4 - Internet Threats
4 - Internet Threats
Internet Threats
Motivation:
What do you think when you hear the word “internet threat”?
Spam
Definition
o Unsolicited digital communication that gets sent out in bulk
Often an email
o Unwanted emails mostly from bots or advertisements
o This can be used to send malware
Types of Spam
o Phishing emails
o Malspam
o Malicious botnets
Effects of Spam
o Makes the computer vulnerable to malware, if spam is not ignored
o Spam blocks communication channels and creates traffic
o Inconvenience / nuisance to customers / recipients
Phishing Emails
o Tricks victims into giving up sensitive information
Examples: website login information (username, password), credit card information,
answers to security questions, etc.
o Utilizes social engineering
Also known as human hacking
Psychological manipulation of people with the goal of divulging pertinent information
Usually creates and curates a scenario that would exploit human weaknesses with a
degree of urgency
o Utilizes email spoofing
Mimic or spoof an email from a legitimate sender
Usually demands some sort of action
Well executed spoofs will contain familiar branding and content, and sounds urgent or
threatening
Page 1 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Page 2 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Malware
Definition
o Short for “Malicious Software”
o Can be used to:
Cause harm to the computer Bypass access controls
Compromise computer functions Steal data and personal information
Types of Malware
o Adware o Rootkit
o Malicious bots o Spyware
o Security bugs o Virus
o Ransomware o Worm
Adware
o Advertising supported software
o Displays advertisements on computer devices
o Least dangerous and most lucrative malware
o Examples: pop-up ads on websites, ads on software In many cases, ads may be
within the software itself.
Alternatively, the adware may
encourage the user to install
additional software provided
by third-party sponsors.
Adware programs exist across
all computers devices. Most of
these are perfectly safe and
legitimate, but some might
have dark motives.
Page 3 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Page 4 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Page 5 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Doxware
- Commonly referred to as leakware or extortionware
- Threatens to publish stolen information online if the user does not pay the ransom
- As more people store sensitive files and personal photos on their computers, it’s
understandable that some people panic and pay the ransom when their files have
been hijacked
DDoS attacks
- Rootkits allow the compromised computer to be used as a bot for distributed-denial-of-
service attacks
- The attack would now be traced to the compromised computer and not to the
attacker's system
- These bots are also called as zombie computers and are used as part of bot networks
to launch the DDoS attacks, and other malicious activities such as click fraud and spam
email distribution
o How to Acquire Rootkits
Drive-by downloads: happen when you visit a website and it automatically installs malware
on your computer
Phishing emails
Spam messages with links attached
o Effects of Rootkits
Can compromise computer security making the system vulnerable to attacks
Help cybercriminals hide and protect malwares in the system
o How to Prevent Rootkits
Update computer system and software
Watch out for phishing emails
Be careful of drive-by downloads
Do not just open attachments from suspicious senders
Spyware
o Malicious software designed to gain access to or damage computer devices
Often without the knowledge of the user
o Primarily steals internet usage data and sensitive information
o Types of Spyware
Adware
- Tracks your browser history and downloads
- Intent of predicting what products or services the user is interested in
- Adware displays advertisements for the same or related products or services to entice
the user to click or make a purchase
- Used for marketing purposes and can slow down a computer
Trojan
- Disguises itself as legitimate software
- Example: may appear to be a Java or Flash Player update upon download
- Controlled by third parties
- Can be used to access sensitive information
Tracking cookies
- Track the user’s web activities for marketing purposes
- Examples: searches, browsing history, downloads
System monitors
- Can capture almost everything that the user does on the computer
- Often disguised as freeware
- Examples: keystrokes, emails, chat-room dialogs, websites visited, programs run
o How to Acquire Spyware
Accepting a prompt or pop-up without reading it first
Downloading software from an unreliable source
Opening email attachments from unknown senders
Pirating media such as movies, music, or games
Page 7 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
o Effects of Spyware
Device is slow or crashes unexpectedly
Device is running out of hard drive space
Getting pop-ups when either online or offline
o How to Prevent Spyware
Prevent opening emails from unknown or unverified sources
Do not download files from untrustworthy sources / pirated software
Do not click on pop-up advertisements
Use reputable antivirus software
Virus
o Type of malicious code or program
o Written to alter the way a computer operates
o Designed to spread from one computer to another
o This is designed to spread from host to host and can
replicate itself Onel de Guzman was an IT
o Operates by inserting or attaching itself to a Filipino student who created the
legitimate program or document that supports “I Love You” virus, one of the
macros in order to execute its code most well-known and worst
o Types of Viruses computer viruses of all time. This
virus spread all over other
Boot sector
countries in a span of 5 hours on
- Takes control when you start or boot the
May 5, 2020, attacking tens of
computer millions of Windows PCs.
- One way it can spread is by plugging an
infected flash drive into a computer
Web scripting
- Exploits the code of web browsers and web pages
- If the web page is accessed, then the virus infects the computer
Resident virus
- Any virus that inserts itself in a computer system’s memory
- Can execute anytime when an operating system loads
Direct action
- Runs when a file containing a virus is executed
- Otherwise, it remains dormant
Polymorphic
- Changes its code each time an infected file is executed
- Helps to evade antivirus programs
Page 8 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Worm
o Stand-alone, self-replicating program
o Can spread throughout a network without human assistance
o Does not need to attach itself to a software program in order to cause damage
o How to Acquire Worms
Transmitted via file-sharing networks, information- transport features, and software
vulnerabilities
Clicking links to malicious websites
Could arrive as attachments in spam emails or instant messages
o Effects of Worms
Modify and delete files
Inject additional malicious software onto a computer
Depletes system resources by copying itself over and over
Steal data, install a backdoor, allowing hacker to gain control cover a system
Cause sluggish computer and programs crashing or not running properly
o How to Prevent Worms
Make sure the operating system and applications are up to date
Be extra cautious when opening unsolicited emails
Invest in a strong internet security software solution
References:
Adware Protection for Your Computer. (n.d.). Spam Laws. Retrieved August 13, 2020, from
https://www.spamlaws.com/adware-protect.html
Comodo. (n.d.). Rootkit Definition. Comodo Enterprise. Retrieved August 17, 2020, from
https://enterprise.comodo.com/rootkit-definition/
Kaspersky. (2017, September 5). Web Threats. Usa.Kaspersky.Com.
https://usa.kaspersky.com/resource-center/threats/web
Malwarebytes. (n.d.). What is Spam? Definition & Types of Spam. Retrieved August 18, 2020, from
https://www.malwarebytes.com/spam/
Norton. (n.d.). What Are Bots? Retrieved August 13, 2020, from
https://us.norton.com/internetsecurity-malware-what-are-bots.html
Norton. (n.d.-a). Ransomware is malicious software that can take over your computer. Retrieved
August 17, 2020, from https://us.norton.com/internetsecurity-malware-ransomware-5-dos-and-
donts.html
Norton. (n.d.-c). What is a computer worm and how does it work? Retrieved August 18, 2020, from
https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html
Rootkit: What is a Rootkit? (n.d.). Veracode. Retrieved August 17, 2020, from
https://www.veracode.com/security/rootkit
What’s the Difference between a Virus and a Worm? (n.d.). Www.Kaspersky.Com. Retrieved
August 18, 2020, from https://www.kaspersky.com/resource-center/threats/computer-viruses-vs-
worms
FORMATIVE ASSESSMENT
Page 9 of 10
Empowerment Technologies
Governor Pack Road, Baguio City, Philippines 2600
Tel. Nos.: (+6374) 442-3316, 442-8220; 444-2786;
442-2564; 442-8219; 442-8256; Fax No.: 442-6268 Grade Level/Section: HUMSS 11G & H, STEM 12T
Email: [email protected]; Website: www.uc-bcf.edu.ph
Page 10 of 10