290 likes | 603 Views
SPYWARE. Presented by The State Security Office November 17, 2004. We Have Viruses, Worms, Spam . Virus – code inside existing program Worm – independent code that spreads Spam – message broadcast to many email addresses. So What’s Spyware?.
E N D
SPYWARE Presented by The State Security Office November 17, 2004
We Have Viruses, Worms, Spam • Virus – code inside existing program • Worm – independent code that spreads • Spam – message broadcast to many email addresses
So What’s Spyware? • Technology • Gains information about user . . .without their knowledge • Benefits other party, not user
Track Browsing Steal Identity Corrupt Data Create Profiles Slow the Computer Slow the Network Change Homepage Modify Hosts File Download Malware Modify Registry Change Settings Hijack Computer Leak Information Violate HIPPA Spyware Can . . .
Good Cookie Not all Information Gathering is Bad! • Retains sign-on through session • Holds a shopping cart • Allows purchases • Gets correct delivery address • Holds the user’s place
Bad Cookie Some Information Gathering is Very Bad • Gets more than you intend to give • Holds it longer than you want • Shares it with others
Kinds of Spyware • Adware – • Annoyance or • Serious problem • System Monitors – • Monitors activity • Reports to others • Trojan Horses • Innocent looking program • Causes harm
$pyware Why do we have Spyware infections? $$$$ MONEY $$$$$ “I’m your bank,give me your account number . . .” “Okay, it’s 4323409857. . . anything else you want?”
$$ Motivation $$ • Target advertising • Aggressive advertising • Advertisers pay to piggyback • Sell bogus products • Credit cards, passwords, account numbers • Get private business information • Extortion
How? People Open Doors . . . F for User Awareness . . . • Fall for ploys (phishing) • Fail to keep software updated • Fail to keep security settings reasonable • Fail to use spyware protection
Doors Users Open #1 is P2P File Sharing • Software vulnerabilities • Weak privacy settings • Intentional downloads • Bad Internet neighborhoods • End User License Agreements • Clicking on pop-up advertisements • Phishing
Sneaky Ways In • Cookies • Unintentional downloads • Drive-by downloads • Piggybacking on legitimate downloads • Disguised anti-spyware • Disguised anti-porn • Associated with trusted products
Prevention People Tools Policy
People • Awareness • Reactions to social engineering ploys • Don’t click on links in pop-ups • Don’t believe spam reports • Extreme caution when loading software • Know how to recognize problems • Know how to use the tools • Understand the policies
Tools • Choose good software tools • Keep the products updated • Use them regularly • Know about good resources • Take advantage of the P3P standard
Policy • Product updates • Restrict or forbid dangerous practices • P2P file sharing • Public instant messaging • Unapproved software installation • Use appropriate settings • Consider notebook and home systems • Report problems promptly
Legislation • State and Federal • Much is already illegal • Legislation may not help much
Use good tools Inoculate Update weekly Scan weekly Detection Symptoms: Slow computer, lots of pop-ups,browser hijacking
Removal Remove bad files Remove copies of files! Reverse host file changes Reverse browser changes Reverse registry settings Good tools and/or Experienced Help
Resources • The State Security Office • http://www.cio.arkansas.gov/security • Spyware Warrior • http://www.spywarewarrior.com • Spybot Search and Destroy • http://spybot.safer-networking.de/en • Ad-Aware • http://www.lavasoft.de
Ad-Aware Can I use Ad-Aware Personal (free) version at work? No, Ad-Aware Personal is free for individual use only. For profit business entities, governmental entities, or educational institutions, must purchase a valid end-user license in order to use the software. Lavasoft FAQ, http://www.lavasoft.de/, November 16, 2004
Spyware Warriors Real Spyware . . . Real Spyware Warriors . . . Their Stories Tim Stoddard, UALR Sky Brower, PC Assistance