170 likes | 441 Views
Malicious Software. High-tech section of chapter 3. Malicious Software. Application software consists of programs designed to make users more productive and/or assist with personal tasks. Growth of internet simplified the spread of malware
E N D
Malicious Software High-tech section of chapter 3
Malicious Software • Application software consists of programs designed to make users more productive and/or assist with personal tasks. • Growth of internet simplified the spread of malware • Most personal computer are being or have been infected by some malware • Most people think they are safe under the protection of anti-virus software • Malware, short for malicious software or malicious-logic program, consists of programs designed to disrupt computer operation, gather sensitive information, gain unauthorized access to, or even control computer systems remotely. • Virus • Disruption • Trojan • Gather information, gain unauthorized access • Rootkit • Hide other malware so that they are hard to detect even using anti-virus software.
Virus • Computer virus: A program that can replicate itself, conceal itself and deliver the payload. • The payload: destructive event or prank • Some virus has the functionality of mutation.
Virus • How it Spreads
Virus • Execution phases • Infection • Replication • Concealment • Setting up Trigger • Delivery • Deliver the actual activity which may harm the infected computer or just display a prank
Virus • Replication • Hide in one legal file • Macro(a way to create a shortcut for a task) • In macro language of document file: for example, word • Executable file • Change the instructions of an legal executable file • Master boot record • Load itself whenever the computer starts • Once the infected file is executed or opened, the virus copy itself and attach the copies to other legal files in the computer.
Virus • Replication
Virus • Concealment • Hide in fake code sections • Polymorphic virus: Can mutate by changing its own code.
Virus • Setting up trigger • Purpose of virus • Display a prank • Disrupt your hard disk • Cause irregular screen behavior • Disable certain functionalities • And more…. • May do nothing but copying themselves and kept spreading
Virus • Setting up trigger • According to the purpose, the virus will be configured to activate under certain conditions. • Logic Bomb: Activate when virus detects certain condition • Example: If user is logging on, then display a message saying that the users are infected.(prank virus) • Time Bomb: Activate when it is certain time and date. • Example: Ifit is year 2012, then display a message saying that the doom day is coming. • A time bomb is also a logic bomb
Virus • Execution phases • Infection • Replication • Concealment • Setting up Trigger • Delivery • Deliver the actual activity (in the payload) which may harm the infected computer or just display a prank.
Other electronic annoyances • Worm • Resides in active memory and replicates itself over the network to infect machines • Trojan horses • disguise themselves as legal application, however providing unauthorized access or sensitive information to malicious remote users • Rootkit • is a program that easily can hide and allow someone to take full control of your computer from remote location, often for nefarious purposes.
Protect your computer • Symptoms of malware attacks • Computer can’t boot up properly • Screen sometimes freezes • System frequently crashes • Abnormal hard disk activities • Computer runs slower than usual
Protect your computer • Solution • Run a fun disk scan using your anti-virus applications • If nothing was found • Look up the running processes • Ctrl-alt-delete open task manager • Regular process should have a regular name. (afege10x98.exe is obviously a suspicious process) • Look up the registry. (Don’t try if you are not familiar with it)
Protect your computer • Smalltalk: • Why anti-virus sometimes doesn’t work • Anti-virus application provides: • Specialists who are responsible for discovering new malware • For found malware, give it a signature and identify the characteristics of the code it will inject into the infected files. • These signature- characteristics pairs will be stored in the definitions of the anti-virus application. • Users download the definitions to their local machines and go over the files to see if any of them contains the characteristics • Problem: It can only detect known malware, but most of the spreading malware kept unknown!
Conclusions • Protecting your computer requires
References http://www.securelist.com/en/descriptions/Email-Worm.Win32.Magistr.a http://techblog.avira.com/2008/12/19/cleaning-polymorphous-infected-files/en/