more malware last class
play

More Malware Last Class Worms: Morris Worm Stuxnet Conficker - PowerPoint PPT Presentation

More Malware Last Class Worms: Morris Worm Stuxnet Conficker Web-based malware: Exploit kits Fake AV Ransomware Today (continuation) How Malware Spreads Adware Computer Virus A type of malicious


  1. More Malware

  2. Last Class • Worms: • Morris Worm • Stuxnet • Conficker • Web-based malware: • Exploit kits • Fake AV • Ransomware

  3. Today • (continuation) How Malware Spreads • Adware

  4. Computer Virus • A type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code. - Wikipedia

  5. Parts of a Virus • Infection vector: How a virus spreads • Trigger: Sets off the malicious functionality • Payload: The malicious functionality

  6. Phases of a Virus Scanning and Propagating Waiting for a trigger Dormant triggered Execute

  7. How do they infect? Malware Executable File

  8. How do they infect? Malware Executable File

  9. How do they infect? Malware Executable File

  10. How do they infect? Executable File Malware

  11. How do they infect? Malware Executable File Malware

  12. How do they infect? Malware

  13. How do they infect? Packer Executable File Malware

  14. How do they execute? Malware Executable File Line of code

  15. How do they execute? Malware Executable File Line of code

  16. Definitions • Self-Modifying code: Code that can change itself (usually without changing the functionality) • Polymorphic malware: Infects others with an encrypted copy of itself. Encryption and code changes. • Backdoor: Malware that leaves hidden ways of replicating itself • Rootkit: Malicious software to maintain access to system; good at hiding itself.

  17. ILOVEYOU • Bug in email: sent out messages subject:ILOVEYOU and attachment:LOVE-LETTER- FOR-YOU.txt.vbs • .vbs files were hidden • Propogation: Sent itself to all addresses in address book • Payload: Overwrote random files

  18. Adware • Software that contains unwanted ads

  19. Types of Ad Fraud • Pretend to be part of the ad chain and buy traffic, get paid. • Have bots, sell fake ad traffic • Disguise source of traffic to ads • Cookie stuffing — fake affiliate cookies • Ad Stacking — show invisible ads to consumer

  20. Adblock Plus • Browser-based Ad blocker • Let in some “acceptible” ads • Is this adware? Fraud?

  21. Fake Software • Stuffing ads into software • Maybe turning paid software into freeware? • Is this adware? fraud?

  22. DNSChanger • Upon infecting your computer, changed your routers’ nameserver settings. • Started in 2006. FBI raided in 2011. Shut down in 2012. Still alive today. • Main changes? Major ad networks • Is this adware? fraud?

  23. My Really Cool Toolbar • Lots of toolbars, other browser extensions • Useful functionality • Changed settings (homepage, etc) • Hard to Remove • Is this adware? fraud?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend