Week 02
Week 02
Week 02
• Viruses
• Malicious computer code that reproduces itself on the
same computer
• Virus infection methods
• Appender infection
• Virus appends itself to end of a file
• Moves first three bytes of original file to virus code
• Replaces them with a jump instruction pointing to the
virus code
9
Malware That Spreads (cont’d.)
10
Malware That Spreads (cont’d.)
11
Malware That Spreads (cont’d.)
• Worm
• Malicious program
• Exploits application or operating system vulnerability
• Sends copies of itself to other network devices
• Worms may:
• Consume resources or
• Leave behind a payload to harm infected systems
• Examples of worm actions
• Deleting computer files
• Allowing remote control of a computer by an attacker
12
Malware That Spreads (cont’d.)
13
Malware That Conceals
• Trojans
• Program that does something other than advertised
• Typically executable programs
• Contain hidden code that launches an attack
• Sometimes made to appear as data file
• Example
• User downloads “free calendar program”
• Program scans system for credit card numbers and
passwords
• Transmits information to attacker through network
14
Malware That Conceals (cont’d.)
• Logic bomb
• Computer code that lies dormant
• Triggered by a specific logical event
• Then performs malicious activities
• Difficult to detect before it is triggered
• Backdoor
• Software code that circumvents normal security to give
program access
• Common practice by developers
15
Malware That Profits
16
Malware That Profits (cont’d.)
• Botnets
• Computer is infected with program that allows it to be
remotely controlled by attacker
• Infected computer called a zombie
• Groups of zombie computers together called botnet
• Early botnet attackers used Internet Relay Chat to remotely
control zombies
• HTTP is often used today
17
Malware That Profits (cont’d.)
18
Malware That Profits (cont’d.)
• Spyware
• Software that gathers information without user consent
• Usually used for:
• Advertising
• Collecting personal information
• Changing computer configurations
19
Malware That Profits (cont’d.)
20
Malware That Profits (cont’d.)
• Adware
• Program that delivers advertising content:
• In manner unexpected and unwanted by the user
• Typically displays advertising banners and pop-up ads
• May open new browser windows randomly
• Can also perform tracking of online activities
21
Malware That Profits (cont’d.)
22
Malware That Profits (cont’d.)
• Keyloggers
• Program that captures user’s keystrokes
• Information later retrieved by attacker
• Attacker searches for useful information
• Passwords
• Credit card numbers
• Personal information
23
Malware That Profits (cont’d.)
• Keyloggers (cont’d.)
• Can be a small hardware device
• Inserted between computer keyboard and connector
• Unlikely to be detected
• Attacker physically removes device to collect information
24