SlideShare a Scribd company logo
1 of 26
How Hackers Get Into
   Your System

        By
        Antriksh Shah
        null The Open Security Community
Introduction to Hackers

Refers to a person who enjoys learning the details
of computer systems and to stretch his/her
capabilities



Refers to a person who uses his hacking skills for offensive purposes



              Hacking
Describes the rapid development of new programs or the reverse
engineering of the already existing software to make the code better and
more efficient
Types of Hackers
Steganography
 Greek Words:
    STEGANOS – “Covered”
    GRAPHIE – “Writing”
 Steganography is the art and science of writing hidden
  messages in such a way that no one apart from the
  intended recipient knows of the existence of the message.

 This can be achieve by concealing the existence of
  information within seemingly harmless carriers or cover
 Carrier: text, image, video, audio, etc
Ancient Steganography
 Demeratus in 440 BC sent a warning about a
  forthcoming attack to Greece by writing it on a wooden
  panel and covering it in wax.


 Histiaeus, who shaved the head of his most trusted
  slave and tattooed a message on it. After his hair had
  grown the message was hidden. The purpose was to
  instigate a revolt against the Persians.
Use of Steganography
         by Terrorist
   Al Qaeda's use of steganography is somewhat simpler: In 2008 a British
    man,Rangzieb Ahmed, was alleged to have a contact book with Al-
    Qaeda telephone numbers, written in invisible ink. He was convicted of
    terrorism.

   In 2010, the Federal Bureau of Investigation revealed that the Russian
    foreign intelligence service uses customized steganography software for
    embedding encrypted text messages inside image files for certain
    communications with "illegal agents" (agents under non-diplomatic
    cover) stationed abroad.

   Using steganography to embed a message in a pornographic image and
    posting it to a Usenet newsgroup is the cyberspace equivalent of a dead
    drop. To everyone else, it's just a picture. But to the receiver, there's a
    message in there waiting to be extracted.
http://www.8newsnow.com/story/498274/steganography-hidden-writing-how-terrorists-
communicate-online
Steganography Demo
Malwares Spying your
     System’s
Malware
A malware is a small program that runs hidden on an infected computer
With the help of a malware, an attacker gets access to stored
passwords in the compromised computer and would be able to
read personal documents, delete files and display pictures, and/or
show messages on the screen
Different Types of
             Malware
 Remote Access Data-Sending Malware

 Destructive Malware

 Denial-of-Service (DoS) Attack Malware

 FTP Trojans

 Security Software Disablers
What Do Malware
          Creators Look For
 Credit card information

 Account data (email addresses, passwords, user names, and so
  on)

 Confidential documents

 Financial data (bank account numbers, social security numbers,
  insurance information, and so on)

 Calendar information concerning the victim’s whereabouts

 Using the victim’s computer for illegal purposes, such as to hack,
  scan, flood, or infiltrate other machines on the network or Internet
Different Ways a Malware
 Can Get into a System
 Internet

 Pirated Software’s

 Free ScreenSavers

 E-Greeting Cards

 Untrusted Web Site Links

 USB Drive/ Images etc…
How does an attacker get a Trojan installed on the
                victim's computer?


 Using wrappers

 A wrapper attaches a given EXE application (such as
  games or office applications) to the Trojan executable

 The two programs are wrapped together into a single
  file. When the user runs the wrapped EXE, it first
  installs the Trojan in the background and then runs the
  wrapped application in the foreground

 The user only sees the latter application
Process
Zeus
   Zeus is a malware that steals banking information by keystroke
    logging and Form Grabbing

   Zeus is spread mainly through drive-by downloads and phishing
    schemes

   In June 2009, security company Prevx discovered that Zeus had
    compromised accounts of such companies as the Bank of America,
    NASA, Monster, ABC, Oracle,Play.com Cisco, Amazon, and
    BusinessWeek.

   2009 over 1.5 million phishing messages were sent on Facebook with
    the purpose of spreading the Zeus' trojan.

   From November 14–15, 2009 Zeus spread via e-mails purporting to be
    from Verizon Wireless. A total of nine million of these phishing e-mails
    were sent.

   The five countries with the most significant instances of infected
    machines are Egypt, the United States, Mexico, Saudi Arabia, and
http://www.fbi.gov/newyork/press-releases/2011/nikolay-garifulin-pleads-guilty-in-
manhattan-federal-court-to-involvement-in-global-bank-fraud-scheme-that-used-zeus-
trojan-to-steal-millions-of-dollars-from-u.s.-bank-accounts
Trojan Demo
Key-Logger
Key-logger's stealing away your
      Private Passwords
 A program or hardware device that captures every
  key depression on the computer

 Used to monitor employee performance

 Used to seal private information

 Besides being used for legitimate purposes,
  keyloggers can be hardware installed to a computer or
  software that is used to collect sensitive information.
Hackers Motive of Key-
          Logger
 The types of sensitive information include:
     Usernames & Passwords
        Credit Card Numbers
        Person Information such as Name, Address, etc.

These small devices connect directly on the end of a keyboard to the port
on the computer and look rather unassuming.
Preventive Measure
Use Anti-Virus Programs

Keep your system patched

Read Email with Attachments Carefully

Use Firewall Programs

Backup Important Files/Folders on separate storage
media
Preventive Measure
Use strong Passwords

Download and Install Software with Care

Avoid Social Engineering Attacks

Avoid Public Computers

Learn & Arm your self against Cyber Attacks
Thank You

More Related Content

What's hot (20)

A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Internet security
Internet securityInternet security
Internet security
 
Computer Virus
Computer Virus Computer Virus
Computer Virus
 
Cyber warfare
Cyber warfareCyber warfare
Cyber warfare
 
Cyber Security | Patricia Watson
Cyber Security | Patricia WatsonCyber Security | Patricia Watson
Cyber Security | Patricia Watson
 
Hacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer NetworksHacking Vs Cracking in Computer Networks
Hacking Vs Cracking in Computer Networks
 
Access Controls Attacks
Access Controls AttacksAccess Controls Attacks
Access Controls Attacks
 
Surf smart
Surf smartSurf smart
Surf smart
 
2 2 the dangers of computer crime
2 2 the dangers of computer crime2 2 the dangers of computer crime
2 2 the dangers of computer crime
 
185
185185
185
 
Internet Security in Web 2.0
Internet Security in Web 2.0 Internet Security in Web 2.0
Internet Security in Web 2.0
 
hacking and its types
hacking and its typeshacking and its types
hacking and its types
 
INTERNET THREAT
INTERNET THREATINTERNET THREAT
INTERNET THREAT
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Internet Threats
Internet ThreatsInternet Threats
Internet Threats
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Cyber Attacks
Cyber AttacksCyber Attacks
Cyber Attacks
 

Similar to yoda at rotary_pune_club

The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxCathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxtidwellveronique
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesSouman Guha
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxCUInnovationTeam
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1indhuchezhian
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horsejyoti_lakhani
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGudipudiDayanandam
 
Information security
Information securityInformation security
Information securityIshaRana14
 

Similar to yoda at rotary_pune_club (20)

Presentation1
Presentation1Presentation1
Presentation1
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docxCathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
Cathy Dillon wrote 1. njRAT targeted Middle East high-level org.docx
 
External threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimesExternal threats to information system: Malicious software and computer crimes
External threats to information system: Malicious software and computer crimes
 
Ransomware
RansomwareRansomware
Ransomware
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
MALWARE
MALWAREMALWARE
MALWARE
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Ids 007 trojan horse
Ids 007 trojan horseIds 007 trojan horse
Ids 007 trojan horse
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Malware
MalwareMalware
Malware
 
Guest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptxGuest Lecture-Computer and Cyber Security.pptx
Guest Lecture-Computer and Cyber Security.pptx
 
CyberCrimes
CyberCrimesCyberCrimes
CyberCrimes
 
Information security
Information securityInformation security
Information security
 
my new HACKING
my new HACKINGmy new HACKING
my new HACKING
 
Dickmaster
DickmasterDickmaster
Dickmaster
 

Recently uploaded

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

yoda at rotary_pune_club

  • 1. How Hackers Get Into Your System By Antriksh Shah null The Open Security Community
  • 2. Introduction to Hackers Refers to a person who enjoys learning the details of computer systems and to stretch his/her capabilities Refers to a person who uses his hacking skills for offensive purposes Hacking Describes the rapid development of new programs or the reverse engineering of the already existing software to make the code better and more efficient
  • 4. Steganography  Greek Words:  STEGANOS – “Covered”  GRAPHIE – “Writing”  Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message.  This can be achieve by concealing the existence of information within seemingly harmless carriers or cover  Carrier: text, image, video, audio, etc
  • 5. Ancient Steganography  Demeratus in 440 BC sent a warning about a forthcoming attack to Greece by writing it on a wooden panel and covering it in wax.  Histiaeus, who shaved the head of his most trusted slave and tattooed a message on it. After his hair had grown the message was hidden. The purpose was to instigate a revolt against the Persians.
  • 6. Use of Steganography by Terrorist  Al Qaeda's use of steganography is somewhat simpler: In 2008 a British man,Rangzieb Ahmed, was alleged to have a contact book with Al- Qaeda telephone numbers, written in invisible ink. He was convicted of terrorism.  In 2010, the Federal Bureau of Investigation revealed that the Russian foreign intelligence service uses customized steganography software for embedding encrypted text messages inside image files for certain communications with "illegal agents" (agents under non-diplomatic cover) stationed abroad.  Using steganography to embed a message in a pornographic image and posting it to a Usenet newsgroup is the cyberspace equivalent of a dead drop. To everyone else, it's just a picture. But to the receiver, there's a message in there waiting to be extracted.
  • 7.
  • 8.
  • 11. Malwares Spying your System’s
  • 12. Malware A malware is a small program that runs hidden on an infected computer With the help of a malware, an attacker gets access to stored passwords in the compromised computer and would be able to read personal documents, delete files and display pictures, and/or show messages on the screen
  • 13. Different Types of Malware  Remote Access Data-Sending Malware  Destructive Malware  Denial-of-Service (DoS) Attack Malware  FTP Trojans  Security Software Disablers
  • 14. What Do Malware Creators Look For  Credit card information  Account data (email addresses, passwords, user names, and so on)  Confidential documents  Financial data (bank account numbers, social security numbers, insurance information, and so on)  Calendar information concerning the victim’s whereabouts  Using the victim’s computer for illegal purposes, such as to hack, scan, flood, or infiltrate other machines on the network or Internet
  • 15. Different Ways a Malware Can Get into a System  Internet  Pirated Software’s  Free ScreenSavers  E-Greeting Cards  Untrusted Web Site Links  USB Drive/ Images etc…
  • 16. How does an attacker get a Trojan installed on the victim's computer?  Using wrappers  A wrapper attaches a given EXE application (such as games or office applications) to the Trojan executable  The two programs are wrapped together into a single file. When the user runs the wrapped EXE, it first installs the Trojan in the background and then runs the wrapped application in the foreground  The user only sees the latter application
  • 18. Zeus  Zeus is a malware that steals banking information by keystroke logging and Form Grabbing  Zeus is spread mainly through drive-by downloads and phishing schemes  In June 2009, security company Prevx discovered that Zeus had compromised accounts of such companies as the Bank of America, NASA, Monster, ABC, Oracle,Play.com Cisco, Amazon, and BusinessWeek.  2009 over 1.5 million phishing messages were sent on Facebook with the purpose of spreading the Zeus' trojan.  From November 14–15, 2009 Zeus spread via e-mails purporting to be from Verizon Wireless. A total of nine million of these phishing e-mails were sent.  The five countries with the most significant instances of infected machines are Egypt, the United States, Mexico, Saudi Arabia, and
  • 22. Key-logger's stealing away your Private Passwords  A program or hardware device that captures every key depression on the computer  Used to monitor employee performance  Used to seal private information  Besides being used for legitimate purposes, keyloggers can be hardware installed to a computer or software that is used to collect sensitive information.
  • 23. Hackers Motive of Key- Logger  The types of sensitive information include:  Usernames & Passwords  Credit Card Numbers  Person Information such as Name, Address, etc. These small devices connect directly on the end of a keyboard to the port on the computer and look rather unassuming.
  • 24. Preventive Measure Use Anti-Virus Programs Keep your system patched Read Email with Attachments Carefully Use Firewall Programs Backup Important Files/Folders on separate storage media
  • 25. Preventive Measure Use strong Passwords Download and Install Software with Care Avoid Social Engineering Attacks Avoid Public Computers Learn & Arm your self against Cyber Attacks