Viruses, Hacking, and Anti

advertisement
Viruses, Hacking, and AntiVirus
What is a Virus?
• A type of Malware
– Malware is short for malicious software
• A virus – a computer program
– Can replicate itself
– Spread from one computer to another
First Viruses
• Creeper Virus detected on ARPANET
• Would display “I'm the creeper, catch me if
you can!“
• “Elk Cloner” – attach to Apple DOS 3.3 OS and
spread via floppy disk
Types of Viruses
• Viruses that infects popularly traded software
• Macro Viruses: written in scripting languages
for Microsoft programs such as Word and
Excel
• Viruses in Executables
How Your Computer Gets Infected
•
•
•
•
•
•
•
Binary Executable files (DLL’s, EXE’s)
An external, physical device
General Purpose Script files
System Specific Autorun Script files
Documents that contain Macros
Exploitable bugs in a program
Links to malicious code in PDFs, HTML, other
documents
An Example
• A file could be named “picture.png.exe”
• When opened, the program runs and infects
computer
• Spoofing an email address to make it sound
legitimate so you’ll download and open an
attachment
Malware
• Includes viruses, worms, trojan horses,
spyware, adware
Purpose of Malware
• Used to steal personal, financial, or business
information
• Destroy data
• Hijacking computers for various purposes
Cookies
• Cookies are small files deposited on a system
during a web site visit
• Can be useful:
– Allows web servers to maintain state (position and
information) of a session with a user
– Can keep track of your login information, shopping
cart, etc.
• May be harmful
– Allows web sites to track information unbeknownst to
user
– Source of data for Pop-ups
Worms
• Worms are similar to viruses in the way they
are spread
• Doesn’t need user action to spread
• Actively transmits itself over networks to
infect other computers
Trojan Horses
• A program that looks like a harmless program
but contains malicious code
• Used to install other malware such as
backdoors or spyware
Rootkits
• Rootkits: modify OS so malware is hidden
• “Each ghost-job would detect the fact that the
other had been killed, and would start a new
copy of the recently stopped program within a
few milliseconds. The only way to kill both
ghosts was to kill them simultaneously (very
difficult) or to deliberately crash the system.”
Backdoors
• A way to bypass normal authentication
procedures
• Example: a hard coded user and password
that gives access to a system or computer
• Easter Eggs
• Many viruses and worms attempt to create
backdoors for more viruses
Spyware
• Software that monitors and gathers information
about your system or computing
• Can collect personal information, Internet surfing
habits, user logins, bank or credit account
information
• Can change computer settings
• Keyloggers – collects information about what you
type
• Port Sniffers – intercept and log data sent over a
network
Port Scanners and Sniffers
• Port Sniffers – intercept and log data sent over
a network
• Port Scanner – software that probes a server
or computer network for
open ports. Use ports
to access network.
Bots and Botting
• Programs that take control of a computers normal
operation, or operate in stealth mode on a computer
• Can be used to disrupt normal operations
• Can turn a user’s computer into a source of malware
attacks on others
(Email Spamming)
Adware
• Advertising-supported software: automatically
renders unwanted advertisements
• Object is to generate revenue for its author
Non-Malware, Active Threats
• Phishing – Posing as a trustworthy entity to
acquire information
• Fake websites
• Email Spoofing
Non-Malware, Active Threats
• (Distributed) Denial of Service, AKA DDOS
attack
• Flooding a web server with spurious traffic
generated to overwhelm the server’s
capabilities thus denying legitimate users or
exposing system flaws
• Related to Botting
Scareware
• Holds your PC hostage
Hacking
USES ALL OF THE ABOVE
Not this:
http://www.youtube.com/watch?v=u8qgehH3kEQ
Additional Hacking
• Password Cracking
• Software bugs: buffer-overrun, SQL Injections
• http://hackertyper.com/
• http://en.wikipedia.org/wiki/Stuxnet
Protecting Your Computer
Signs Your Computer May Be Hacked
• Your computer is running slow
• Processes you don’t recognize are running
• You are asked for personal information via
email, or by phone
• You see data or programs disappear or change
• A Pop-up says your machine is infected and
you need to scan it right now – and it is not
the security software you installed
Anti-Spyware
• When a large number of pieces of spyware
have infected a Windows computer, the only
remedy may involve backing up user data, and
fully reinstalling the OS.
1. Scans incoming network data for spyware
2. Detects and removes spyware
Firewalls
• Similar to Anti-Spyware but controls all
incoming and outgoing traffic and what should
and shouldn’t be allowed in and out
Anti-Virus
Pros:
• Prevents, detects and removes malware
Cons:
• False Positives, False Negatives
• Slows down your computer
Be Smart!
• Don’t open emails that you don’t recognize
• Don’t download attachments you don’t
recognize
• Don’t run programs or install applications you
don’t know or trust
Personal Checklist
Passwords are set, sufficiently complex, and not shared
Legitimate Anti-Malware software running
Home wireless network protected by WPA
Firewall software running
Browser settings appropriate
Sensitive files are protected - password and encrypted
Smartphone protected – locate, lock, wipe
Software is kept up to date
I'm being cautious:
- Which web sites I visit
- When I open emails
- Where I leave my laptop, smartphone, USB drive
- When asked for information via email, internet, phone
- When I use public wireless networks
- When I download applications
Some Anti-Virus Software
• http://anti-virus-softwarereview.toptenreviews.com/
• http://www.techsupportalert.com/best-freeanti-virus-software.htm
Some Anti-Virus Software
•
•
•
•
Avast!: http://www.avast.com/en-us/index
Avira: http://www.avira.com/en/index
AVG: http://www.avg.com/us-en/homepage
Microsoft Security Essentials:
http://windows.microsoft.com/enUS/windows/security-essentials-download
• MalwareBytes:
http://www.malwarebytes.org/
Download