Malware Creators Are Quite Clever, You Know...

Slides:



Advertisements
Similar presentations
Thank you to IT Training at Indiana University Computer Malware.
Advertisements

Day anti-virus anti-virus 1 detecting a malicious file malware, detection, hiding, removing.
Rootkit Definition A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a.
What are Trojan horses?  A Trojan horse is full of as much trickery as the mythological Trojan horse it was named after. The Trojan horse, at first glance.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Vijay krishnan Avinesh Dupat  Collection of tools (programs) that enable administrator-level access to a computer or computer network.  The main purpose.
Windows Malware: Detection And Removal TechBytes Tim Ramsey.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
Internet Safety for Students Malicious Programs By: Mr. Bradshaw Scott City R-1 Schools.
Viruses, Hacking, and AntiVirus. What is a Virus? A type of Malware – Malware is short for malicious software A virus – a computer program – Can replicate.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
VIRUSES + DESTRUCTIVE PROGRAMS = MALWARE
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Viruses.
 We all know we need to stay safe while using the Internet, but we may not know just how to do that. In the past, Internet safety was mostly about.
What is a Computer Worm? A computer worm is a self- replicating program very similar to a virus. A virus attaches itself and becomes part of another executable.
Rootkits. EC-Council The Problem  Microsoft Corp. security researchers are warning about a new generation of powerful system-monitoring programs, or.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
Vijay Krishnan Avinesh Dupat. A rootkit is software that enables continued privileged access to a computer while actively hiding its presence from administrators.
Malware Adware Removal Best Free Malware Virus Protection Best Free Malware Adware Removal Service Best free Anti Spyware Removal Service Best free Trojan.
Administrator Protect against Malware by: Brittany Slisher and Gary Asciutto.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
Rootkits in Windows XP  What they are and how they work.
Lecture 2 Title: Computer Software By: Mr Hashem Alaidaros MIS 101.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
ICT Functional Skills Viruses and other malware. What is malware? software which is specifically designed to disrupt or damage a computer system – Viruses,
Attack Plan Alex. Introduction This presents a step-by-step attack plan to clean up an infected computer This presents a step-by-step attack plan to clean.
Return to the PC Security web page Lesson 5: Dealing with Malware.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Copyright © 2006, Idea Group Inc. 1 Chapter IV Malware and Antivirus Deployment for Enterprise Security By: Raj Sharman,K. Pramod Krishna, H. Raghov Rao.
ICT & Crime Viruses & malware. What is a virus? A computer virus is a piece of software that can 'infect' a computer (install itself) and copy itself.
Rootkits What are they? What do they do? Where do they come from?
CS 510 : Malicious Code and Forensics. About the course Syllabus at
RootKit By Parrag Mehta OUTLINE What is a RootKit ? Installation Types How do RootKits work ? Detection Removal Prevention Conclusion References.
BY FIOLA CARVALHO TE COMP. CONTENTS  Malicious Software-Definition  Malicious Programs Backdoor Logic Bomb Trojan Horse Mobile Code Multiple-Threat.
Malicious Software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Business Technology Applications What is Malware.
Understand Malware LESSON Security Fundamentals.
Week 6 COMMON TYPES OF MALICIOUS CODE. Objectives describe the operation of: Viruses Malware [last week] Spyware [last week] Adware [last week] Trojans.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
By Alex Mayak.  What is spyware?  History of spyware.  What effect does spyware have on your computer?  What spreads spyware?
DEVICE MANAGEMENT AND SECURITY NTM 1700/1702. LEARNING OUTCOMES 1. Students will manipulate multiple platforms and troubleshoot problems when they arise.
Viruses A computer program that can replicate itself and is spread from one computer to another Can be spread by networks, the internet, or removable mediums.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Mcafee Support phone number, mcafee antivirus technical support
Chapter 40 Internet Security.
Three Things About Malware
Malware and Computer Maintenance
3.6 Fundamentals of cyber security
Employee clicks on fake
Malware aka- malicious software By: Ken Fogel
MCAFEE ANTIVIRUS TECHNICAL SUPPORT CALL ON
Fix to Quick Heal Update Error 1002 Call
Fix AOL Desktop Error Code 212 Call for Help
Steps to Fix McAfee Error 1336 Call
Steps to fix McAfee Error 1603 Call
Rootkit A rootkit is a set of tools which take the ability to access a computer or computer network at administrator level. Generally, hackers install.
Malwarebytes Technical Support Number Malwarebytes is known to be one of those tools that come with a lot of interesting ranges of features.
How to Get Rid of Online Threats Impacting your Computer Device?
Computer Applications Unit B
HOW TO FIX AOL 5 ERROR CODE AOL ERROR 5 MAY APPEAR DURING THE INSTALLATION OF THE PROGRAM OR SOFTWARE RELATED TO AOL INSTANT MESSENGER IS RUNNING DURING.
Malicious Software Network security Master:Mr jangjou
Presentation transcript:

Malware Creators Are Quite Clever, You Know... Brian Long Brian Long Training & Consultancy Services brian@blong.com http://blong.com

Malware Malware = software that has malicious purpose or behaves maliciously: Worms Viruses Adware Spyware Exploit tools Backdoor servers Spreaders Rootkits

Malware Malware typically arrives through some exploit Backdoors are planted Stuff may get broken Data may be stolen Host facilities may be consumed parasitically

Malware Continued existence and stealth achieved through rootkits Terminology dates back some way with Unix Rootkits hide stuff Files Directories Registry keys/entries Processes and so on

Malware Rootkits are low-level, high-tech nasties Some use kernel-mode code installed through a driver Some achieve what they need to at user mode Various approaches implemented successfully Regular toolkit will not see rootkits Rootkit deployment is increasing rapidly

Case Study Live web server Locked away in a shed somewhere Only access via Remote Desktop Something seemed funny, hence the call Dodgy IP activity, but… …nothing visible

Case Study Turned out to be a skilled hacker’s P2P system 26.5GB of music and video files being distributed around an IRC crew on the quiet Rootkit installed Disk space faked Everything hidden Customer very surprised to see it all spill out into the open

Malware Common implementation language is Delphi If not, C++ or assembly language With lots of inline assembly Microsoft are getting on the case: http://research.microsoft.com/rootkit Sysinternals.com are getting on the case: http://www.sysinternals.com/ntw2k/freeware/rootkitreveal.shtml

B.L.E.A.C.H. Infected by adware? Having trouble removing spyware? Suspect you have some malware? You need to clean your system with BLEACH*. BLEACH* is the quick and effective way to rid yourself of unwanted and malicious software on your Windows desktop, LAN servers and Web servers. Enquiries to brian@blong.com * Brian Long Elbows Away Computer Hackers

Thank you Brian Long brian@blong.com http://blong.com p|-|34|2 |v|’/ 1337 $|<!11z