SlideShare a Scribd company logo
introtomalware
WARNING: DEFINITIONS ARE NOT CLEAN
• SIMPLIFICATIONS OF DEFINITIONS INTRODUCE ERRORS
• SEMANTICS WASTE TIME
UNDERSTANDING RISK
• SECURE COMPUTER === PICKY COMPUTER
• CAN YOUR SYSTEM SPARE THE RESOURCES?
• DO YOU REALLY NEED THIS LEVEL OF PROTECTION?
• IS YOUR PROTECTION DUMB?
MALWARE
• SOFTWARE DESIGNED AND EXECUTED FOR MALICIOUS INTENT
• TOLLING
• STEALING
• GENERAL LAW BREAKING
introtomalware
TERMINOLOGY
• VIRUSES
• ATTACHES ITSELF TO A PROGRAM AND PROPAGATES ITSELFTHROUGHOUT THE SYSTEM
• WORMS
• STANDALONE PROGRAM THAT CAN PROPAGATEITSELF TO OTHERSYSTEMS OVER A NETWORK
• TROJAN HORSE
• MASQUERADESAS LEGITIMATE SOFTWARE OR BUNDLES ITSELFWITH LEGITIMATESOFTWARE.
• POTENTIALLY UNDESIRABLE PROCESSES (PUPS)
• RUNSAS HIDDEN PROCESSES
• COMMAND AND CONTROL (C&C, C2)
• A SERVER THE ATTACKUSESTO ISSUE COMMANDS TO INFECTEDSYSTEMS
TERMINOLOGY PT. 2
• “IN THE WILD”
• WHEN MALWAREOR ATTACKSARE FOUNDON THE OPENNET INSTEAD OF A LAB ENVIRONMENT
• ZERO DAY (0DAY, “OH-DAY”)
• SECURITYBUG IN A PROGRAM THATIS UNKNOWNAT TIME OF USE
• VULNERABILITY
• FEATURESOR BUGSIN PROGRAMMING THATCAN HAVEUNINTENDED USES
• EXPLOIT
• THE RESULTS OF A VULNERABILITY
• SCRIPT KIDDIES (SKIDDIES)
• WANNABEHACKERSUSING PREMADETOOLS INSTEAD OF LEARNING
• INSULT
introtomalware
TYPES OF ATTACKS
• ADWARE
• DELIVERS ADVERTISEMENTS TO THE USER
• SPYWARE
• SOFTWARETHAT COLLECTS INFORMATIONABOUT THE USER.(KEY LOGGING, RAM SCRAPING)
• BOTS
• SOFTWARETHAT AUTOMATICALLY PERFORMSA TASK
• RANSOMWARE
• REMOVES USERACCESSTO FILES AND DISPLAYS INSTRUCTIONS ON HOW THE USER CAN GET ACCESS BACK
• ROOTKITS
• PROVIDES REMOTEACCESS TO A SYSTEMAND AVOIDS ANTIVIRUSDETECTION
• SECURITYBUGS/EXPLOITS
• UNINTENDED ERRORS IN PROGRAMMING THAT ALLOW FORMALICIOUS EXPLOITATION
TYPES OF ATTACKS PT. 2
• BACKDOORS
• LEAVES AN ENTRY POINT FOR ATTACKERSTO REGAIN ACCESSTO THE SYSTEM
• DOS/DDOS
• OVERLOAD SERVERSWITH REQUESTS TO PREVENT USABILITY
• PHISHING
• SOCIAL ENGINEERING TRICKUSER INTO INSTALLING MALWARE
• MACROS
• SCRIPTS ATTACHEDTO DOCUMENTS THAT ARE OPENED BY THE DOCUMENT VIEWER
• DROPPERS
• TOOL USED TO UPLOAD MALWARE TO A USER
CREATION/TOOLS
• SKIDDYKIT DEVELOPERS
• INDIVIDUALS
• HACKING GROUPS
• HACKINGTEAM
• EXPLOIT KITS
• MIRAI
• WAREZ
• ANGLER
• EVOLUTION
• TWEAKING PREMADE MALWARE
introtomalware
RED FLAGS
• SYSTEM IS SLOWER THAN USUAL
• MAGICAL POPUPS
• SMALL TRAFFIC PULSES
• UNKNOWN PROCESSES RUNNING
RED FLAGS PT. 2
• INVOLUNTARY SETTING CHANGES
• BROWSER HOMEPAGE
• STARTUP PROGRAMS
• MAGICAL CMD PROMPTS
• MAGICAL WEBCAM ON
• MAGICAL SHORTCUTS
• YOUR COMPUTER WON’T LET YOU DOWNLOAD AN ANTIVIRUS
introtomalware
ANTIVIRUS
• MALWARE BYTES
• WINDOWS DEFENDER
• CLAM AV
FIREWALL RULES
• LINUX UNCOMPLICATED FIREWALL (UFW/GUFW)
• WINDOWS FIREWALL
• MAC FIREWALL
• PALO ALTO
DISABLE AUTO-RUN APPLICATIONS
• MSCONFIG
• AUTOSTART FOLDERS AND OPTIONS
EMAIL FILTERS
• SPAM
• DON’T LOAD EXTERNAL GRAPHICS
• VIEW AS TEXT
TRAFFIC AND LOG ANALYSIS (IDS/IPS)
• SPLUNK
• PROXY
• SNORT
• OSSEC
REMOVE UNUSED PROGRAMS
• UNSUPPORTED PROGRAMS
• ONE-TIME USE PROGRAMS
SAFE DOWNLOADING/INSTALLING
• WATCH FOR FREEWARE ADD-ONS
• DON’T EXPRESS INSTALL
SAFE BROWSING
• GOOGLE A WEBSITE INSTEAD OF TYPING IT IN
• USE A SERIF FONT
• CHECK VIRUSTOTAL
• ADD-ONS
• NOSCRIPT
• ADBLOCKERS
• WOT
STAY PATCHED
• UPDATES ARE MOSTLY SENT OUT WHEN VULNERABILITIES ARE FIXED
SANDBOXING
• FIREJAIL
• BITBOX
• VIRTUAL MACHINES
KNOW YOUR SYSTEM
• KNOW YOUR SYSTEM
BACKUP YOUR SYSTEM
• BACKUP YOUR SYSTEM
EXTRA TALKS
HEART BLEED
• OPENSSL/TLS DECRYPTION VULNERABILITY
MIRAI
• IOT BOTNET
ANGLER
DARKCOMMET
• REMOTE ACCESS/ADMINISTRATION TOOL
ZEUS
• TROJAN VIRUS AIMED AT THE FINANCIAL SECTOR
STUXNET
• FIRST KNOWN CYBER WEAPON OF INTERNATIONAL WARFARE
LUCKY
• RANSOMWARE
SHELLSHOCK
• PRIVILEGE ESCALATION ON INTERNET FACING UNIX SYSTEMS
CODE RED
• DDOS WORM
QUESTIONS
• HTTPS://YOUTU.BE/MBYRZVN3UXS

More Related Content

PPTX
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
PDF
Managed Vulnerability Scan
PDF
Security Framework from SANS
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PDF
Intelligence-Led Security: Powering the Future of Cyber Defense
PPTX
Securing Electric Utility Infrastructure
Tiptoe Through The Network: Practical Vulnerability Assessments in Control Sy...
Managed Vulnerability Scan
Security Framework from SANS
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
From IT to IoT: Bridging the Growing Cybersecurity Divide
Intelligence-Led Security: Powering the Future of Cyber Defense
Securing Electric Utility Infrastructure

What's hot (20)

PDF
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
PPTX
Six steps for securing offshore development
PDF
Behavior-Based Defense in ICS
PPTX
Spice world 2014 hacker smackdown
PDF
Industrial Control Systems Cybersecurity Technology Selection
PDF
Industrial Control System Security Overview
PDF
Saner 2.0 product sheet
PPTX
7 Security Requirements to Accelerate Cloud Adoption
PPTX
Malicious Client Detection using Machine learning
PPTX
Fingerprinting healthcare institutions
PDF
Breaking and entering how and why dhs conducts penetration tests
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
PDF
How to Respond to Industrial Intrusions
PPTX
SDN Analytics & Security
PPTX
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
PPTX
The Future of ICS Security Products
PDF
Staying One Step Ahead with Zero-Day Protection
PPTX
Extending Network Visibility: Down to the Endpoint
PDF
Qradar as a SOC core
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Six steps for securing offshore development
Behavior-Based Defense in ICS
Spice world 2014 hacker smackdown
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control System Security Overview
Saner 2.0 product sheet
7 Security Requirements to Accelerate Cloud Adoption
Malicious Client Detection using Machine learning
Fingerprinting healthcare institutions
Breaking and entering how and why dhs conducts penetration tests
Combating Insider Threats – Protecting Your Agency from the Inside Out
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
How to Respond to Industrial Intrusions
SDN Analytics & Security
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
The Future of ICS Security Products
Staying One Step Ahead with Zero-Day Protection
Extending Network Visibility: Down to the Endpoint
Qradar as a SOC core
Ad

Similar to introtomalware (20)

PPTX
Malware ppt final.pptx
PPTX
Week_7.pptx Computer science topic 7 Notes
PPTX
MALWARE AND ITS TYPES
PPTX
PPT
Ch03 Network and Computer Attacks
PPTX
Computer security ethics_and_privacy
PPT
CyberSecurity presentation for basic knowledge about this topic
PPTX
Information about malwares and Attacks.pptx
PPTX
Type of Malware and its different analysis and its types !
PPTX
Security & Privacy - Lecture B
PPT
PPT
Ratzan2
PPTX
PPTX
Information Technology - System Threats
PPTX
Information Technology - Types of Computer Attacks.pptx
PPTX
SECURITY THREATS AND SAFETY MEASURES
PPTX
Security Threats.pptx
PDF
The process of computer security
PPTX
Viruses,antiviruses & firewalls
PPTX
Protection from hacking attacks
Malware ppt final.pptx
Week_7.pptx Computer science topic 7 Notes
MALWARE AND ITS TYPES
Ch03 Network and Computer Attacks
Computer security ethics_and_privacy
CyberSecurity presentation for basic knowledge about this topic
Information about malwares and Attacks.pptx
Type of Malware and its different analysis and its types !
Security & Privacy - Lecture B
Ratzan2
Information Technology - System Threats
Information Technology - Types of Computer Attacks.pptx
SECURITY THREATS AND SAFETY MEASURES
Security Threats.pptx
The process of computer security
Viruses,antiviruses & firewalls
Protection from hacking attacks
Ad

introtomalware