Chap6 Part 1 Malicious Software
Chap6 Part 1 Malicious Software
Lesson Introduction
● Overview of malware
What is Malware? Quiz
● Independent
Types of Malicious Software (Malware)
● Needs host program:
Browser plug-ins,
extensions, scripts
Viruses
Types of Malicious Software (Malware)
● Independent:
Worms APTs
Botnet
Trap Doors
● Performs some
unwanted/harmful function when
the host program is executed
Viruses
Dormant
Phase
Propagation
Phase
Triggering
● E.g. attachment
to email Phase Execution
Phase
Host-Required Malware Quiz #1
Determine which category each of these belongs to:
An email attachment that when being opened will send itself to all people
in the user’s address book.
A customized keyboard app that logs user input and sends it to a server
on the Internet.
Part of a program will only run if the computer is at the user’s home, and
it will upload all MS Word docs to a web site.
A login program with an undocumented option (e.g., DEBUG) that would allow
an attacker to supply any username and password to gain access to the
computer.
Memory-resident virus
Macro Viruses
Macro:
● An executable program (e.g.
instructions opening a file,
starting an application)
embedded in a word processing
document, e.g. MS Word
Macro Viruses
A common technique for Spreading:
● A virus macro is attached to a Word
Document
● Document is loaded and opened in the host system
● When the macro executes, it copies itself to the global
macro file
● The global macro can be activated/spread when new
documents are opened
Rootkit
What it did:
● Determine where it could
spread
● Spread its infection
● Remain undiscovered and
undiscoverable
The Internet Worm
Effect:
Resource exhaustion - repeated infection due
to programming bug
● Spread
● Bootstrap loader to target machine, then fetch
● rest of code (password authenticated)
The Internet Worm
● Remain un-discoverable
● Load code in memory, encrypt, remove file
● Periodically changed name and process ID
● What we learned:
● Security scanning and patching
● Computer Emergency Response Team
Worm Quiz
Which of the following methods can be used
to spread a worm? Check all that apply:
email
instant messaging
downloading files
watching a video on netflix
clicking on a popup
using facebook
Malware Prevention &
Detection Approaches
● Removal
Malware Prevention &
Detection Approaches
4 Generations of antivirus software:
● Simple scanners: Use “signatures” of known viruses
● Heuristic scanners: Integrity checking: checksum,
encrypted has
● Activity traps
● Full-featured analysis: Host-based, network-based,
sandboxing-based
Malware Prevention
& Detection Quiz
Given that signature-based anti-virus solutions are not
always effective, why do we still use them?
Check all that apply:
“first-line” defense
The Most Expensive Worm Quiz
Which of the worms described below caused the greatest
financial damage?
Host-independent malware:
● Worms