Lecture CH 2 Sec 110
Lecture CH 2 Sec 110
Objectives
Describe the differences between a virus and a worm List the types of malware that conceals its appearance Identify different kinds of malware that is designed for profit Describe the types of social engineering psychological attacks Explain physical social engineering attacks
Security+ Guide to Network Security Fundamentals, Fourth Edition 2
Split infection
Virus splits into several parts Parts placed at random positions in host program Head of virus code starts at beginning of file Gives control to next piece of virus code
5
Viruses are attached to files Viruses are spread by transferring infected files
Macro
Executes a script
Resident
Virus infects files opened by user or operating system
Companion virus
Adds malicious copycat program to operating system
10
Worms may:
Consume resources or Leave behind a payload to harm infected systems
12
14
15
Backdoor
Software code that circumvents normal security to give program access Common practice by developers
Intent is to remove backdoors in final application
Security+ Guide to Network Security Fundamentals, Fourth Edition 16
17
18
Infected computer called a zombie Groups of zombie computers together called botnet
Early botnet attackers used Internet Relay Chat to remotely control zombies
HTTP is often used today
19
Provide means for concealing actions of attacker Can remain active for years Large percentage of zombies are accessible at a given time
Due to growth of always-on Internet services
20
21
22
23
24
Typically displays advertising banners and pop-up ads May open new browser windows randomly Can also perform tracking of online activities
25
26
27
28
29
Psychological approaches
Goal: persuade the victim to provide information or take action Flattery or flirtation Conformity Friendliness
30
31
33
34
Variations of phishing
Pharming
Automatically redirects user to fraudulent Web site
35
Whaling
Going after the big fish Targeting wealthy individuals
37
Variations of legitimate addresses Presence of vendor logos that look legitimate Fake senders address Urgent request
38
Word splitting
Horizontally separating words Can still be read by human eye
Geometric variance
Uses speckling and different colors so no two emails appear to be the same
Security+ Guide to Network Security Fundamentals, Fourth Edition 40
41
Physical procedures
Dumpster diving
Digging through trash to find useful information
Tailgating
Following behind an authorized individual through an access door
42
43
Shoulder surfing
Casually observing user entering keypad code
44
Summary
Malware is software that enters a computer system without the owners knowledge or consent Malware that spreads include computer viruses and worms Malware that conceals include Trojans, rootkits, logic bombs, and backdoors Malware with a profit motive includes botnets, spyware, adware, and keyloggers
45
Summary (contd.)
Social engineering is a means of gathering information for an attack from individuals Types of social engineering approaches include phishing, impersonation, dumpster diving, and tailgating
46