Presentation is loading. Please wait.

Presentation is loading. Please wait.

Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.

Similar presentations


Presentation on theme: "Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an."— Presentation transcript:

1 Trojan Horses on the Web

2 Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an entirely different action and most of the time it would damage either the person or their computers. Now-a-days Trojan horse are probably the most wide-spread security threat! The name “Trojan Horse ” was derived from the story of how Odysseus of the Greeks tricked the people of Troy with a gift, that actually would lead to their demise.

3 How Trojan Horses Work Some one trying to execute a Trojan Horse would begin by disguising their software as a benign or beneficial software. Then distribute the software via e-mail or links from given websites. Users are then fooled into downloading this maliciously disguised software, which then corrupts user and or his computer. The attackers goals during the course of this operation include: erasing and overwriting data on a computer, encrypting files, discretely corrupting files, uploading and downloading corrupt files, taking control of users computer, re-installing itself after being disabled, making screenshots, data harvesting, etc.

4 Security Software Disablers Trojans that disable anti-virus or firewalls. This allows the attacker to penetrate the system with ease. The compromised system is now vulnerable to attacks from the internet.

5 Denial-of-Services (DOS) Denial of Services or DOS is a type Trojan horse. Denial of Services turns the victims computer into a zombie. Together with other zombie machines they attack a server over the internet to consume all of its resources and bring down the server. For this to be affective many zombie machines are required overflow the servers capacity level.

6 Example of DOS

7 Keylogger This kind of Trojan monitor the key strokes on a keyboard and sends them back to an foreign location. This kind of Trojan monitor the key strokes on a keyboard and sends them back to an foreign location. Often keyloggers are used in identity theft crimes cause they can get strings of information. For example, bank account numbers, credit cards, account passwords, user names, etc.

8 Here is an example of how to avoid keylogging:

9 Remote Access Trojans Remote access Trojans allows third party users to take complete control over a victims system. This allows an attacker to violate a users computer from another location. They can hijack keyboard and mouse movements giving the attacker control of a victims system. They can do tasks as simple as opening and closing a CD-Rom tray. They can do tasks as simple as opening and closing a CD-Rom tray.

10

11 Data destruction of Trojans The goal of this Trojan is to erase or corrupt data stored on this computer. This would be done to erase memory or information that would usually benefit the attacker. For example, corporate sabotage or removal of an important machine from service. Also, this can be used for extortion when the hacker will corrupt original file and charge victim for return of impertinent information. Attackers main motive for this is profit.

12 Consequences to User Loss of identity Loss of identity Permanent damage to hardware Permanent damage to hardware Corruption of files in an operating system Corruption of files in an operating system Financial loss to corporations or user Financial loss to corporations or user Increase in spam Increase in spam Reduction of system performance Reduction of system performance

13 Difference between Trojan Horse and other computer Attacks Viruses attached themselves to legitimate previously installed software. Require a human action to infect the system. A worm have the ability to self replicate and spread from machine to machine without the need form human interaction. Trojan Horses have none of these attributes.

14 How Trojan Horses have evolved Recent shifts in hacker focus on how compromised web servers are now becoming an important in attacks against users and the threat of automated web attacks. The attackers are focusing on the vulnerable servers to get their victims easier.

15 Demographics Current Research shows that they are: Cauasian Cauasian Male Male 12-28 years old 12-28 years old Middle class Middle class Limited Social Skills Limited Social Skills Perform poorly in school: aptitude for computers and technology Perform poorly in school: aptitude for computers and technology Dysfunctional families. Dysfunctional families.

16 Types of Hackers NOVICE - Limited computer skills. CYBER-PUNKS – Better understanding of how the attack works. INSIDERS – Disgruntled employee or ex- employee able to carry out the attack due to inherent privelegs. CODERS – Technically skilled, writes the scripts and automated tools.

17 PROFESSIONAL – Criminals, thieves, highly trained in state of the art equipment and very motivated. CYBER-TERRORISTS – well funded, political motives with criminal intent.

18 Major Attacks In 2000 Bill Gates’ Microsoft operating systems suffered a major attack from Trojans horses when they discovered a security error in the Microsoft operating system. The notepad application was infected and the Trojan spread itself through the network to affect other computers that were connected. This allowed access to source codes for the hackers. Even worse the Trojans also rewrote the system registry so that whenever the system rebooted the Trojans is reloaded back into the system.

19 Examples of Trojan Horses

20

21 Prevention of Trojan Horse Attacks Anti-Virus/ Anti-Trojan software Be aware of what you upload and download to your operating system. Monitor the sites and files your visit and use.

22 Conclusion Trojan Horses is a piece of software that allows the user think that it does a certain task, while actually does an entirely different task and damages an vulnerable system. Trojan Horses can be used to steal an individuals identity, corrupt data, and permanent hardware damage.

23 Questions??


Download ppt "Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an."

Similar presentations


Ads by Google