 Mal icious soft ware  Programs that violate one (or more) of the IA pillars  Does not (generally) refer to unintentional program bugs that violate.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
1 Chapter 8 Fundamentals of System Security. 2 Objectives In this chapter, you will: Understand the trade-offs among security, performance, and ease of.
 Application software consists of programs designed to make users more productive and/or assist with personal tasks.  Growth of internet simplified.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Unit 18 Data Security 1.
Computer Viruses.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Guide to Operating System Security Chapter 2 Viruses, Worms, and Malicious Software.
Quiz Review.
Chapter Nine Maintaining a Computer Part III: Malware.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Protecting Your Computer & Your Information
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
IT security By Tilly Gerlack.
 a crime committed on a computer network, esp. the Internet.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Trojan Horses on the Web. Definition: A Trojan horse a piece of software that allows the user think that it does a certain task, while actually does an.
Types of Electronic Infection
Return to the PC Security web page Lesson 5: Dealing with Malware.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malicious Software.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer virus Speaker : 蔡尚倫.  Introduction  Infection target  Infection techniques Outline.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Cosc 4765 Antivirus Approaches. In a Perfect world The best solution to viruses and worms to prevent infected the system –Generally considered impossible.
Chapter 40 Internet Security.
Managing Windows Security
Instructor Materials Chapter 7 Network Security
Computer Applications Unit B
Chap 10 Malicious Software.
Chap 10 Malicious Software.
Presentation transcript:

 Mal icious soft ware  Programs that violate one (or more) of the IA pillars  Does not (generally) refer to unintentional program bugs that violate IA pillars  Different approach to attacking a system  Not remote access network-based attacks  Can be used to enable such attacks  Victim generally installs the malware, or takes some action that results in installation  Often associated with online crime  Categorized by delivery and propagation techniques  Virus  Worm  Trojan Malware2

 Computer program that can replicate itself  “Infects” a computer without permission or knowledge of user  Attaches itself to another program or file  Usually executables  Cannot replicate unless the file is executed  Cannot spread beyond the system without human intervention Malware3

 Program  Most traditional virus type  Malicious program attached to another program file  Macro  Set of instructions embedded in documents (i.e., Word)  Analogous to a script embedded in a webpage  Executes whenever the document is opened/edited Malware4

 Cross-site Scripting  Malicious code injected into a website  Commonly seen on social media sites  Facebook, MySpace, Twitter, etc.  User views a page containing the malicious script  Script attempts to replicate itself to the user’s profile  Anyone viewing the user’s profile is also infected  Boot sector  Boot sector instructs the computer how to boot the operating system  Virus attaches itself to the boot sector code  Runs every time the computer is started Malware5

 Self-replicating, self-propagating program  Often uses networking mechanisms to propagate  Typically utilizes an exploit to gain access to a system and copy itself  Scans surrounding network looking for additional victims  Attempts to exploit them and copy itself  Other replication methods exist  Ex: autorun of removable media devices Malware6

 Derived from the Trojan Horse story in Greek mythology  Program appears to have a useful function  Also has a hidden (potentially malicious) function  Scareware example  User visits a website  Window pops up indicating they have X types of spyware/viruses on their computer  User downloads and install the advertised anti-virus program  Program indicates viruses have been removed  Also installs malware without victim’s knowledge  Often botnet software  Check your SI110 webpage Malware7

 Malware can be used to do several things  Delete files  Send files back to the attacker  Allow your computer to be used as part of a botnet  Send spam s or perform DDoS attacks  Allow your computer to be used as a springboard for another network attack  Mask the true source of the attack  Install programs  Keyloggers  Spyware  Adware  Perform screen captures  Turn on webcam/microphone Malware8

 User/administrator observes abnormal behavior of the system  Actions not initiated by user  New toolbar  Program they did not install  Browser homepage changes  Processing/network slowdown  Anti-virus scans can detect many types of malware  Signatures  Heuristics  IDS/IPS detects abnormal network traffic  Worm propagation  Firewall or gateway can incorporate malware scanners  Prevent malware from reaching the victim’s machine Malware9

 Best practices  Principle of Least Privilege  Execute all tasks with lowest permissions possible  Not all tasks require admin privileges  Separate user and administrator accounts  Keep anti-virus signatures up-to-date  Run full scan periodically  Install operating systems updates when available  Keep 3 rd party software up-to-date as well  Turn off the system when not in use  Enable auditing  Keep system physically secure  Follow/enforce usage policies  Report abnormal behavior  User training/education Malware10

  Open only from trusted sources  Verify attachments  Scan before opening/running  Beware of online scams  No one wants to give you money!!!  s asking you to verify account information  Visit website rather than following link  Online  Only visit trusted websites  Be aware of HTTP cookies - block or disable as necessary  Removable media  Disable autorun for removable media devices  Do not share removable media between networks  Follow established policies if required Malware11

Malware12

 Duqu was initiated with a spearphishing attack:  An to a company employee requesting more information with, in particular, the line "In the attached file, please see a list of requests."  The "attached file" was an innocuous- looking MS Word doc. Opening up that document is what started all the trouble. The user actually opened the door and let the attacker in when he opened that . Malware13

 The Word doc sent contained an "embedded font", meaning that the file contained within in it a block of bytes that defined what the characters used in the document should look like when displayed.  The bytes that comprise the font definition are read in and processed by OS that runs with administrator privileges; in such a way as to trick this OS code into executing shell code which ran with the highest possible privileges.  This shell code installed the Duqu malware, which then was up and running long-term on the host, regardless of whether the Word document or Word itself remained open.  Called Duqu because it created files with prefix “~DQ” Malware14

 Duqu contacted a command-and-control (C&C) server to receive instructions  In fact, the communication between C&C and the infected machine was done over HTTP and HTTPS. At least one Duqu C&C server was traced to a machine in Belgium at IP address  The C&C server loaded an extra module (piece of code) on the infected host that allowed it to attack another machine on the same network, making use of that local network access. Yet another module loaded onto the infected host by the C&C server was a key logger, which logged keystrokes and grabbed screen captures.  Once inside a privileged hosts, we have demonstrated how much ease we have to manipulate data. Malware15

Malware16

Malware17

 Contact your IT department or network administrator  Disconnect from the network  Prevent exfiltration of personal information  Limit propagation  Backup important files  Scan for malware  Treat all files and programs as infected until verified Malware18

 Recovery options  Attempt to clean the malware from the system  Some malware designed to hide from repair tools  Restore to “known good” state  Prior to malware infection  Forensics can help determine last “known good” state  Reinstall from original media  Ensure all OS and application updates are installed  Fix vulnerabilities and configure security settings before returning system to service Malware19