Welcome to SpyEye Front-end interface called “CN 1” or “Main Access Panel.”

Slides:



Advertisements
Similar presentations
PowerPoint presentation of first 25 pages of instructional manual Edith Fabiyi Essentials of Internet Access.
Advertisements

Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
MySQL Installation Guide. MySQL Downloading MySQL Installer.
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Discovering SQL all rights reserved (c) 2010 agilitator.com INSTALLING MS SQL Server 2008 R2 Express Edition.
Internet Safety Topic 2 Malware This presentation by Tim Fraser Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other.
London & Zurich Plc User Guide. Service Benefits Full on-line management of client accounts Paperless direct debit – no signatures required Standing orders.
Malware and ACH/EFT Fraud
Information Regarding
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
ONLINE DATA UPLOAD INSTRUCTION
User Guide. Service Benefits  Full on-line management of client accounts  Paperless direct debit – no signatures required  Standing orders fixed not.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Cyber Security - Threats James Clement Network Specialist ETS: Communications & Network Services
Internet & Day 2. Web Address/ URL 1.Uniform Resource Locator or web address use to access the web site 2.When you connected to the internet you.
FIRST COURSE Computer Concepts Internet and Microsoft Office Get to Know Your Computer.
1. Introduction The underground Internet economy Web-based malware The system analyzing the post-infection network behavior of web-based malware How do.
What is InScope™ ? InScope™ is a web-based application that enables you to perform certain Account Manager tasks on your own. InScope™ is a web-based.
CONFIGURING WINDOWS SERVER MIS 424 Professor Sandvig.
Module 1: Web Application Security Overview 1. Overview How Data is stored in a Web Application Types of Data that need to be secured Overview of common.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
Session 5: Working with MySQL iNET Academy Open Source Web Development.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
STAY CONNECTED TOLLFREEEXPRESS CONTROL PANEL GUIDE.
G046 Lecture 05 Task E Briefing Notes Mr C Johnston ICT Teacher
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
VT SMS System User Manual
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Guide To Sacrificial Giving
Collection of Assessment Results
Types of Electronic Infection
Protecting Students on the School Computer Network Enfield High School.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Welcome to FileZilla! FileZilla is a File Transfer Protocol (FTP) front-end that will allow you to upload podcasts and other media files to a server (the.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
Bonanza Health Card -How to Buy Online??. Download “Bonanza Health” App from Google Play Store. Search for Bonanza Health Care and Click on it. Install.
Cuallet step by step guide. Step 1 From the Cuallet home page, click the “Sign Up Now” button. New user / Register.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Monitor your child’s attendance Monitor your child’s behaviour View your child’s school timetable View when homework has been set for your child Download.
Digital Literacy Concepts and basic vocabulary. Digital Literacy Knowledge, skills, and behaviors used in digital devices (computers, tablets, smartphones)
1 Chapter Overview Creating Web Sites and FTP Sites Creating Virtual Directories Managing Site Security Troubleshooting IIS.
How Your Customers Will Pay Online & by Phone
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Unit 2 Assignment 1. Spyware Spyware is a software that gathers information about a person or site and uses it without you knowing. It can send your information.
File Transfer Protocol (FTP) CIS 130. File Transfer Protocol (FTP) Copy files from one internet host (server) to your account on another host –Need domain.
OPEN THE INTERNET EXPLORER (ver. 7, 8 or 9). TYPE THE E-TENDERING WEBSITE ADDRESS
Uploading Web Page  It would be meaningful to share your web page with the rest of the net user.  Thus, we have to upload the web page to the web server.
Internet Safety Topic 2 Malware Malware is short for malicious software VirusesViruses SpywareSpyware AdwareAdware other dangerous software exists, such.
Adware and Browser Hijacker – Symptoms and Preventions /killmalware /u/2/b/ /alexwaston14/viru s-removal/ /channel/UC90JNmv0 nAvomcLim5bUmnA.
1 Botnets Group 28: Sean Caulfield and Fredrick Young ECE 4112 Internetwork Security Prof. Henry Owen.
SAP – our anti-hacking software. Banking customers can do most transactions, payments and transfer online, through very secure encrypted connections.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Week-2 (Lecture-1) An electronic message sent from one computer to another. contains account i.e. How does.
Basic Internet Skills. What is the internet? A large group of computers connected to one another Its purpose is to send information back and forth to.
Identity Finder Client
Using the Personal Image Photo Library
Lesson 6: Configuring Servers for Remote Management
Lutheran Church of Our Saviour
Protect Your Computer Against Harmful Attacks!
Your Botnet is My Botnet: Analysis of a Botnet Takeover
Configuring Internet-related services
Lecture 16B: Instructions on how to use Hadoop on Amazon Web Services
Security Hardening through Awareness August 2018
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
FitnessGram® 2015 Student Information System (SIS) Extract Import Training for Georgia School Year.
Presentation transcript:

Welcome to SpyEye Front-end interface called “CN 1” or “Main Access Panel.”

Create task for billing a CC SpyEye Console

More billinghammer

Bot List

Bot Net Statistics

Upload a Task File instruct the bot to go to a specific sit (to generate clicks for possible ad revenue) or to possibly download more malware

Uploads configuration files Updates SpyEye binary files for the bots to download

Virtest is a website in Eastern Europe that allows logged-in users to scan binary files and exploit packs to test if they are being detected by antivirus engines

Settings button Socks 5 backconnet Allow the bot master to create reverse connections to the bot

SYN 1 or the Formgrabber Access Panel Amount of data being collected Date & Time

Search the database of stolen information

Search for a specific bank Hhows the entire HTTP request and all of the data the user sent to the bank User name Password

Overview of the sites that the infected computers

Bot master creates a.TXT file that will display FTP user names and passwords

Bot herder can specify an address to receive a copy of the C&C server’s database

SpyEye can also capture screenshots from infected machines

For Example Screenshot of a user at home authenticating with his/her bank login by using an onscreen keypad

Screenshot displaying all of the user’s account numbers and how much money was in each account

Steals only Bank of America credential

Displays stolen credit card information to use the user’s credit cards for the Create task for Billing

Security certificates that SpyEye has stolen