Viruses, Worms, Spyware, Phishing, Pharming
Transcription
Viruses, Worms, Spyware, Phishing, Pharming
Viruses, Worms, Spyware, Phishing, Pharming 10/12/2005 1 Viruses, Spyware, Phishing, Pharming The Internet can be a minefield for the unwary! Hackers want to… 1. Use you to spread their worms and viruses. 2. Install spyware programs on your computer so they can monitor everything you do on the Internet. 3. Alter your browser, forcing it to visit websites you don't want to visit. 4. Get your personal information so they can steal your money and identity. Goal 1 is usually about “FUN” Goals 2, 3 and 4 are usually about MONEY! 10/12/2005 2 Viruses, Spyware, Phishing, Pharming How You Get Hacked: – Via email attachments • Trojan/viruses • Trojan/worms – Via malicious websites – 10/12/2005 • Spyware • Browser hijacking Via email • Phishing • Pharming 3 Hacked via Email Attachments! Greeks bearing gifts… TROJAN HORSES Gifts you want that contains things you don’t want… A Trojan horse is a normal application, such as a game or self-displaying photo, that contains a hidden program – often a virus - that executes when the Trojan is executed. Trojan horses are usually email attachments 10/12/2005 4 Hacked via Email Attachments! VIRUSES • A program that attaches itself to another program so that it can reproduce without the victim’s knowledge • Much like the common cold, it wants to spread – often using the victim’s email address book as a source for new victims to whom it sends itself • Viruses generally spread via email-attached Trojans 10/12/2005 5 Click on the attachment and you have a virus! 10/12/2005 6 Click on the attachment and you have a virus! 10/12/2005 7 Hacked via Email Attachments! WORMS • A specially written program that replicates itself • Unlike a virus, it does not attach itself to other programs • Worms, in general are resource hogs; some have bogged down major portions of the Internet • Worms generally spread via server vulnerabilities (e.g. buffer overflows) – not via email attached Trojans 10/12/2005 8 Hacked via Email Attachments! Viruses vs. Worms • In the final analysis, most people who are affected by a virus or worm could not care less about the distinctions between them • Most viruses and worms are launched into the Internet by attackers who have no particular target in mind • They just want to see what will happen – or they seek notoriety among their “colleagues” 10/12/2005 9 Hacked via Malicious Websites! • • • • • SPYWARE Spyware: Any software that covertly gathers user information. Spyware: Monitors victim’s Internet activity and transmits that information via the Internet to the hacker, who sells it. Spyware: Often bundled as a hidden component of “free” programs that are downloaded from the Internet Symptoms: SLOW Web browsing • PCs are often infested with 50 -1000 spyware programs • The more you surf, the more invested you become #1 Problem for 2005! 10/12/2005 10 Hacked via Malicious Websites! A typical EULA (End User License Agreement): "You grant to us the right ... to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘popup’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications..." "You also grant permission to collect and store information of your internet usage habit, including but not limited to information about every web page you view and the content of web page. You understand and accept that Uniform Resource Locators and the content of web pages you view may include your personally identifiable information. You grant permission to collect and store information on which toolbar buttons you click on, your response to advertising, the search terms you entered on the toolbar and/or all other information relates to your internet usage habits..." 10/12/2005 11 Hacked via Malicious Websites! Spyware RealPlayer tracks – and “phones home” - your listening habits Kazaa – need I say more? Wild (Tangent) Games are “free” – but you agree to a lot when you accept them! Comet Systems has over 60,000 customers to whom it sells the data collected by its spyware –your children become spies! 10/12/2005 12 Hacked via Malicious Websites! BROWSER HIJACKING Symptoms: • Your browser’s default start page is changed • Porn and gambling links are added to your favorites list • Porn sites pop up on your screen Goal: • To force your browser – and entice you - to visit websites whose owners pay the hacker for sending people to their sites Spyware, browser hijacking, and phishing are all about MONEY! 10/12/2005 13 Hacked via Malicious Websites! Browser Hijacking – The malicious website makes changes to your computer via known vulnerabilities, for which patches exist – Sometimes, the changes are easily reversed – More often, a “cleaner” tool is needed to fix things – It’s often necessary to manually edit the windows registry – Often, the hijacking software redoes the hacked settings every time you reboot the computer • So, no matter how often you fix your settings, they are hacked again the next time you reboot 10/12/2005 14 Cleaning Up Spyware & Browser Hijackers Voted BEST by some… 10/12/2005 15 Cleaning Up Spyware & Browser Hijackers There are at least 10 other spyware removers out there. I like Spybot Search & Destroy because it’s Free at: http://www.safer-networking.org/en/download/ But my favorite of all is free from Microsoft: AntiSpyware (Beta) - download at: http://www.microsoft.com/athome/security/spy ware/software/default.mspx 10/12/2005 16 What About Firewalls? • Firewalls, in general, simply alert you and ask your permission when any program wants to sends Internet traffic into or out of your computer. ZoneAlarm is one of best easy-to-use firewalls - and it's free! Visit http://www.zonealarm.com. • Firewalls do not stop users from: • Reading malicious email; executing email attachments • Visiting malicious web sites 10/12/2005 17 Hacked via Email! PHISHING • Phishing: The act of sending an email that falsely claims to be from a bank or other E-commerce enterprise • The e-mail: Directs the user to visit a cloned website where they are asked to “update” personal information. • Goal: To trick the recipient into surrendering private information that will be used for identity theft. – Usernames/passwords; credit card, social security, and bank account numbers • Perpetrators: Increasingly used by organized crime syndicates, many based in central and eastern Europe. Those who have been arrested were young, American males. 10/12/2005 18 Hacked via Email! Phishing: It’s a matter of Authentication! https:// s = secure! On-line Secrecy: Encryption + Authentication SSL (Secure Sockets Layer) 10/12/2005 19 Commerce Bank phishing email The From: address is easily spoofed! Not a match! 10/12/2005 20 Commerce Bank phishing email An IP address No ‘s’ No yellow lock! 10/12/2005 21 Commerce Bank phishing email 10/12/2005 22 Spoofed email address eBay phishing email A fake link! 10/12/2005 23 eBay phishing email 10/12/2005 24 SSN! eBay phishing email 10/12/2005 25 Spoofed email address Another eBay phishing email 10/12/2005 26 Making Your Way Though the Minefield Still more tricky! 10/12/2005 27 Another bank phishing email Yellow lock is UOP’s https://login… ! http://mistral… ! 10/12/2005 Not a match! mail.pacific.edu 28 No ‘s’ after the “http”! FAKE! No yellow lock! Another bank phishing email 10/12/2005 29 REAL! Washington Mutual’s real website 10/12/2005 ‘s’ after the http”! Yellow lock! 30 A new “window” can be placed over the address window! 10/12/2005 A new “window” can be placed over the blank yellow lock window! 31 Make sure this matches this! When you doubleclick on an authentic yellow lock, a digital certificate appears. 10/12/2005 32 PHARMING 10/12/2005 33 E-COMMERCE E-Commerce is SAFE as long as you: • Initiate the connection! • Ensure that you're using a secure website before submitting credit card or other sensitive information. • Check the beginning of the Web address in your browsers address bar - it should be ‘https://’ rather than just ‘http://’ • Make sure the yellow lock is in place. Double-click on yellow lock and check digital certificate 10/12/2005 34 Viruses, Spyware, Phishing, Pharming Identity Theft Statistics Method: • 30% via lost wallet, checkbook, or credit card • 11% via the Internet = 0.3% of all Internet fraud • 71% of Internet fraud occurs via online auctions • 5% via garbage browsing • 54% via other or unknown means When the perpetrator was caught: • 32% a relative 54% of the time, it’s • 18% a friend someone the victim knew! • 4% a fellow worker • 13% a worker who had access to personal data • 33% other Source: BBB survey, published 1/30/05 10/12/2005 35 SUMMING UP 1. Keep your programs patched! • Windows: Enable automatic updates • See following slide 10/12/2005 36 10/12/2005 37 SUMMING UP 1. Keep your programs patched! • Windows: Enable automatic updates • See following slide 2. Use Microsoft AntiSpyware • See following slide 10/12/2005 38 10/12/2005 39 SUMMING UP 1. Keep your programs patched! • Windows: Enable automatic updates • See following slide 2. Use Microsoft AntiSpyware • See following slide 3. Beware accepting “free” software (e.g. games) 10/12/2005 40 SUMMING UP 1. Keep your programs patched! • Windows: Enable automatic updates • See following slide 2. Use Microsoft AntiSpyware • See following slide 3. Beware accepting “free” software (e.g. games) 4. Use one anti-virus program (e.g. McAfee, Norton) 10/12/2005 41 SUMMING UP 1. Keep your programs patched! • Windows: Enable automatic updates • See following slide 2. Use Microsoft AntiSpyware • See following slide 3. Beware accepting “free” software (e.g. games) 4. Use one anti-virus program (e.g. McAfee, Norton) 5. If it will make you feel better, use a firewall (e.g. ZoneAlarm, XP SP2 Firewall) 10/12/2005 42