By Michael Carlisle CpSc 420 December 6, 2007. Worms – A Definition!  Worm – a program that copies itself from one computer to another.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
Computer Viruses and Worms* *Referred to slides by Dragan Lojpur, Zhu Fang at Florida State University.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Telnet and FTP. Telnet Lets you use the resources of some other computer on the Internet to access files, run programs, etc. Creates interactive connection.
Viruses, Worms, Spyware, and Other Perils of an On- Line World Computer Services Tech Talk September 23, 2003.
Malicious Attacks. Introduction Commonly referred to as: malicious software/ “malware”, computer viruses Designed to enter computers without the owner’s.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
CSE331: Introduction to Networks and Security Lecture 31 Fall 2002.
1 Computer Viruses (and other “Malicious Programs) Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Computer Viruses and Worms Dragan Lojpur Zhu Fang.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Classification of Viruses. A Government Report from Gibb, McMillan and Wylie.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Henric Johnson1 Chapter 10 Malicious Software Henric Johnson Blekinge Institute of Technology, Sweden
Tyler’s Malware Jeopardy $100 VirusWormSpyware Trojan Horses Ransomware /Rootkits $200 $300 $400 $500 $400 $300 $200 $100 $500 $400 $300 $200 $100 $500.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
1. 2 What is security? Computer Security deals with the prevention and detection of, and the reaction to, unauthorized actions by users of a computer.
Unit 2 - Hardware Computer Security.
Life in a Dangerous World: Developing effective strategies against Virus, Worms and Other Threats Marshall Breeding Vanderbilt University
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
D. Beecroft Fremont High School VIRUSES.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 45 How Hackers can Cripple the Internet and Attack Your PC How Hackers can Cripple the.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
CIT 380: Securing Computer SystemsSlide #1 CIT 380: Securing Computer Systems Malware.
Information Technology Software. SYSTEM SOFTWARE.
1 Chap 10 Virus. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on an ever increasing.
Viruses, Trojans and Worms The commonest computer threats are viruses. Virus A virus is a computer program which changes the way in which the computer.
Viruses Juan Arriola CS-100. HISTORY Computers viruses first appeared with the credit of John von Neumann due to his studies on the self replication of.
Computer viruses are small software programs that are made to spread from one computer to another and to interfere with computer operations. There are.
Viruses. A virus is a computer program that operates by piggybacking on other programs. Any time the other program is run, the virus is activated and.
Chapter 10 Malicious software. Viruses and ” Malicious Programs Computer “ Viruses ” and related programs have the ability to replicate themselves on.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 47 How Viruses Work.
Types of Electronic Infection
Name: Perpetual Ifeanyi Onyia Topic: Virus, Worms, & Trojan Horses.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
{ Macro by Gabriel and Brian. Definiti on a macro virus is a virus that is written in a macro language that is to say, a language built into a software.
~Computer Virus~ The things you MUST know Brought to You By Sumanta Majumdar Dept. Of Electrical Engg. 2010,GNIT
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Priya Ranjan Kumar Dept. Of Computer Science Engg. 2012, RIT.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
CONTENTS What is Virus ? Types of computer viruses.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
MyDoom ☉ Ian Axelrod ☉ Chris Mungol ☉ Antonio Silva ☉ Joshua Sole ☉ Somnath Banerjee Group 5 CS4235/8803.
By Alyssa Sedlak. This worm arrived by on May 4, 2000 The subject was simply “ILOVEYOU” and held an attachment named “LOVE-LETTER-FOR-YOU” LOVE.
W elcome to our Presentation. Presentation Topic Virus.
Types of Computer Malware. The first macro virus was written for Microsoft Word and was discovered in August Today, there are thousands of macro.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Computer virus Done: Aaesha Mohammed ID: H
1 Computer Virus and Antivirus A presentation by Sumon chakreborty Roll no-91/CSE/ Reg.no of
Dogaong, Charlie L. BSIT The Department of Justice categorizes computer crime in three ways: The computer as a target – attacking the computers of others.
Security Threats Caela Harris. What is a Virus A computer virus or a computer worm is a malicious software program that can self replicate on computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
COMPUTER VIRUSES ….! Presented by: BSCS-I Maheen Zofishan Saba Naz Numan Sheikh Javaria Munawar Aisha Fatima.
Virus Infections By: Lindsay Bowser. Introduction b What is a “virus”? b Brief history of viruses b Different types of infections b How they spread b.
Detected by, M.Nitin kumar ( ) Sagar kumar sahu ( )
BY JENNA SAUDER SLIDE OVERVIEW This presentation will discuss the following This presentation will discuss the following : What a Virus is… How a Virus.
Prepared for: Dr. Mokhairi Mokhtar Prepared by: Ana Syafiqah Binti Zahari Hazira Hamiza
Computer Viruses Author: Alyse Allen.
Computer Virus’s.
Viruses and Other Malicious Content
Chapter 12: Social Implications of IT
Chap 10 Malicious Software.
Malware CJ
Chap 10 Malicious Software.
Presentation transcript:

By Michael Carlisle CpSc 420 December 6, 2007

Worms – A Definition!  Worm – a program that copies itself from one computer to another.

Common Terms  Payload – the code’s harmful results. Example – Nyxem worm – targets files with commonly used extensions ○ ZIP, DOC, PDF, PPT, XLS … ○ Replaces data in those files with the text “DATA Error [47 0F F4 F5]” Example – Melissa.U – deletes critical files on Windows computers. ○ Command.com, IO.sys, Ntdetect.com, Suhdlog.dat

Common Terms (cont.)  Mitigation – make something less severe, or to eliminate possiblity of adverse action Many types ○ Patches ○ Updates  Propagation – spreading or self- replication of a worm.

Good Worms?!?  Xerox PARC – created in the late 1970’s Designed to find idle processors on a network Once found, helped to share processing and improve CPU cycle use efficiency  Welchia (Nachia) Downloaded patches and updates from Microsoft Found the vulnerability it used and patched it Many considered this a malicious worm ○ Created a lot of traffic ○ Rebooted computers

Malicious Intent  Melissa – macro virus Attacked Outlook and Word Distributed by an infected attachment Sends infected file to first fifty addresses encountered modified Word documents by adding a quote from “The Simpsons” Damage – 300 – 600 million dollars!

Malicious Intent  ILOVEYOU VBscript appeared as attachment (LOVE-LETTER-FOR-YOU.TXT.vbs) Overwrote music and image files with copy of itself Damage – 10 to 15 billion dollars!

Malicious Intent  Mydoom – one of the fastest spreading worms ever Transmitted by Finds local files – address book Finds folders entitled “shared folder” to spread via file sharing networks Supposedly responsible for… ○ Decrease 10% in global Internet performance ○ 50% decrease Web load times

ILOVEYOU Worm  Searches Microsoft Outlook address book and retrieves all addresses  No limit in number of recipients  Social engineering – s addressed with subject “ILOVEYOU”  Works only with systems that have WSH (windows scripting host) installed  Copies itself to 2 directories Main windows directory ○ File named Win32DLL.vbs System directory ○ File named MSKernel32.vbs  Modifies Windows Registry to make sure it runs during every boot  Overwrites music and image files and copies itself… adds.vbs extension  Searches for mIRC Tries to send html file across IRC channels File has prompt to download an ActiveX control

ILOVEYOU Worm (cont.) HTML file sent through IRC

Preventative Measures  Education, Education, Education! User’s need to be aware of common worm tactics (social engineering)  Updates Make sure software is updated regularly IMPORTANT – OS updates regularly!  Patches

Any Questions?

References  Bezroukov, Dr. Nikolai. “Melissa Worm/Virus – a Worm Parasiting on Ms Office 97 Architectural Problems and Ms Word Users’ ignorance.” 6 March December  “Computer Worm”. Wikipedia, The Free Encyclopedia. 7 November December  “ILOVEYOU”. Wikipedia, The Free Encyclopedia. 30 November December  Kehoe, Brendan. “Zen and the Art of the Internet.” November  Landesman, Mary. “Nyxem aka Blackmal Worm.” 29 November  “Melissa Worm.” Wikipedia, The Free Encyclopedia. 7 November December  “Mitigation.” The Free Dictionary. Farlex. 30 November  “Morris Worm.” Wikipedia, The Free Encyclopedia. 28 November Wikimedia Foundation. 1 December  Seeley, Donn. “The Internet Worm of 1988.” 27 November  “VBS.ILoveYou.A”. CA. 11 October,  “Welchia”. Wikipedia, The Free Encyclopedia. 7 November December 2007.