Lecture 09 Security
Lecture 09 Security
Birth
Psst!
Self-protection
Pass it on
Your wish is my
Call home
command
Birth
User invites malware onto PC
• Opens infected e-mail attachment
• Surfs infected web sites
• Clicks on link in mail, tweet, text message
• Runs infected app on social networking site
• Plugs in infected USB drive
Self-protection
Malware takes steps to protect itself
• Turn off anti-virus software
• Hide clones in places that users won’t notice
• Block anti-virus sites
• Install rootkit
• Infect common programs: Internet Explorer, Windows
Explorer,
Call home
Malware calls home for guidance
• Disguises the connection as web traffic
• Has internal address book with primary and fallback
addresses
• Reports in frequently, usually several times a day
Your wish is my command
Malware gets instructions from owner
• Download more malware, change own signature
• Send PC information home
• Log and report web sites
• Monitor and steal banking credentials
• Turn on microphone or camera
• Monitor and steal network account credentials
• Whatever the bad guy wants to do
Psst! Pass it on
Malware: the gift that keeps giving
• Sends infected mail from you to addresses found on your PC
From: You@mail.sdsu.edu
To: YourBuddy@uhoh.net
Subject: Check this out!
• Infects writable files on network shares
• Installs itself on removable media
• Scans local network for vulnerable systems
• Scans Internet for vulnerable system
Grayware