A Trip to ICT and Society Series 1 : INFECTED! PART 2

33
By: Group 2 ICT-TLE Grade 7-Newton Members will follow via INFECTED!!! Expansion Pack A trip to ICT and Society

Transcript of A Trip to ICT and Society Series 1 : INFECTED! PART 2

Page 1: A Trip to ICT and Society Series 1 : INFECTED! PART 2

By: Group 2 ICT-TLEGrade 7-Newton

Members will follow via discussion

INFECTED!!!

Expansion Pack

A trip to ICT and Society

Page 2: A Trip to ICT and Society Series 1 : INFECTED! PART 2

A trip to ICT and Society

This Expansion Pack Course provides 3 more topics to discuss. Click on the module of your

choice:THE TOP 10 ...

MOST LETHAL COMPUTER

VIRUSES OF ALL TIME

LATEST COMPUTER

VIRUSES

BEST ANTIVIRUS SOFTWARE

TODAY

INFECTED!!! EXPANSION PACK VERSION 20.24

EXIT

Page 3: A Trip to ICT and Society Series 1 : INFECTED! PART 2

10

MELISSA VIRUS

In the spring of 1999, a man named David L. Smith created acomputer virus based on a Microsoft Word macro. He built the virus so that it could spread through e-mail messages. Smith named the virus "Melissa," saying that he named it after an exotic dancer from Florida.

30%

70%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 4: A Trip to ICT and Society Series 1 : INFECTED! PART 2

9

ILOVEYOU

A year after the Melissa virus hit the Internet, a digital menace emerged from the Philippines. Unlike the Melissa virus, this threat came in the form of a worm, it was a standalone program capable of replicating itself. It bore the name ILOVEYOU.

50%50%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 5: A Trip to ICT and Society Series 1 : INFECTED! PART 2

8

KLEZ VIRUS

It debuted in late 2001. The basic Klez worm infected a victim's computer through an e-mail message, replicated itself and then sent itself to people in the victim's address book. The Klez virus could act like a normal computer virus, a worm or a Trojan horse. 70%

30%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 6: A Trip to ICT and Society Series 1 : INFECTED! PART 2

7

CODE RED (I AND II)

The Code Red and Code Red II worms popped up in the summer of 2001. The vulnerability was a buffer overflow problem, which means when a machine running on these operating systems receives more information than its buffers can handle, it starts to overwrite adjacent memory. 75%

25%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 7: A Trip to ICT and Society Series 1 : INFECTED! PART 2

6

NIMDA WORM

Another virus to hit the Internet in 2001 was the Nimda (which is admin spelled backwards) worm. According to TruSecure CTO Peter Tippett, it only took 22 minutes from the moment Nimda hit the Internet to reach the top of the list of reported attacks . 80%

20%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 8: A Trip to ICT and Society Series 1 : INFECTED! PART 2

5

SQL SLAMMER/SAPPHIRE

In late January 2003, a new Web server virus spread across the Internet. The Bank of America's ATM service crashed, the city of Seattle suffered outages in 911 service and Continental Airlines had to cancel several flights due to electronic ticketing and check-in errors. 85%

15%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 9: A Trip to ICT and Society Series 1 : INFECTED! PART 2

4

MYDOOMThe MyDoom (or Novarg) virus is another worm that can create a backdoor in the victim computer's operating system. The original MyDoom virus -- there have been several variants -- had two triggers. One trigger caused the virus to begin a denial of service (DoS) attack starting Feb. 1, 2004. The second trigger commanded the virus to stop distributing itself on Feb. 12, 2004. 95%

5%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 10: A Trip to ICT and Society Series 1 : INFECTED! PART 2

3

SASSER AND NETSKYThe Sasser worm attacked computers through a Microsoft Windows vulnerability. Unlike other worms, it didn't spread through e-mail. Instead, once the virus infected a computer, it looked for other vulnerable systems.

The Netsky virus moves through e-mails and Windows networks. It spoofs e-mail addresses and propagates through a 22,016-byte file attachment 95%

5%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 11: A Trip to ICT and Society Series 1 : INFECTED! PART 2

2

LEAP-A/OOMPA-AIn 2006, the Leap-A virus, also known as Oompa-A, debuted. It uses the iChat instant messaging program to propagate across vulnerable Mac computers. After the virus infects a Mac, it searches through the iChat contacts and sends a message to each person on the list. The message contains a corrupted file that appears to be an innocent JPEG image. 80%

20%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 12: A Trip to ICT and Society Series 1 : INFECTED! PART 2

1

STORM VIRUSThe Storm Worm is a Trojan horse program. Its payload is another program, though not always the same one. Some versions of the Storm Worm turn computers into zombies or bots. As computers become infected, they become vulnerable to remote control by the person behind the attack. Some hackers use the Storm Worm to create abotnet and use it to send spam mail across the Internet. 99%

1%

DAMAGE RATIO

ESTIMATED DAMAGE

Page 13: A Trip to ICT and Society Series 1 : INFECTED! PART 2

10

EXPLOIT CVE -2013-5065.A

Adobe Reader crashes when trying to open a PDF file.

Page 14: A Trip to ICT and Society Series 1 : INFECTED! PART 2

9

SIREFEF.GEN VIRUS

Displays unwanted advertisements in your system, and also allows hacking by an exploiter.

Page 15: A Trip to ICT and Society Series 1 : INFECTED! PART 2

8

MBR.TDSS VIRUS FAMILY

Infection with TDSS is extremely difficult to spot because of the rootkit component that hides the actual payload. Usually, search engine search results are redirected to third-party sites

that display ads or sell fake products.

Page 16: A Trip to ICT and Society Series 1 : INFECTED! PART 2

7

FAKE ANTIVIRUS (FAKEAV)

Delivers fake messages saying computer is infected with an exaggerated number of threats showing.

Page 17: A Trip to ICT and Society Series 1 : INFECTED! PART 2

6

START PAGE

Hijacks the start page of a browser by laban.vn.

Page 18: A Trip to ICT and Society Series 1 : INFECTED! PART 2

5

OLYMPIC GAMES

Causes Adobe Reader to crash.

Page 19: A Trip to ICT and Society Series 1 : INFECTED! PART 2

4

Sky Wiper

Downloads and executes malicious directories and files.

Page 20: A Trip to ICT and Society Series 1 : INFECTED! PART 2

3

Reveton Ransom Virus

Initiates a DoS or Denial-of-Service. Locks the computer, saying you have violated the law and must pay a fine via

uKash, an unidentified payment provider.

Page 21: A Trip to ICT and Society Series 1 : INFECTED! PART 2

2

DORKBOT

Increases HTTP traffic, making the internet slower.

Page 22: A Trip to ICT and Society Series 1 : INFECTED! PART 2

1

TROJAN HORSE GEINIMI

(not mispelled) This creates a service known as AndroidIME.

Page 23: A Trip to ICT and Society Series 1 : INFECTED! PART 2

10

MCAFFE ANTI-VIRUS PLUS

$24.99McAfee AntiVirus Plus

protects against viruses, worms, spyware, Trojans and rootkits. It also detects and avoids attacks from hackers,

phishing scams, dialers, adware and malicious scripts. It is one of the only antivirus

software applications to include a two-way firewall.

10

Page 24: A Trip to ICT and Society Series 1 : INFECTED! PART 2

9

AVAST! PRO ANTI-VIRUS

$39.99Avast Pro Antivirus uses several layers of

protection, keeping your PC and resources safe from several angles. With built-in protection from spyware, rootkits and

Trojans, the software is equipped for all major security threats. The application

includes protection from malware spread through email (by scanning both inbound

and outbound messages), and it also has an integrated IM shield. Avast also includes

specific protection for several popular P2P file-sharing applications.

9

Page 25: A Trip to ICT and Society Series 1 : INFECTED! PART 2

8

PANDA ANTIVIRUS

PRO

$35.99Panda Security SL, formerly

Panda Software, is one of the dominant computer security

software vendors. AV-Test gives it excellent scores.

Industry analysts praise its technology innovations. There

are also Panda Security franchises in another 44

countries.

8

Page 26: A Trip to ICT and Society Series 1 : INFECTED! PART 2

7

G DATA ANTIVIRUS

$29.95The software incorporates advanced protection from

malware spread through email or IM. The software goes as

far as scanning outbound email for viruses and other

malware, so you won’t accidentally pass along a threat to your friends or

coworkers. Also recommended as BEST AV

SOLUTION FOR PC.

7

Page 27: A Trip to ICT and Society Series 1 : INFECTED! PART 2

6

BULLGUARD ANTIVIRUS

$29.95BullGuard antivirus software

earned certification from ICSA labs, which tests and retest

products at least on a quarterly basis in order to

ensure that they are able to defend your computer against emerging threats. This product

can also claim VB 100 certification, which means

Virus Bulletin has tested it for its ability to detect in-the-wild

viruses and its ability to generate no false positives.

6

Page 28: A Trip to ICT and Society Series 1 : INFECTED! PART 2

5

AVG ANTIVIRUS

$34.995

Page 29: A Trip to ICT and Society Series 1 : INFECTED! PART 2

4

F-SECURE ANTIVIRUS

$39.99AV-Test out of Germany places

F-Secure among the leaders when it comes to

performance. F-Secure is also among the handful of antivirus

software products to win an Advanced A+ rating from AV

Comparatives. The Virus Bulletin found F-Secure right on par with most of the best

antivirus software competitors.

4

Page 30: A Trip to ICT and Society Series 1 : INFECTED! PART 2

3

NORTON ANTIVIRUS

$39.99Norton AntiVirus detects

malware based on the behavior of suspected files and it also uses the more

traditional method of detecting viruses via known

signatures. It protects Firefox and Internet Explorer from malware that attempts to

exploit browser vulnerabilities.

3

Page 31: A Trip to ICT and Society Series 1 : INFECTED! PART 2

2

KASPERSKY ANTIVIRUS

$59.95Kaspersky Anti-Virus delivers

superb protection and security. As one of the best

antivirus software applications, it integrates

innovative technologies to defend against even the

newest threats. It's a great option for protection and

peace of mind. Independent test lab results confirm that it

is incredibly effective at protecting computers from

malware.

2

Page 32: A Trip to ICT and Society Series 1 : INFECTED! PART 2

1

BITDEFENDER ANTIVIRUS

PLUS

$29.95Bitdefender beats the threats from viruses, worms, Trojans

and other malware. It protects against the dangers that appear on social media

networks. And it protects you from dangerous emails and

malicious web sites. It is effective at what it does, as documented by the most

respected third-party test labs. It behaves well if you are

playing games or your laptop is unplugged.

1

Page 33: A Trip to ICT and Society Series 1 : INFECTED! PART 2

EXIT RETRY