21
1

Malicious software(Malware)

Embed Size (px)

Citation preview

Page 1: Malicious software(Malware)

1

Page 2: Malicious software(Malware)

Malicious Software

PresentedBy

Md Asif Iqbaal Ovee

([email protected])ID: 122-15-1863

Dept. of CSE2

Page 3: Malicious software(Malware)

Malicious Software –“Presentation Outline”• What is malicious software?• Categories of malicious software.• Trapdoor/Backdoor• Logic bomb• Trojan Horse• Virus• Worm• Summery• References.

3

Page 4: Malicious software(Malware)

Malicious Software?Malware software(Malware) is a software that is

included or inserted in a system for harmful purposes.OR

A malware is a set of instruction that run on your computer and make your system do something that an attacker wants it to do.

4

Page 5: Malicious software(Malware)

Taxonomy of Malicious Programs

5

Page 6: Malicious software(Malware)

Backdoor or Trapdoor• Software that allows access to a computer system

bypassing the normal authentication procedures. For example– A special username and password hard-coded into the

login program

• Such backdoors may be inserted by viruses, worms, Trojan horses or spyware.– A service listening on a particular IP port for remote

instructions (e.g., Back Orifice)

6

Page 7: Malicious software(Malware)

Rootkit• After installing the backdoor, the cracker wishes to

avoid being undetected or removed by routine maintainance of the system. For that, she uses a rootkit.

• A rootkit is a set of modified versions of the usual utilities for administering the system, such as:– List all processes (unix: ps)– List logged–in users (unix: w, who)– List files (unix: ls)– Change passwords (unix: passwd)– Logging utilities

7

Page 8: Malicious software(Malware)

Logic Bomb• one of oldest types of malicious software• code embedded in legitimate program• activated when specified conditions met

eg presence/absence of some fileparticular date/timeparticular user

• when triggered typically damage systemmodify/delete files/disks, halt machine, etc

8

Page 9: Malicious software(Malware)

Trojan Horse• program with hidden side-effects • which is usually superficially attractive

eg game, s/w upgrade etc

• when run performs some additional tasks

allows attacker to indirectly gain access they do not have directly

• often used to propagate a virus/worm or install a backdoor• or simply to destroy data

9

Pop-Up Example

Page 10: Malicious software(Malware)

Trojan Horse..• Transmitting medium :

spam or e-maila downloaded filea disk from a trusted sourceA legitimate program with the Trojan inside.

• Trojan looks for your personal information and sends it to the Trojan writer (hacker). It can also allow the hacker to take full control of your system.

10

Page 11: Malicious software(Malware)

Virusespiece of software that infects programs

modifying them to include a copy of the virusso it executes secretly when host program is run

specific to operating system and hardwaretaking advantage of their details and weaknesses

a typical virus goes through phases of:• Dormant phase: idle• Propagation phase• Triggering phase: the virus is activated to:• Execution phase: perform the payload functions

11

Page 12: Malicious software(Malware)

Virus Structurecomponents:

infection mechanism - enables replicationtrigger - event that makes payload activatepayload - what it does, malicious or benign

prepended / postpended / embedded when infected program invoked, executes virus

code then original program codecan block initial infection (difficult)or propogation (with access controls)

12

Page 13: Malicious software(Malware)

1. FILE INFECTORS VIRUSESa. Embedded in programb. Runs when program gets executedc. Loads in memoryd. Cycle continues through sharing file

2. BOOT-SECTOR VIRUSESa. Load viruses into memory b. Infect the boot sector on floppy disks and hard disks

3. MACRO VIRUSESa. Infects data filesb. Executed in embedded scriptsc. Inserts copies of itself into other documentsd. Spreads by sharing data files

13

Classes Of Viruses

Page 14: Malicious software(Malware)

14

Classes Of Viruses…

1. Large size of today's programs (executable)2. Operating systems now protect the boot sector

EXECUTABLE AND BOOT SECTOR VIRUSES ARE NOT VERY THREATENING ANY MORE

Page 15: Malicious software(Malware)

15

E-mail Viruses1.Melissa Virus (March 1999)

a. Embedded into Word documentb. When opened, sent to first 50 email addresses in address bookc. Included a friendly note making it look harmlessd. If opened by any of the recipients, sent to another

50 addresses of the current recipient

2.The ILOVEYOU Virus (May 2000)a. Attachment is a piece of codeb. When executed, sent itself to everyone in the address bookc. Corrupted files

E-mail viruses are the latest invention

Page 16: Malicious software(Malware)

Zombie & Botnet• Secretly takes over another networked computer

by exploiting software flows• Builds the compromised computers into a zombie

network or botnet=> a collection of compromised machines running programs, usually referred to as worms, Trojan horses, or backdoors, under a common command and control infrastructure.

• Uses it to indirectly launch attacks• E.g., DDoS, phishing, spamming, cracking

16

Page 17: Malicious software(Malware)

Worms• A worm is self-replicating software designed to spread through the

network Typically, exploit security flaws in widely used services Can cause enormous damage

Launch DDOS attacks, install bot networks Access sensitive information Cause confusion by corrupting the sensitive information

• Worm vs Virus vs Trojan horse A virus is code embedded in a file or program Viruses and Trojan horses rely on human intervention Worms are self-contained and may spread autonomously

17

Page 18: Malicious software(Malware)

Worms…Means of spreading Infection by Worms :• Infects one system, gain access to trusted host lists on

infected system and spread to other hosts.

• Another method of infection is penetrating a system by guessing passwords.

• By exploiting widely known security holes, in case, password guessing and trusted host accessing fails. e.g., A well-known example of a worm is the ILOVEYOU worm, which invaded millions of computers through e-mail in 2000.

18

Page 19: Malicious software(Malware)

Summery• Knowing the different kinds of attacks • The goals of attackers • Can help you understand how better to defend

yourself.

19

Page 21: Malicious software(Malware)

Thank You Everyone!

21