28
Thou Shalt Not” Thou Shalt Not” The Moses Guide to Internet The Moses Guide to Internet Security Security By Devin Christensen

Thou shalt not

Embed Size (px)

DESCRIPTION

Old Testament-style Exhortation about malware and viruses.

Citation preview

Page 1: Thou shalt not

““Thou Shalt Not”Thou Shalt Not”

The Moses Guide to Internet The Moses Guide to Internet SecuritySecurity

By Devin Christensen

Page 2: Thou shalt not

TSN Install Spyware!TSN Install Spyware!

• “According to a new report from EarthLink and Webroot Software, there's an average of almost 28 spyware programs running on each computer. More serious, Trojan horse or system monitoring programs were found on more than 30 percent of all systems scanned, raising fears of identity theft.

• “The report presents the results of scans of over 1 million Internet-connected computers. Many of the 29 million spyware programs that were found were harmless "adware" programs that display advertising banners or track Web surfing behaviors. However, the companies also found more than 300,000 instances of programs that are capable of stealing personal information or providing unauthorized access to computers, the companies say.”—Paul Roberts (PCWorld)

Page 3: Thou shalt not

Spyware Attack VectorsSpyware Attack Vectors

"I LOVE GATOR!

It is the GREATEST!I love how it remembers and fills in all of my passwords at

the various websites that I visit. And of course I also love how it fills in the forms for me. I also love GATOR because it is very easy to use. I learned how to use it in seconds. GATOR RULES!"

Thanks,DFLas Vegas, Nevada

Page 4: Thou shalt not

What Else Does Gator Do?What Else Does Gator Do?

• Gator (iegator.dll and others) Gator is the main software, which autocompletes Web forms [which is

completely unnecessary]... • OfferCompanion This is the advertising spyware module. It is responsible for spying on your

Web browsing habits, downloading and displaying pop-up ads, and transmitting (personal?) information to Gator.

• Trickler (fsg.exe, fsg-ag.exe, fsg*.exe) Trickler is an "install stub", a small program that is installed with the

application you really wanted. (Gator almost always appears on your system due to installing OTHER software, and not the installer available from Gator's website.) When installed, Trickler inserts a Run key in your Registry so that it is silently and automatically loaded every time you start your computer. Trickler runs hidden and very slowly downloads the rest of Gator/OfferCompanion onto your system. It is suggested that this "trickling" activity is intended to slip under the user's radar, the steady, low usage of bandwidth going unnoticed (cexx.org).

Page 5: Thou shalt not

Attack Vectors [cont]Attack Vectors [cont]

Antivirus company Symantec last week reported the presence of "spyware" bundled with Grokster and Limewire, two popular file-swapping downloads. The code evidently does not damage computers, but it surreptitiously sends personal information such as user ID names and the Internet address of computers to another Web address.

Advertising software called "Clicktilluwin" that comes bundled with the file-swapping programs carries a program called "W32.DIDer," which Symantec has classified as a Trojan horse--a piece of code that takes over parts of a person's computer unseen in order to carry out its own instructions. (news.com)

Page 6: Thou shalt not

Attack Vectors [cont]Attack Vectors [cont]From: Unsuspecting Person [[email protected]]RE: Spyware - Virtual Bouncer - installed on PC as trial -

getting more popup ads than ever - unable to remove software from PC

I mistakenly allowed spyware/virtual bouncer to install its software on my computer on a trial basis to remove popup ads and detect parasites. Before the trial was over, I seemed to be get more popup ads than ever...I decided not to purchase the software.

Despite numerous attempts to remove the software from my computer, it finds its way back when I log on to my computer, reminding me to register and purchase the software. It's now acting like a parasite that I was trying to remove!!!!

I've contacted the computer [company] several times but no one there has offered any real solution to address my issue.

Page 7: Thou shalt not

So... What To Do So... What To Do (Preemptive)?(Preemptive)?

1. Cultivate an attitude of distrust!2. Know that Nothing is Free!3. Unless you’re willing to read the

entire license agreement very carefully, Do Not Install Freeware!

4. Beware of the peer-to-peer services. They’ve got to make $$ somehow!

Page 8: Thou shalt not

What do I do?What do I do?

Page 9: Thou shalt not

What do I do?What do I do?

Page 10: Thou shalt not

I Failed to “Shalt Notted”I Failed to “Shalt Notted”

What do I do Now?1. Blood Sacrifice is still probably avoidable…2. Start | All Programs (XP) or Programs (Win2k)|

Spybot Search & Destroy.3. If this does not exist, double-click on My

Computer & navigate to T:\Spybot\spybotsd1.3.exe. Follow the prompts to install Spybot.

Page 11: Thou shalt not

I Failed to “Shalt I Failed to “Shalt Notted”[cont]!Notted”[cont]!

4. Update Spybot by clicking on ‘Search For Updates’:

Page 12: Thou shalt not

I Failed to “Shalt I Failed to “Shalt Notted”[cont]!Notted”[cont]!

5. Now ‘Check for problems’. [Note: This can take a while as there are about 17,000 bad boys out there now...]

Page 13: Thou shalt not

I’ve Got 65 Problems!I’ve Got 65 Problems!

Page 14: Thou shalt not

I Failed to “Shalt I Failed to “Shalt Notted”[cont]!Notted”[cont]!

5. Now ‘Fix Selected Problems’. [Note: This might render some of your ‘freeware’ inoperable...]

6. If some of the malware is ‘resident’ in your operating system’s memory (i.e., it is running at the time), Spybot will not be able to fix this issue, and you may continue to get popups and general system instability.

7. For this you will need to call me.

Page 15: Thou shalt not

ConclusionConclusion

• Freeware is seldom Free (unless you are using Linux...)

• If it is not worth it to you to read the entire license agreement (maybe 10-15 minutes), it is definitely not worth my 60+ minutes trying to get all the spyware off afterwards!

• If you wish to install something, call me first and I will check it out!

• Otherwise, Choose X or No or Cancel!• And if you don’t, yes, odds are we will remain

friends afterward...

Page 16: Thou shalt not

TSN Execute Viruses!TSN Execute Viruses!• Mass Emailing Viruses & Hoaxes

• File Sharing Programs

Page 17: Thou shalt not

Mailing TacticsMailing Tactics

• Interesting Attachments– AnnaKournikova.jpg.vbs

• Interesting Subjects– New bonus in your cash account – [Fwd: look] ;-)

• Good Samaritan Abuse– Please Help me with Script!!– Leukemia: Please Forward

Page 18: Thou shalt not

Mailing Tactics [Cont]Mailing Tactics [Cont]

• Panic AttackIMPORTANT, URGENT - ALL SEEING EYE VIRUS!

PASS THIS ON TO ANYONE YOU HAVE AN E-MAIL ADDRESS FOR. If you receive an email titled "We Are Watching You!" DO NOT OPEN IT! It will erase everything on your hard drive. This information was announced yesterday morning from IBM, FBI and Microsoft states that this is a very dangerous and malicious virus, much worse than the "I Love You," virus and that there is NO remedy for it at this time.

Page 19: Thou shalt not

FileSharing TacticsFileSharing Tactics

– C:\Program Files\KaZaA\My Shared Folder

– C:\Program Files\ICQ\shared files\ – C:\Program Files\Edonkey2000\

Incoming\ – C:\Program Files\Bearshare\Shared\ – C:\Program Files\Morpheus\My Shared

Folder\ – C:\Program Files\Grokster\My Grokster\

Page 20: Thou shalt not

What are they Appealing What are they Appealing To?To?

El Mejor Sexo.pif

KaZaA Antivirus Era 2003.exe UnTouChabLeS KoRn.scr New Morpheus Edition 2003.exe Deftones Live in concert.scr Xbox Emulator V2.1.exe Play2 All Tricks BoX.pif Gatorade Screen Saver.scr THE EMINEM SHOW.pif

Page 21: Thou shalt not

And What Else Do They And What Else Do They Do...Do...

1. Scan your entire hard drive and any network drives for email addresses

2. Intentionally corrupt common document types (Excel, Word, etc.).

3. Disable virus protection & prevent liveupdates.

4. Disable Personal Firewalls5. Copy themselves all over your hard drive.6. Render an operating system unusable.

Page 22: Thou shalt not

So What Do We Do?So What Do We Do?

• First, Be Aware of What I do:– Every Night at 11:00 PM I have a server

go out & get the latest virus updates. Every machine in the building will get these definitions within the hour.

– The Bottom Line: Your Protection is Current!

– If a really bad virus appears on the radar screen, I will send out an alert email.

Page 23: Thou shalt not

Nonetheless...Nonetheless...

Inevitably there will be a gap between the creation of a virus, its identification when out in the wild,

and the creation of a filter to detect it.• Therefore, se precisa que:

– Never (and Never does mean Never) open an attachment unless you are explicitly expecting the exact attachment from the exact individual who has sent it to you. *And the Extension (.pdf, .xls, .doc) must match the kind of file you are expecting!

Page 24: Thou shalt not

Nonetheless [continued]...Nonetheless [continued]...• Se precisa que: [cont]

– We never open ANY attachment that ends in:• .com• .exe• .pif• .vbs• .scr

– In our own emails we explicitly identify the attachment we are intentionally sending (i.e., “I have attached an excel/word/pdf document detailing...”). This is known as “good netiquette”.

Page 25: Thou shalt not

Nonetheless [continued]...Nonetheless [continued]...• Also, though this is lamentable, our

instinct must be one of distrust!• “Unless it is a Known Good, it must be

considered to be bad.”• Distrust all executables.• Be aware that all filesharing services are

delivery mechanisms for many modern viruses.

Page 26: Thou shalt not

ConclusionConclusion

• Never open the unknown attachment, even when it is coming from an associate.

• Do not forward the hoax (they always ask you to do just this!). If forward you must, forward it to me first!!

• All executables (.exe, .com, .pif, .vbs) are to be distrusted! Absolutely!

Page 27: Thou shalt not

Various “Shalts”Various “Shalts”

• TS Save onto the “S” Drive.• TS keep critical data in more than one place

(particularly if one of the places is a floppy, or, worse yet, a zip disk).

• TS “stop” USB flash drives before removing them.

• TS Lock your computer when you leave it for prolonged amounts of time [ctrl-alt-del | enter].

Page 28: Thou shalt not

Any Q’s?Any Q’s?