Malicious software group 24

25
Malicious Software Minhal Abbas 136 M. Zain 035 Adil Islam 101

Transcript of Malicious software group 24

Page 1: Malicious software group 24

Malicious Software

Minhal Abbas 136 M. Zain 035

Adil Islam 101

Page 2: Malicious software group 24

Outline Malware

Computer Virus

Trojan Horse

Worm

Latest Threats

How to be Secure

Page 3: Malicious software group 24

Malware

Page 4: Malicious software group 24

What is Malware? Collective term for malicious software

Secretly accesses device without user knowledge

Makes system do something an attacker wantso Disrupt operations

o Gather sensitive information

o Display unwanted advertising

Page 5: Malicious software group 24

Origin Before Internet, viruses spread via floppy disks

Apr 1975: First Trojan Horse ‘Animal’ by John Walker

Jan 1986: First Computer Virus ‘Brain’ (Pakistanis Basit & Amjad)

Nov 1988: First Worm ‘Morris’ by Robert Morris

Oct 1995 : First ‘Spyware’ popped up on Usenet

Page 6: Malicious software group 24

Why is it created? Originally created as experiments and pranks

Led to vandalism and destruction of machines

Created for profito Adware : Forced advertising

o Spyware : Stealing sensitive information

o Zombie : Computers used to spread spam

o Ransomware : Extorting money

Page 7: Malicious software group 24

How It Spreads File sharing, removable drives

Spam emails, attachments

Downloads from unverified websites

Installing pirated & third party software

Games demos from unknown sources

Unofficial Toolbars

Page 8: Malicious software group 24

20072008

20092010

20112012

20132014

20152016

0

100000000

200000000

300000000

400000000

500000000

600000000

Total Malwarehttps://www.av-test.org/en/statistics/malware/

Page 9: Malicious software group 24

Types of Malware

80%

6%

7%

4%3%

Trojan

Worm

Virus

Adware & Spyware

Others

pandasecurity.com

Page 10: Malicious software group 24

Computer Virus

Page 11: Malicious software group 24

Computer Virus Self-replicating software, installed without user consent

Incorporates copies into other programs

Hidden in commonly used programs

Attaches to executable files

Human action required for it to spread

Page 12: Malicious software group 24

Virus Phases Dormant phase : Virus is idle

Propagation phase : Starts to Spread

Triggering phase : Virus activated

Execution phase : Function is performed

Page 13: Malicious software group 24

Main Categories Boot Sector Resident : Infects Boot Sector

Activates when booting machine

File Resident : Infects program files

Activates once program is run

Memory Resident : Installs in the memory

Infects future programs

Page 14: Malicious software group 24

Types of Viruses

Companion• Creates new

program, no modification• Executed by

shell rather than program

Stealth• Hides from

Anti-Virus software• Difficult to

repair infected file

Polymorphic• Changes with

every new host• Produces

modified code

Armored• Hides the

modification made• Reports false

values to programs

Page 15: Malicious software group 24

Trojan Horse

Page 16: Malicious software group 24

Trojan Horse Appears to be useful software, persuades user to install

Performs a different function than what it is advertised to do

Does not self replicate or self propagate

Creates backdoors, allowing unauthorized access to your system

Allows an attacker to access confidential or personal information

Page 17: Malicious software group 24

Purposes of Trojan Destructive : Destroy & Delete Files

Use of resources: Uses infected host to carry out illegal activities

Money theft : Stealing or extorting money

Data theft : Password, credit card, personal information theft

Spying : Monitoring activities through webcam &

keystrokes

Page 18: Malicious software group 24

Types of Trojans

Remote Access• Takes full

control of the system• Gives admin

control to attacker

Data Sending• Sends data to

hacker by email• Logs and

transmit each keystroke (keylogger)

DOS• Combines

computing power of hosts• Attacks by

flooding with traffic

Proxy• Turns system

into Host Integ Server (HIS)• Makes illegal

purchases with user’s accounts

Page 19: Malicious software group 24

Worm

Page 20: Malicious software group 24

Worm Self replicating software designed to spread through network

Does not need human intervention like Virus or Trojan

Exploits security flaws in widely used services

Consumes system memory & bandwidth

Causes servers to stop responding

Page 21: Malicious software group 24

Means of Infection Gains access to trusted host lists on infected system

Penetrates a system by guessing passwords

Exploiting widely known security holes

Example is the ILOVEYOU worm, which invaded millions in 2000

Page 22: Malicious software group 24

Types of Worms Scanning : Chooses “random” address

Coordinated scan: Different instances scan different addresses

Flash : Propagate along tree of vulnerable

hosts

Meta-server : Ask server for hosts to infect

Topological : Use information from infected hosts

Contagion : Propagates along normal communication

Page 23: Malicious software group 24

Latest Threats FBI Virus : Fake FBI alert, tricks user into paying $200

Firefox Redirect : Redirects Firefox browser to unwanted sites

Suspicious.Emit : Backdoor Trojan Horse in removable devices

Serifef : In keygens & cracks, disables Windows

Defender

Loyphish : Fake banking webpage, steals login

credentials

Page 24: Malicious software group 24

How to be Secure Use Antivirus software

Use a Firewall

Use a pop-up blocker

Use complex and secure passwords

Don't click on links within emails

Page 25: Malicious software group 24

THANK YOU!