on how malware is distributed:
a) Social network
b) Pirated software
c) Removable media
d) Emails
e) Websites
Damages
1. Data Loss - Many viruses and Trojans will attempt to delete files or wipe hard drives
when activated, but even if you catch the infection early, you may have to delete
infected files.
2. Account Theft
• Many types of malware include keylogger functions, designed to steal accounts and
passwords from their targets.
• This can give the malware author access to any of the user's online accounts, including
email servers from which the hacker can launch new attacks.
3. Botnets
• Many types of malware also subvert control over the user's computer, turning it into a
"bot" or "zombie."
• Hackers build networks of these commandeered computers, using their combined
processing power for tasks like cracking password files or sending out bulk emails.
Damages contd
4. Financial Losses
• If a hacker gains access to a credit card or bank account via a keylogger,
he can then use that information to run up charges or drain the
account.
• Given the popularity of online banking and bill payment services, a
hacker who manages to secrete a keylogger on a user's system for a full
month may gain access to the user's entire financial portfolio, allowing
him to do as much damage as possible in a single attack.
How Can You Protect Your Computer?
• Install protection software.
• Practice caution when working with files from unknown or
questionable sources.
• Do not open e-mail if you do not recognize the sender.
• Download files only from reputable Internet sites.
• Install firewall.
• Scan your hard drive for viruses monthly.
Symptoms
• Increased CPU usage
• Slow computer or web browser speeds
• Problems connecting to networks
• Freezing or crashing
• Modified or deleted files
• Appearance of strange files, programs, or desktop icons
• Programs running, turning off, or reconfiguring themselves (malware will often
reconfigure or turn off antivirus and firewall programs)
• Strange computer behavior
• Emails/messages being sent automatically and without user’s knowledge (a friend
receives a strange email from you that you did not send)
• There seems to be a lot of network activity when you are not using the network
• The available memory on your computer is lower than it should be
• Programs or files appear or disappear without your knowledge
• File names are changed
Anti-Malware Program
• Anti-Malware program is used to prevent, detect, and remove computer viruses,
worms, trojan horses and any other type of malware.
• Examples of Anti-Malware program:
– Antivirus program
– Anti-spyware program
– Anti-spam program
– Firewall
Antivirus Program
• “Antivirus" is protective software designed to defend your computer against
malicious software.
• In order to be an effective defense, the antivirus software needs to run in the
background at all times, and should be kept updated so it recognizes new versions of
malicious software.
Examples of Antivirus Program
• Norton Antivirus
• AVG
• Kaspersky
• Avast!
• PC-Cilin
• McAffee
• Avira
• Panda
• Etc.
Anti-Spyware Program
• Anti-spyware program is a type of program designed to prevent and detect
unwanted spyware program installations and to remove those programs if
installed.
• Examples of Anti-spyware program:
Spyware Doctor
AVG Anti-spyware
STOPzilla
Spysweeper
Anti-Spam Program
• Anti-spam software tries to identify useless or dangerous messages for
you.
Firewall
• A firewall blocks attempts to access your files over a network
or internet connection.
• It blocks incoming attacks.
• Your computer can become infected through shared disks or
even from another computer on the network, so you
need to monitor what your computer is putting out over
the network or internet also.
Summary
• Malicious code attacks work because of:
Flaws in software design
Vulnerabilities caused by insecure configurations
Social engineering
Human error and/or naïve users
Persistence on the part of hackers