240 likes | 263 Views
Learn about the dangers of spyware, such as adware, dialers, hack tools, and more. Discover how spyware can compromise your security and privacy, and find out what steps you can take to safeguard your personal information and device. Stay informed and protected in the digital age.
E N D
Spyware Is your computer being used against you while you sleep? By Paul Box CS526
Outline • Why do we care? • What is Spyware? • What do we do about it? • The Spyware test. Paul Box / CS526
Why do we care? • Spyware is becoming very prevalent • Spyware is a way to make cheap and easy money • Spyware users want to make this money from you • If you are not cautious, they may be making money from you now • Some of the ways to make money can really harm you. Paul Box / CS526
So what is spyware? • There are many types of spyware: • Adware • Dialers • Joke Programs • Hack Tools • Remote Access programs • Spyware Paul Box / CS526
Adware • “Programs that facilitate delivery of advertising content to the user through their own window, or by utilizing another program's interface. In some cases, these programs may gather information from the user's computer, including information related to Internet browser usage or other computing habits, and relay this information back to a remote computer or other location in cyber-space.” Paul Box / CS526
Adware • These are pop up programs or gather information about computer usage • Used by people trying to make money from directed spam and advertisement money • Example is: Adware.WinFavorites • Checks your favorites and send pop ups that relate to it Paul Box / CS526
Dialer • “Programs that use a computer or modem to dial out to a toll number or internet site, typically to accrue charges. Dialers can be installed with or without a user’s explicit knowledge, and may perform their dialing activity without a user’s specific consent prior to dialing.” Paul Box / CS526
Dialer • Typical program that takes over a Modem and dials to locations without a user’s consent • Usually meant to increase the user’s phone bill • Less used as High Speed connections replace dial up • Example: XXXDial • Dials international location to deliver porn to a person’s computer Paul Box / CS526
Joke Programs • “Programs that alter or interrupt the normal behavior of your computer, creating a general distraction or nuisance. Joke programs generally do not themselves engage in the practice of gathering or distributing information from the user's computer.” Paul Box / CS526
Joke Programs • Usually meant as a joke • Usually not malicious or harmful • Made by people that just wants to show how they can get in a system if they wanted to • Example: Joke.Win32.DesktopPuzzle • Turns your desktop into a slider puzzle Paul Box / CS526
Hack Tools • “Tools that can be used by a hacker or unauthorized user to attack, gain unwelcome access to or perform identification or fingerprinting of your computer.” Paul Box / CS526
Hack Tools • 2 Types • Keystroke Loggers • Distributed denial of service attacks • Very Malicious • Used to gleam personal information, bank accounts or passwords • Also can help to take over a computer to be used to attack another computer Paul Box / CS526
Hack Tools • Those that use them are trying to do identity theft or use a computers resources to attack other networks (this is a service many hackers pay for) • Example: Haxdoor.o • Opens port 1661 on the computer and allows full access to others later can use it • Example: KeySpy • Keystroke logger that records all keystrokes and emails it to an email Paul Box / CS526
Remote Access programs • “Programs that allow one computer to access another computer (or facilitate such access) without explicit authorization when an access attempt is made. Once access is gained, usually over the Internet or by direct dial access, the remote access program can attack or alter the other computer. It may also have the ability to gather personal information, or infect or delete files. They may also create the risk that third party programs can exploit its presence to obtain access.” Paul Box / CS526
Remote Access programs • Back Door programs • Makes it easier for access to be gained at future times when it is needed • Can be used to have other programs like hack tools installed • Example: MindControl • Opens port 23 to allow full control over a computer Paul Box / CS526
Spyware • “Programs that have the ability to scan systems or monitor activity and relay information to other computers or locations in cyber-space. Among the information that may be actively or passively gathered and disseminated by Spyware: passwords, log-in details, account numbers, personal information, individual files or other personal documents. Spyware may also gather and distribute information related to the user's computer, applications running on the computer, Internet browser usage or other computing habits.” Paul Box / CS526
Spyware • Used to assist in identity theft • Usually a keystroke logger that transmits its information whenever a secure webpage is accessed • Example: Realtime-Spy • Keystroke logger that records personal passwords and transmits to a remote account Paul Box / CS526
The Bad Guys • Spyware, Remote Access programs and Hack tools • Usage: • Programs to log keystrokes or screen shots and then send that information to some type of account that will be used to gleam important account and password information. • Programs that will be used to allow easier access to the infected computer at a later date. • Programs used to take over an infected computer and use its resources for their own purposes Paul Box / CS526
What to do? • Spyware removal software • Edit the registry • Find and remove the program • Reformat the hard drive • Restore Back ups • Prevention • Never go online (ever) • Firewalls • Spyware detection programs Paul Box / CS526
The Spyware Test • Spyware Warrior • Decided to test what spyware removal and prevention tools were the best • Ran 3 test runs to see what was the best • Infected a computer with spyware in a controlled environment • Ran spyware search and destroyers to see which was the best • Results are found here. Paul Box / CS526
The Spyware Test • Results: • Determined that none were really any good (none can detect and remove everything) • The best were: • Adware • Microsoft Anti-spyware Beta • Pest patrol • Spybot Search and Destroy • Webroot Spyware Sweeper Paul Box / CS526
The Spyware Test • Conclusions: • Spyware and adware can prove quite difficult to remove, even for dedicated anti-spyware scanners even to disabling the spyware so it can not run on reboot or detecting them. • No single anti-spyware scanner removes everything. Even the best-performing anti-spyware scanner in these tests missed fully one quarter of the "critical" files and Registry entries. This means that the programs were at best 75% effective. • It is better to use two or more anti-spyware scanners in combination, as one will often detect and remove things that others do not. • Prevention is always preferable to scanning and removal. • Moreover, users should learn to practice safe computing habits, which include avoiding web sites and programs of unknown or dubious provenance and carefully reading End User License Agreements and Privacy Policies. Paul Box / CS526
References • Spyware Test • Spyware Definitions • Spyware Listings Paul Box / CS526
Questions??? Paul Box / CS526