340 likes | 475 Views
Trojans, Worms, Virri. Dave Wade G4UGM. Malware?. What is Malware? Any hostile, intrusive, or annoying software or program code. Includes the following:- Virus - Infects other programs Trojan - Does not work as advertised Worm - Spreads by securty flaws or bugs
E N D
Trojans, Worms, Virri Dave Wade G4UGM
Malware? • What is Malware? • Any hostile, intrusive, or annoying software or program code. • Includes the following:- • Virus - Infects other programs • Trojan - Does not work as advertised • Worm - Spreads by securty flaws or bugs • Spyware - Reports on you actions in an unwanted way • Adware - Makes pop-ups or alters web pages I would also include “phishing” and “pharming”…. 2
History 1987 – Christmas Exec Trojan • Infiltrates Bitnet and VNET IBM networks 1988 – Student Robert Morris unleashes a worm on the Internet • that crashes 6,000 computers. • Morris becomes the first person convicted under the US Computer Fraud and Abuse Act. 3
Viruses • Whilst the press often describe any piece of malware as a “virus” really has very specific attributes:- • Spread by changing existing programs • When run the usually infect more programs • Despite popular myth:- • Not the oldest type of malware • Trojans and Worms are older • Probably not the most common • Adware etc. • May cause damage later when “triggered” or not at all. • Other wise they would not spread • “Trigger” may be date, time or event • Some Viruses also have “worm” characteristics • spread via e-mail (e.g. Melissa). 4
Viruses (cont.) • Note that as many files/documents can contain code, they can also be used by viruses. • Typical examples include:- • Word Documents • Spread Sheets • Mail Messages • Traditional Virus scanners detect virus by scanning files and looking for tell-tale sequences of code 5
Trojan • Is a program that does not work as advertised • Screen Saver, “Time Sync”, Peer-to-Peer file share • The program may actually • Logs keystrokes and passwords • Uses PC to send SPAM • Launch DOS attacks on web sites • Normally installed by the user unwittingily 6
Worms • Programs that use computer networks to spread. • Normally spread by exploiting security holes • Free-standing so don’t need to infect other programs 7
Other Malware • AdWare • Programs that generally work as advertised but which cause advertisments or “popups” to appear on your screen. • May also tamper with content of web pages or re-direct links to sponsering sites. • SpyWare • Programs that report on what your computer is doing • Especially web sites but also record login data • May re-direct you to other web sites. • Often coupled with Adware. • Phishing • Forged e-mail design to get you disclose securty creditials. • Pharming • Forged web site. May be sued as part of a phish. 8
Protection - Scanners • Virus Scanners • Obviously protect against viruses • Usually Trojans and Worms • But not other nasties.. • How do they work:- • Look for unique patterns in a the virus • Alert when the pattern is detected • In either:- • scheduled scan • all files are checked on a schedule • “on access” scan • Files are checked as they are used 9
Limitations - I • Patterns need to be updated frequently • Not a problem with broadband. • Unless you are the first to spot the virus. • Pattern may be disguised by • compression • ZIP files • Encryption :- • Passwords on word files. • The virus itself • Polymorphic viruses :- encrypt or encode themselves. • False positives • Patter exists in another file, by chance that does not have the virus. 10
Example Virus Scanners • Not an exclusive list:- • Free • http://free.grisoft.com/doc/2/lng/us/tpl/v5 • http://www.free-av.com/ • Paid For • http://uk.mcafee.com/ • http://www.symantecstore.com/ • http://www.sophos.com/ 11
Detecting Spyware & AdWare • Spyware and Adware scanners. • These tend to be less reliable as often these programs are installed by the user, and the agreement allow them to be installed. • Some makers of adware removal programs have been sued by adware providers. • Also the programs use a variety of techniques to install • May be hard to un-install without damaging the system or stopping some other item working • Newnames.net => spyware => Removal can stop the network running 12
Real Time Protection • Spyware/Adware/Trojan protection:- • Monitor key parts of the OS and warn of changes • Internet Explorer Home Pages • Browser plug-ins and Helpers • Registry start-up keys • System.ini file • Services Data base • Hosts file 13
Spyware Tools • Need to be careful here. • Many things advertised as spyware tools contain spyware! • Also as spyware is “ill defined” may be harder to spot. • In short:- • May need to run multiple tools • May need separate scanner and checker 14
Spyware Tools (continued) • I run two tools that provide real time protection:- • Windows Defender (www.microsoft.com/spyware) • Winpatrol • www.winpatrol.com • I also use other tools • AdAware SE – a scanner • http://www.lavasoftusa.com/products/ad-aware_se_personal.php • HiJackThis • http://www.majorgeeks.com/download3155.html • Spyware Blaster • http://www.javacoolsoftware.com/spywareblaster.html 15
What is a firewall? • A fire wall is a tool that monitors network connections • Simple Firewall • Monitors which protocols are in use • So can allow http for web, but stop SMTP • Advanced Firewall • Monitors ports/programs • Allow Outlook Express to send and receive e-mail • Prevents any worms or spyware doing the same. 16
Where should we run it.. • Can run on local PC • Means can monitor programs • Can run on a router or router modem • Provides “perimeter” defence • Keeps out unwanted protocols such as MS file sharing • Can’t tell if an unwanted program is connecting to an “normal port” 17
What are the problems? • Many programs connect to the internet:- • Anti Virus for updates for new viruses • Windows, Office and other programs • Check for udates against worms etc. • Some programs check for data • Language translation programs • Some check for unwanted info • Update pop-up adverts • Accept back door instructions • Many firewalls will prompt the user:- • E.G. “Should I allow MSIMN.EXE to connect on POP3?” 18
Well Should we? YES! (MSIMN.EXE is Outlook Express!) • There is currently only one free firewall • ZoneAlarm - http://www.zonelabs.com/ • Sygate may still be available • http://www.tucows.com/preview/213160 19
Spam Filters • Try and detect spam • Much harder than any of other nastys • Only need to get information to the user who then acts. • No programs need to run • This means the e-mail can be • Changed frequently • Not even have to contain any text. 20
Message Header Microsoft Mail Internet Headers Version 2.0 Received: from scnmailsweeper.stockport.gov.uk ([172.16.106.9]) by SCNEXCHANGE.stockport.gov.uk with Microsoft SMTPSVC(6.0.3790.1830); Wed, 13 Dec 2006 16:28:50 +0000 Received: from mailsweeper5.stockport.gov.uk (MAILSWEEPER5) by scnmailsweeper.stockport.gov.uk (Clearswift SMTPRS 5.2.5) with ESMTP id <T7c890fbcc0ac106a09930@scnmailsweeper.stockport.gov.uk> for <dave.wade@offertonparkparishcouncil.gov.uk>; Wed, 13 Dec 2006 16:30:54 +0000 Received: from smbc-fw3 (unverified) by mailsweeper5.stockport.gov.uk (Content Technologies SMTPRS 4.3.17) with SMTP id <T7c890dfadcac106a084c4@mailsweeper5.stockport.gov.uk> for <dave.wade@stockport.gov.uk>; Wed, 13 Dec 2006 16:28:59 +0000 Received: from sck ([71.248.60.110]) by pool-71-248-80-55.bltmmd.east.verizon.net (8.13.5/8.13.5) with SMTP id kBDGX1dU037473; Wed, 13 Dec 2006 11:33:01 -0500 Message-ID: <001d01c71ed3$bf8d26e0$6e3cf847@sck> From: "Fontenot" <btmw@lethlee.dk> To: <dave.wade@stockport.gov.uk> Subject: gasoline Date: Wed, 13 Dec 2006 11:22:19 -0500 22
Anatomy of an E-Mail • Note from field:- “@lethlee.dk” • www.dnsstuff.com • Did an NSLOOKUP ? Name: lethlee.dk Address: 195.47.247.81 • Where did it really start:- • Log shows “71.248.60.110” • pool-71-248-60-110.bltmmd.east.verizon.net • These don’t match 24
Why did we accept the record. • Its common for the addresses not to match • Allows users to roam and have multiple e-mail addresses. • This does make it hard to stop spam. 25
What can we do about this • Choose an ISP with reasonable SPAM filters • They have a big sample of SPAM so the maths work better. • SPAM is filtered at source so you don’t download • Do need to check from time to time as there will me false positives. • May help to use local spam filter 26
Setting up a local SPAM filter • Manu available all less than perfect. • They don’t catch all spam • “False Positive” => Need to check spam folders • They miss some spam • Spammer get clever • Use random from addresses • Myss-sp€ll words. • Put words in pictures • Add random text from web. • Result is as above. 27
Some personal spam filters. • SpamAssassin:- http://spamassassin.apache.org/ • Not easy to use in windows • SpamPal http://www.spampal.org/ • Uses black lists of sites • Not all spam sites are on the black list • Some usefull sites (Yahoo) end up on spam list. • Usual suspects also have tools:- • Norton, Free-Av (Not Free), GriSoft etc. 28
Phish 29
Phish II • Look at the url:- • The site it points to will be displayed in the bar below (this one was “sanitized”) • http://today.slac.stanford.edu/ • This can be prevented at two places • Most Spam Filters can block the Phish from arriving • Firewall can block access to the dangerous site. 30
Summary • Problem is no longer simple:- • May need to use multiple tools from multiple suppliers for best results. • Tools may not be effective • Preventions is better than cure. 31
Do Not • Install programs from unknown sources • Click on humour links indiscriminately • Open files from un-known sources 32
Do • Keep software up to date • Security updates protect against worms • Run a selection of security fixes • Virus Scanner (ONLY ONE) • Spyware Monitor • Firewall 33