Preview

Malicious Software Lecture Notes

Good Essays
Open Document
Open Document
11343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Malicious Software Lecture Notes
Malicious Software and its Underground Economy
Two Sides to Every Story

Introduction
Lorenzo Cavallaro
Information Security Group Royal Holloway, University of London

Jun 17, 2013—Week 1-1

(Week 1-1) Lorenzo Cavallaro (ISG@RHUL)

Malware and its Underground Economy

Jun 17, 2013—Week 1-1

1 / 12

Should we care?
(Let me tell you a story. . . )

The Botnet Threat

A network of compromised machines (bots) controlled by a bot master Responsible for (non-exhaustive list): Large-scale network probing (i.e., scanning activities) Launching Distributed Denial of Service (DDoS) attacks Sending large-scale unsolicited emails (SPAM) Click-fraud campaign Information theft Shift from a for-fun activity towards a profit-oriented business

(Week 1-1) Lorenzo Cavallaro (ISG@RHUL)

Malware and its Underground Economy

Jun 17, 2013—Week 1-1

4 / 12

The Torpig Botnet

Trojan horse
Distributed via the Mebroot “malware platform” Injects itself into 29 different applications Steals sensitive information (e.g., passwords, SSN, credit card numbers) HTTP injection for phishing Uses “encrypted” HTTP as Command & Control (C&C) protocol Uses a resilient approach (domain flux) to contact a C&C server

Mebroot
Spreads via drive-by downloads Sophisticated rootkit

(Week 1-1) Lorenzo Cavallaro (ISG@RHUL)

Malware and its Underground Economy

Jun 17, 2013—Week 1-1

5 / 12

The Torpig Botnet

Vulnerable web server (1) GET / (2)

Mebroot drive-by-download server
(5) (4) (3) gnh5.exe

Mebroot C&C server
Torpig DLLs

GET /?gnh5

Stolen data (6) Config (7) Phishing HTML URL

Torpig C&C server

(becomes a bot) Victim client

Injection server

(Week 1-1) Lorenzo Cavallaro (ISG@RHUL)

Malware and its Underground Economy

Jun 17, 2013—Week 1-1

6 / 12

Data Collection Principles

Principle 1: the hijacked botnet should be operated so that any harm and/or damage to victims and targets of attacks would be minimized
Always

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The method to foul network is that one country is controlling the rest of the bots computer which looks like the attacks are from all over the countries.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once the attacker had the administrator access the systems he/she was able to create BOTs and push to many student PCs located in various labs. The attacker then initiate a control attack by activating the BOT 's in order to form a BotNet (a.k.a. Zombie Network) with the goal of intentionally causing online services to become unusable to students (ICECC, 2009).…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cybercrime is on the rise. As companies try to protect their customers PII, criminals are trying to get it. Ponemon Institute did a survey of how the information was affecting larger companies (Institute, 2014). Unfortunately the hackers are using the information to ruin their credit. Russian hackers obtained 1.2 billion usernames and passwords (Institute, 2014).…

    • 276 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Us Vs Arabo Case Study

    • 459 Words
    • 2 Pages

    In 2004, 18 year old Jason Salah Arabo from Michigan was arrested and pleaded guilty with conspiracy to order destructive computer attacks on business competitor’s websites from his home by remotely controlling them with a computer program called, “Bot”. Bots can be easily disguised as MP3 music files or pictures that unaware users download from public websites. Once they are downloaded, Bots will cause the virus to overload the website’s hosting computer server that result in crashing the entire system. Arabo wasn’t alone in this process. He and former 16 year old “Jasmine” Signh from New Jersey, creator of the Bot, had met Arabo on an instant messenger chat, and had agreed to help takedown Arabo’s competitor websites in exchange for Arabo’s merchandise, including designer sneakers. Arabo was running two business companies that sold throwback sports apparel such as team jerseys over the internet. Together, Arabo and Signh had designed the program in what they thought would help Arabo’s business by stopping customers from visiting and using other services.…

    • 459 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Nt1310 Unit 3 Essay

    • 1872 Words
    • 8 Pages

    There are cybercriminals who commit crimes using the computers and networks. They spread malicious viruses through the networks such as worms and Trojan horses. They hack other people's computers to steal important data and identity or destroy data. A hacker uses a packet sniffer to intercept the unencrypted network traffic and capture the passwords or other important information which was communicated through the network. Botnet or a Zombie computer is a computer which a hacker uses to spread viruses and to commit cybercrimes while the owner of the computer is unaware of it.…

    • 1872 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Course Notes

    • 898 Words
    • 4 Pages

    1. The transfer of tissue or an organ between two people who are not related is called?…

    • 898 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Course Notes

    • 3951 Words
    • 16 Pages

    Who regulates railroad crossings and state rail safety in Texas? Texas Department of Transportation—Highway Department http://www.txdot.state.tx.us/about_us/administration/divisions/rail.htm…

    • 3951 Words
    • 16 Pages
    Powerful Essays
  • Powerful Essays

    Course Notes

    • 1999 Words
    • 8 Pages

    Choosing one of the case studies that you developed within your group during the class. Explain the cause of the person’s symptoms and construct a hypnoanalysis treatment plan and required outcome.…

    • 1999 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Course Notes

    • 367 Words
    • 2 Pages

    Visit the International Association of Marriage and Family Counselors (IAMFC) and the American Association for Marriage and Family Therapy (AAMFT) Web sites. Summarize the mission of each association. Report back on at least two areas where each organization is currently taking a leadership role and or creating initiatives to promote the profession of Marriage and Family Counseling.…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lecture notes

    • 498 Words
    • 2 Pages

    zoonotic = is a carrier i.e. rabies. animal gets sick and passes it on. HIV started from monkeys malaria is NOT. its transmitted by a mosquito. Malaria is a vector they just pass it on. Malaria is an acute infectious disease. its a disease of the poor, because we can afford health management systems and vaccines.…

    • 498 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    course notes

    • 799 Words
    • 4 Pages

    DSH has been associated with host of emotional and psychological problems, including suicidal thoughts, eating disorders, chronic feelings of hopelessness and despair, depression and anxiety, sexual abuse, physical abuse severe emotional abuse, perfectionism, and a pervasive sense of loneliness.…

    • 799 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    If you thought only home users could get infected by ransomware, think again! Reports have been pouring in from around the world reporting about ransomware infections in courthouses, schools, hospitals and churches in the past month. A few years back it was considered shameful to be admitting about ransomware infections, but now the infections have become more common. More and more institutions are coming out with their experiences as ransomware have increased their encryption capabilities and are really complex.…

    • 265 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Course Notes

    • 875 Words
    • 2 Pages

    After reading the article Arranging a Marriage in India my first thoughts were why would any man or woman want to marry someone they are unfamiliar with, no nothing about them. I had the same mind as Serena Nanda who is the woman who got to experience it all while her trip to India. Of course my opinions had changed after reading the article, although I never had a problem with arranged marriages because I had been aware that some cultures do that as a lifestyle, but the idea of it kind of sounding like the parents are selling the daughter. As Serena mentions that how in the U.S we find the one we love and then marry after a few years of dating if it’s the right one of course, but now divorce rate is very high and it’s usually because it’s cheating or you just get tired of being with the same person. But how a women in India see it, they marry the guy that the parents have arranged them with and they seem to have a very flow and happy marriage, but how can that be? Is what I ask myself? They are people who have never talked or seen before yet they enjoy each other, although I like the idea on how when they marry they get to know each other and they aren’t tired of each other because it’s just the beginning of their marriage, it’s kind of like dating in U.S only they’re married. They interview with Sita, Sita mentions on how her parents have experience and they know what’s best for her when picking the right guy for her to get married with. While they are picking boys for her Sita doesn’t experience dating her parents do all the work for and all she does is goes to school and enjoys her youth she has more time to spend on her life instead of worrying about the man she might marry or boys. Sita’s reasoning was very understandable and I feel like I connect to that idea and that maybe it wouldn’t be a bad idea to have an arranged marriage, but I know that it really isn’t for me. Education in man is very important when the parents of a soon to be bride is looking…

    • 875 Words
    • 2 Pages
    Satisfactory Essays