Phishing with Worms Twenty Years of Digital Threats—What Have We Learned and Where Are We Now?

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Primary Threats to Computer Security
Thank you to IT Training at Indiana University Computer Malware.
SECURITY CHECK Protecting Your System and Yourself Source:
7 Effective Habits when using the Internet Philip O’Kane 1.
Warren Toomey North Coast TAFE Port Macquarie campus
Starting up a Security Class for Students Created by: Beth Byrnes Larry James Zac Reimer For Information Services University of Nebraska-Lincoln.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
By Joshua T. I. Towers $13.3 billion was the direct cost of malware for business in 2006 “direct costs are defined as labor costs to analyze, repair.
Protecting Yourself Online. VIRUSES, TROJANS, & WORMS Computer viruses are the "common cold" of modern technology. One in every 200 containing.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Computer Security Fundamentals by Chuck Easttom Chapter 5 Malware.
Use computer and internet safely Dave Dai Computer security Malware Virus: a program that copies itself and infect a computer without permission.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Computer Viruses By Patsy Speer What is a Virus? Malicious programs that cause damage to your computer, files and information They slow down the internet.
EICAR 2009, 12 May 2009 Checkvir Realtime Anti-Malware Testing and Certification Dr. Ferenc Leitold, Veszprog Ltd.
Chapter Nine Maintaining a Computer Part III: Malware.
Threats and ways you can protect your computer. There are a number of security risks that computer users face, some include; Trojans Conficker worms Key.
Alisha horsfield.  Computer virus is something that copies itself to computer software.  Virus can delete the hosts important documents which includes.
Internet safety By Lydia Snowden.
Security for Seniors SeniorNet Help Desk
MSIT 458 – The Chinchillas. Offense Overview Botnet taxonomies need to be updated constantly in order to remain “complete” and are only as good as their.
Outline  Infections  1) r57 shell  2) rogue software  What Can We Do?  1) Seccheck  2) Virus total  3) Sandbox  Prevention  1) Personal Software.
Viruses.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Staying Safe Online Keep your Information Secure.
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
Spyware and Viruses Group 6 Magen Price, Candice Fitzgerald, & Brittnee Breze.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
MyDoom By: Philippe Bissohong. Background ► MyDoom  Novarg, Mimail.R and Shimgapi ► Computer worm, unlike a virus it attacks a network.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
Return to the PC Security web page Lesson 5: Dealing with Malware.
Computer viruses The effects of a virus are…  Slow loadings  Crashing  Not having control over the computer  Deleting documents.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Malicious Attacks By: Albert, Alex, Andon, Ben, Robert.
DEFINING A VIRUS By saad. Defining a virus A virus is a piece of code or program. A virus is loaded onto the computer and runs without your command All.
Antivirus software.
Computer Skills and Applications Computer Security.
Internet safety By Suman Nazir
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
W elcome to our Presentation. Presentation Topic Virus.
Types of Malware © 2014 Project Lead The Way, Inc.Computer Science and Software Engineering.
Cybersecurity Test Review Introduction to Digital Technology.
Malware Fighting Spyware, Viruses, and Malware Ch 1 -3.
Protecting Your PC. Malware Virus Trojan Spyware Worm Rootkit Browser Hijacker With or Without AV software, ALL computers that have access to the internet.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Computer Security Keeping you and your computer safe in the digital world.
Virus, Spyware & Trojan Removal By 1Akal 1Akal – Technology Services for Home & Business.
Presented by : Matthew Sulkosky COSC 316 (Host Security) BOTNETS A.K.A ZOMBIE COMPUTING.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Botnets A collection of compromised machines
Joseph J. Malone Security for Seniors Joseph J. Malone
Managing Windows Security
Three steps to prevent Malware infection
What they are and how to protect against them
By Quentin Lively Notorious Viruses.
Computer Security Std XI– Chapter 8.
Threat Monitoring Center
Botnets A collection of compromised machines
Malicious Software There are various sources via whom a malicious software can enter a system most common of which is through internet sites not only this.
Teaching Computing to GCSE
Malware CJ
Welcome to Fix Antivirus Activation Error Support Service.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Phishing with Worms Twenty Years of Digital Threats—What Have We Learned and Where Are We Now?

WORMS The worst and the worser

Is it a worm, virus, or trojan? Malware is a general term. Trojans hide as another program.  Trojan disguises itself as another program with value.  Might disguise itself as a free tool for editing photos. Virus hides within another program.  Infected program may or may not still operate after the attack. Worms hide without disguise.  Worm is the entity.  It self-installs.

Back “in the day” Worms travelled by floppy. Transmission rates were slow. Still some worms became widespread.

Assimulation Worm infected machines assemble themselves into collective “botnets” capable of sending spam, and crunching passwords.

The Collectives BotnetCollective Spam rate Name Machines (billions/day)‏ Conficker20 million 10 Kraken500,000 9 Srizbi450, Bobax185,000 9 Rustock150, Cutwail125, Storm85,000 (peak 1.5 million) 3

What to do with a botnet Spam engine Password/Encryption hacking Bank fraud, identity theft Criminal computing enterprises Decentralized computing Huge bandwidth potential More computing cycles than top ten mainframes

Storm botnet Evades tracking, morphs Takes defensive measures – known to launch denial of service attack against suspected investigators Summer of 2007, Storm forces Estonia “off the web.” Key servers for the baltic nation moved offline for extended period included government, banking, media, and police sites. Once involved 1.5 million computers

Conficker : new guy on the block DateEstimated Infections Dec 1, ,000 Dec 2, 2008less than million Dec 4, million Dec 5, million Jan 17, million Jan 23, million Jan 26, million

Conficker Payload Delivery FlashDrive  Auto run  Default action Autorun / AutoPlay  Hard to turn off  Registry editing Network  Password guessing  Weak passwords

Microsoft's Part Announced a fix in October Apparently not everyone installed the update Malicious Software Removal Tool Worm may block  access to MS Update  antivirus from updates  Windows Defender or turn it off

What does the worm do? We don't know It seems to be waiting for orders

What can you do? Update Windows Regularly Apply MS Disable Autoplay / AutoRun Run the Malicious Software Removal tool available from

You might have conficker if... You cannot connect to websites or online services that contain the following strings: virus spyware malware rootkit defender microsoft symantec norton mcafee trendmicro sophos panda etrust networkassociates computerassociates f- secure kaspersky jotti f-prot nod32 eset grisoft drweb centralcommand ahnlab esafe avast avira quickheal comodo clamav ewido fortinet gdata hacksoft hauri ikarus k7computing norman pctools prevx rising securecomputing sunbelt emsisoft arcabit cpsecure spamhaus castlecops threatexpert wilderssecurity windowsupdate

You might have conficker if... The following services are disabled or fail to run: Windows Security Center Service Windows Update Auto Update Service Background Intelligence Transfer Service Windows Defender Error Reporting Service Windows Error Reporting Service