150 likes | 430 Views
Spyware, Adware, and Browser Hijacking. Agenda. What is Spyware? What is Adware? What is Browser Hijacking? Security concerns and risks Prevention, detection, and recovery Lab discussion. Spyware. A program that secretly monitors your actions
E N D
Agenda • What is Spyware? • What is Adware? • What is Browser Hijacking? • Security concerns and risks • Prevention, detection, and recovery • Lab discussion ECE 4112
Spyware • A program that secretly monitors your actions • Technology that collects information about a person or organization without their knowledge • Most spyware is focused on vulnerabilities in Microsoft applications (Internet Explorer) ECE 4112
How is Spyware spread? • Viruses can place spyware in a computer • Installation of new program • Web browsing • Cookies are considered by some to be a form of spyware • Deceptive pop-up windows ECE 4112
Adware • Application used to display advertisements to computer users • Many adware programs contain spyware to track and target users • Generally spread through freeware programs funded by advertising • Examples: AIM, Hotmail, WeatherBug ECE 4112
Browser Hijacking • Covers a range of malicious software used to manipulate web browser software • Generally the settings of your web browser are modified • change your home page • add new sites to your favorites • Prevent access to certain website • Disable anti-virus and anti-spyware software ECE 4112
Gator Ad Insertion Network (GAIN) • The widest spread form of adware • “free programs” install different variants of this ad serving software • These advertisements provide revenue for the company called Claria • Claria is just the latest name change for this extremely hated company ECE 4112
Symptoms • Computer seems to have a mind of its own • Computer is running slower • Hard drive is spinning even when system is not in use • Other changes are noticeable that users did not make • Annoying advertisements • Notice when pop-ups occur (online or offline) ECE 4112
Prevention • Use secure browser and application settings • Correctly setup ActiveX components • Be careful of what you download • Close suspicious pop-ups and programs correctly • Avoid file sharing applications • Use pop-up blockers and spyware prevention applications • Firewalls ECE 4112
Detection and Removal • Easiest method is with spyware scanning and removal tools • Spybot S&D • Ad-aware • HiJack This • Manual removal • Editing the registry • Add/Remove programs • Removal from a clean environment • Bart PE ECE 4112
Anti-Spyware Software • Scans the local storage devices for known spyware and adware definitions • Allows users to quarantine and then remove any detected files • Different types of anti-spyware software focus in on different areas of vulnerabilities • Spybot S&D, Ad-aware, and HiJack This are some of the more popular anti-spyware software ECE 4112
Bart PE (Preinstalled Environment) • Bart’s Bootable Windows CD used for various maintenance tasks • Provides a complete Win32 environment to work from • Graphical Interface • File system support • Network Support • Excellent in assisting with recovery and scanning of systems ECE 4112
Lab Outline • Introduce spyware into your system • Perform various scans and recovery exercises using different methods • Automated removal through anti-spyware software • Manual removal – registry editing, Bart PE • Test some preventive software and techniques • Future additions: Browser Hijacking ECE 4112
Questions? ECE 4112