Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang

advertisement
Malicious Attacks
By Chris Berg-Jones, Ethan Ungchusri,
and Angela Wang
Viruses
• Small amount of code that spreads from one
computer to another
• Usually transmitted through e-mail
attachments
• Execute as part of another program or
attached to a document
• Spreads and infects other programs and
documents
Viruses
• The Melissa virus of 1999 sent out email
attachments to 50 people in the address book,
and it spread so fast that Microsoft and other
companies had to shut down their email
service
• The ILOVEYOU virus in 2000 took a similar
approach, and sent out email attachments to
all contacts of infected users
Trojans
• Don’t self-replicate or spread to other
computers
• Called Trojans because they are disguised as
legitimate software
• Once a trojan horse is opened, the hacker can
remotely access the computer
– Keyloggers
– corrupt files
– steal data, etc
Worms
• Have the ability to copy themselves to other
computers over a network that they are on
• Do not have to be attached to a file or
program
• The worm called “storm” appeared in 2007
and has infected at least 5 million computers,
adding them to a ‘botnet’ which runs software
in the background over a peer to peer
network
Phising
What is phising?
• Phishing is the criminally fraudulent process of
attempting to acquire sensitive information such
as usernames, passwords and credit card details
by masquerading as a trustworthy entity in an
electronic communication.
• Communications purporting to be from popular
social web sites, auction sites, online payment
processors or IT administrators are commonly
used to lure the unsuspecting public.
How does phising work?
• Phishing is typically carried out by email or instant messaging, and it often directs
users to enter details at a fake website
whose look and feel are almost identical to
the legitimate one.
Phising methods
• Filter evasion
– Phishers have used images instead of text to make it
harder for anti-phishing filters to detect text commonly
used in phishing e-mails.
• Website forgery
– An attacker can use flaws in a trusted website's own scripts
against the victim.
• Phone phishing
– Messages that claimed to be from a bank told users to dial
a phone number regarding problems with their bank
accounts. Once the phone number was dialed, prompts
told users to enter their account numbers and PIN.
Damage caused by phising
• Denial of access to email
• Financial loss
• United States businesses lose an estimated 2
billion dollars per year as their clients become
victims.
Why you should watch out
• Social networking sites are now a prime target
of phishing, since the personal details in such
sites can be used in identity theft
• Experiments show a success rate of over 70%
for phishing attacks on social networks.
• Attacker can use the victim's sensitive
information for fraudulent purposes
or spamming.
Malicious Attacks:
Hackers
By: Angela Wang
What is a Hacker Cracker?
• "A person who delights in having an intimate
understanding of the internal workings of a
system, computers and computer networks in
particular."
More on Hackers
• A hacker is a person who breaks into
computers, usually by gaining administrative
controls.
• Not to be confused with the cyber-criminal
hackers known as “crackers”.
History
• Before the internet, there were multiple independent and
parallel networks only partially aware of each other’s
existence.
• They created an ideal information sharing as a practical
strategy among the community
• Software sharing emphasizing the right to “fork”
History cont’
• The earliest networks were found at academic settings such as
college campuses including Carnegie Mellon.
• When the Internet began they evolved into a hacker
community with the rise of the free software movement
•
Much of the hacker community system originated at MIT and
at the Homebrew Computer Club.
What usually happens.
• Hacker scans the Internet for available “ports” (openings in
computer that allows data to pass through a network) on the
Internet.
• Hacker finds an unprotected port and inserts a TROJAN HORSE
virus!!
• Trojan Horse Virus rides along attaching itself to a standard
program.
• Unsuspecting person activates program and the virus
transmits all access and control to the hacker.
To Avoid…being hacked
• Don’t give out passwords or usernames even to
administrators .
• Change your password every once in a while.
• Should obtain a "firewall". A firewall, when combined
with a good anti-virus program, helps stop
unauthorized access on your computer, prevents
virus infection, and "cloaks" your data ports against a
hacker scanning for openings.
Example of recent Hackers
• Google vs. China
• Six students from a prestigious Jiatong
Chinese University hacked into Internet
Explorer 6
• Although it is denied they are working for the
government, there are still strong evidence for
their involvement.
Works Cited
• Marshall, Marshall. "HowStuffWorks "How
Computer Viruses Work"" HowStuffWorks Learn How Everything Works! Web. 14 Jan.
2010.
<http://www.howstuffworks.com/virus.htm>.
• “Trojan horse (computing).” “Wikipedia.”
<http://en.wikipedia.org/wiki/Trojan_horse_(c
omputing)>
Download