Security and Protection CS 110 Fall 2005

advertisement

Security and Protection

CS 110

Fall 2005

Adware

Viruses

Worms

Review

Review

Email Spoofing

• falsified sender

Email Phishing

• obfuscate HTML to trick you into submitting private info through deceptive web pages

Review

Openness in desktop computers

• You permit lots of programs to read/write data to your hard drive and memory

• Computer “listens” for packets on many ports of its internet connection

 http, itunes, email, IM, homeDir, …

Programs that monitor the ports for packets are supposed to be failsafe

Flaws are discovered and exploited

November 8, 2005

Three image-rendering flaws in the

Windows OS could put millions of

Internet-connected users at risk of

PC takeover attacks.

The flaws could be exploited by any software that displays images, including … Outlook, Word, and

Internet Explorer.

http://www.eweek.com/article2/0,1895,1883850,00.asp

November 8, 2005

The bugs are considered particularly dangerous because users could be at risk merely by browsing to a malicious rigged site with rigged image files, or by displaying images in the preview pane of an e-mail program

November 8, 2005

Any program that renders WMF or EMF images on the affected systems could be vulnerable to this attack.

An attacker who successfully exploits this vulnerability can take complete control of an affected system

November 8, 2005

The bulletin also addresses two separate unchecked buffers in the way the OS renders WMF and EMF images.

March 29, 2005

A similar flaw was detected

The hackers corrupted the banner images of an advertising company

100s of sites used those banners

Microsoft took 90 days (?) to release a “patch” because of the intricate nature of Windows and the extensive testing required

Today’s News

Detect severity of earth quake in first

1.5 seconds

Send immediate warning to San

Francisco

Automatically stop trains and shut down critical systems to protect them

Would you trust it?

Cookies

Web Bugs

More viruses

Onward

Cookies

Cookies are somewhat controversial

• Websites can used them for legitimate reasons

• They can be used for the wrong reasons

• In any case, they are a fact of life of web browsing

Cookies allow a web-server to:

• Track your visits to the site

• Learn and remember info about you

• Store info on your computer http://vreport.capaho.com/demo.html

What Is a Cookie?

A small piece of information stored by your web-browser on your PC when you visit a site

What’s stored:

• A URL related to the site you visited

• A name/value pair (the information content)

• (Optional) An expiration date

Why is it a “cookie”?

• An old CS term for a chunk of data used obscurely

Reminder: Web Browser and Server Interaction

User types URL or clicks link

Browser sends a get-page request for that URL to web-server

Web-server finds HTML file (and related files)

Web-server sends these back to browser

Browser processes HTML and displays page

Cookies: Web-servers Store

Some Info on your PC

When sending back a page, server also sends a cookie

Your browser stores it on your PC

Later, you visit the same site

• You request a page there and your browser has earlier stored a cookie matching that URL

• Browser sends URL and cookie to web-server

• Web-server processes cookie

May return updated cookies with page

Normally browsing the web is "stateless"

“Stateless” means “no memory”

• Request a page from a server; it sends it

• Later request a 2nd page; the server sends it

• The webserver doesn't remember anything connecting these two requests

But, cookies preserve “state.” Server can connect an early visit with a later visit.

• How? Cookie stored a numeric ID number for you

FYI, a server does “log” requests

• what page, what IP address, when, browser

• But this can’t identify you uniquely

Cookies Can Be Beneficial

Shopping Carts

• Server creates a cart, stored on the server

• You visit other pages, but a cookie lets the server know you’re the person who created that cart

Other personalization

• “Welcome back, Jane Doe!”

• “Items you viewed recently are…”

Recognizing legitimate users for a site

• Register and log-in, but then a cookie means you don’t have to log-in every time

The Darker Side of Cookies

We assume anonymity on the web, right?

Do you want someone knowing what pages you’ve visited?

• Cookies allow a website to track what you visited on that site

• Are they keeping this private? Selling it?

Do you even know they’re tracking your visits?

• What are your rights here?

The Darker Side of Cookies (2)

Personalized ads (e.g. the company

DoubleClick)

• Advertising image on a page is really on another server

• You click on the image on the ad-server

• It builds up a profile about you over time

• Deliver ads you want to see

When used for authorization, are they secure?

You Have Control

You can configure your browser to handle cookies as you want

Cookies: Should You Worry?

Hard to say…

• Some are quite useful. They allow ecommerce!

• Some are sneaky

Some anti-spyware tools remove undesirable cookies (some remove harmless ones)

Where We Are in the Lecture

Email issues

• attachments and email-spoofing

• phishing

Cookies

Web-bugs

Viruses in email

Spyware (including browser hijacks)

What’s a Web Bug?

We know visiting a URL “announces” your presence

If the web page you visit has images, those images can be references to other web pages:

Consider foobar.html at www.foo.com

• foobar.html includes

• <img src=“http://www.virginia.edu/rotunda.gif>

What’s a web bug

Something that makes your machine execute a get-page request for a site you don’t expect

• The server there logs delivery of that image

May be invisible (hard to see a 1x1 pixel … VIEW SOURCE)

Sometimes known as a "clear GIFs",

"1-by-1 GIFs" or "invisible GIFs“ http://www.eff.org/Privacy/Marketing/web_bug.html

Examples (in HTML)

<img src="http://ad.doubleclick.net/ad/pix el.quicken/NEW" width=1 height=1 border=0>

<img width='1' height='1' src="http://www.m0.net/m/logopen

02.asp

? vid=3&catid=370153037&email=SMI

THS%40tiac.net

" alt=" ">

What Info Can Be Gathered?

Again, the server where the bug lives will log:

• The IP address of your computer

• The URL of the page that the Web Bug is located on

• The URL of the Web Bug image

• The time the Web Bug was viewed

• The type of browser that fetched the Web Bug image

Also possible: Info from any cookie that's on your machine

Web Bugs on a Web Page

Using personal info in a cookie, ad companies can track what pages you view over time

• Stores this info in a database

• Later used to target specific banners ads for you

How many people view a website

Web Bugs Used in an Email

Tells if and when a message was read

Links email address with the IP address of machine you read mail on

Within an organization, can tell how often a message is forwarded and read

In spam:

• How many users have seen the spam message

• Allows spammers to detect valid email addresses

Web Bugs: Legal, Ethical?

Controversial! Attempt to monitor you without your knowledge

Legal? Not clearly illegal

They are used on the websites of legitimate companies

Privacy policies for websites generally don't mention these

Web Bugs: What can you do?

You can't easily identify web bugs

New email clients (e.g. Mozilla

Thunderbird) do not display images in email that are links to files on external sites (see next slide)

• (Images embedded as part of email message are OK)

• You can click "Show Images" button

• Also nice not to see some images in spam

Helps to disable and delete cookies

An Email Client Blocks Remote Images

Anonymity

Are you really anonymous surfing the web?

• Someone (corporations and whoever buys their data) is collecting info on your browsing

Do we want:

• Tools to “protect” us from this?

• Laws against it?

• Laws that disclose it’s being done and how the info is used?

• Users to be aware it’s going on? (Yes!)

Where We Are in the Lecture

Email issues

• attachments and email-spoofing

• phishing

Cookies

Web-bugs

Viruses in email

Spyware (including browser hijacks)

Anatomy of a virus

How you can be infected

• By just reading email when… you do not keep your software updated!

Links in E-mail

The “data format” of Web pages is HTML

• Controls the formatting of a Web page

• Also supports hyperlinks to other pages

• It’s nice when e-mail has this format, right?

A danger:

• Some links can cause a program to run.

• Some download files that run on your system.

An attacker can disguise a link so it looks harmless (but…)

Virus through a Link in an

Email

Link seems to be to CS dept. (www.cs.virginia.edu)

That’s the text of the link

• It links to someplace else

• An attachment that is disguised so it doesn’t appear

• The small box is the only clue

How Can This Virus Get

Triggered?

Click the link, and it tries to display the hidden attachment

• Only in some email clients, i.e. older versions of Outlook

• Note: This vulnerability has been known!

Patches available through Windows

Update!

Click and… Congratulations!

• You’re now infected with a version of the

Netsky virus!

What’s Netsky Do?

A mass-mailing worm

• Harvests email addresses from files on your PC

• Comes with its own mail-server component

• Now a server on your machine that uses the

SMTP protocol to send copies of the virus directly to others!

You’re infected and contagious

• You’ll be very popular with your friends and other email contacts!

• But they should have been running antivirus software, and should have kept their systems updated.

• (Like you should have been.)

Lessons

Use Windows Update to keep your system updated

• AKA keep it “patched”

You might consider using software that is not the major target of virus writers

• Other operating systems (Mac OS, Linux)

• Other email clients, other browsers

And definitely install and run anti-virus software (next slide)

Solutions

Antivirus Software

• Can scan your system: find and remove problems

• Usually only viruses. Sometimes spyware too.

• Also, most have real-time protection

Checks e-mail as your read it, as you send it

Checks files as you download them

• Note: Free for UVa users (see later slide)

Important: run “update” on these to get updated virus definitions

Where We Are in the Lecture

Email issues

• attachments and email-spoofing

• phishing

Cookies

Web-bugs

Viruses in email

Spyware (including browser hijacks)

Browser Hijack

An extremely nasty adware

Resets homepage to a particular site

• Ads, porn – something you don’t want

• Any change you make doesn’t affect it

Software running on your machine

• Does the usual adware/spyware stuff

• Also changes your browser settings

• Runs when system starts – changes the settings back

Spyware is a Common

Problem!

Recall earlier study of users:

80% had spyware on their PCs

(What about you?)

Solutions

Anti-spyware software

• Scans your system, removes problems

• Some have real-time protection, most don’t.

Important (again): run “update” on these to get most recent spyware definitions

Another option: Security Suites ($60-$70)

• Include antivirus, maybe anti-spyware software

• Also includes a firewall

• May include spam filtering, parental control

Getting Software at UVa

ITC Downloads: http://www.itc.virginia.edu

• Norton Antivirus

• SpySweeper (up to 3 machines)

• Free for UVa users!

This is a wonderful deal for students and staff.

Don’t be foolish! Please go install these!

• And keep things updated. Practice good habits.

Anti-Virus SW For Your

Non-UVa Friends

Free anti-virus software through websites

• http://housecall.trendmicro.com/

• http://www.pandasoftware.com/activescan/

• These two reviewed recommended by reliable magazines

These run their program on your PC from their website

• Scans your system and identifies problem

Does not include real-time protection

Anti-Spyware SW For Your

Non-UVa Friends

Good free utilities to find and remove spyware

• Lavasoft Adware: http://www.lavasoftusa.com/

• Spybot Search & Destroy: http://www.spybot.info

Download, install, and run periodically

Updates:

• Must get updates of definitions for Antivirus and spyware removal tools

• Often free: use update facility in the tool

SpySweeper in Action

Scanning Your PC

Removing What It Found

The Results

Everything That Looks Like Spyware

Removal Is

Not

Spyware Removal

•Email arrives with animated GIF file.

• Click on OK – you’re really clicking on the web-link associated with that image. Uh oh.

Final Words

Cookies and web bugs raise privacy issues

Malware: it’s a nasty world out there!

Protect yourself with:

• Understanding

• Tools (anti-virus SW, anti-spyware SW)

Practice good habits:

• Be suspicious and cautious

• Install, run, and update tools

• Keep your operating system updated

Download