SlideShare a Scribd company logo
1 of 29
SPYWARES
What Is Spyware ?
 Applications that send information
from your computer to the creator of
the spyware
 Can be used by web sites for
marketing information, to determine
their stance with regard to
competitors and market trends
What Is Spyware?
 Software or hardware installed on a
computer without the user's knowledge
which gathers information about that
user for later retrieval by whomever
controls the spyware.
 Spyware can be broken down into two
different categories.
What Is Spyware?
 Surveillance software:
Includes key loggers, screen capture
devices, and Trojans. These would be
used by corporations, private
detectives, law enforcement,
intelligence agencies, suspicious
spouses.
What Is Spyware?
 Advertising spyware:
Software that is installed alongside other
software or via active x controls on the
internet, often without the user's
knowledge, or without full disclosure
that it will be used for gathering personal
information and/or showing the user ads.
What Is Spyware?
 Advertising spyware logs information
about the user, possibly including
passwords, email addresses, web
browsing history, online buying habits,
the computer's hardware and software
configuration, the name, age, sex,etc.
Computers Get Infected
Web page
Email
Downloading
End User License Agreement (EULA)
Spyware Symptoms
 Adware forms of spyware often operate
silently. Others display "pop-up" ads on your
computer's desktop or on top of other Web
pages.
 More aggressive spyware will reset your
browser's home page.
 The most damaging spyware programs can
actually install "trojans" -- computer
programs which allow other people to
remotely access an infected computer.
SPYWARES
CLASS OF
Tracking Cookies
 Cookies that can track your Web
activities
 May include cookies that contain
user names
passwords
other private information that you enter on
web sites (SSN, banking info, credit cards)
Browser Hijacking
 Hosts File
Redefine the addresses of trusted sources,
i.e. anti-virus tools, software patches and
upgrades
 Home Page
Redefine the page that opens up when you
start your browser
Browser Hijacking
 Search Page
Redefine the page that opens up when you
enter an undefined URL
Redefine the page that opens up when you
click your “Search” button
 Error Pages
Redefine the pages that open when an
error occurs.
Keyloggers
Were originally designed to record
all keystrokes of users in order to
find passwords, credit card numbers,
and other sensitive information
Spybots
 Spybots are the prototypical example of
“spyware.” A spybot monitors a user’s
behavior, collecting logs of activity and
transmitting them to third parties.
 A spybot may be installed as a browser helper
object, it may exist as a DLL on the host
computer, or it may run as a separate process
launched whenever the host OS boots.
Malware & Adware
 Malware
Refers to a variety of malicious software,
including viruses, worms, Trojan horses.
 Adware
Software that displays advertisements tuned
to the user’s current activity, potentially
reporting aggregate or anonymized
browsing behavior to a third party
Gator, Cydoor, and eZula
 All three are “spybot” or “adware” class
programs
 They are typically packaged with popular
free software.
 They all send and retrieve information
from remote servers using the HTTP
protocol.
Gator
 Gator is adware that collects and transmits
information about a user’s Web activity.
 Gator may log and transmit URLs that the user
visits, identifying information such as the user’s first
name and zip code, and information about the
configuration and software on the user’s machine.
 When a user installs one of several free software
programs produced by Claria Corporation (the
company that produces Gator), such as a free
calendar application or a time synchronization client
Cydoor
 Cydoor displays targeted pop-up
advertisements
 whose contents are dictated by the user’s
browsing history. When a user is connected to
the Internet, the Cydoor client prefetches
advertisements from the Cydoor servers. These
advertisements are displayed whenever the
user runs an application that contains Cydoor,
whether the user is online or offline.
eZula
 eZula attaches itself to a client’s Web browser
and modifies incoming HTML to create links to
advertisers from specific keywords. When a
client is infected with eZula, these artificial links
are displayed and highlighted within rendered
HTML. It has been reported that eZula can
modify existing HTML links to redirect them to
its own advertisers, but we have not observed
this ourselves.
eZula
 It is also known as TopText, ContextPro or
HotText.
 It is bundled with several popular filesharing
applications (such as Kazaa and LimeWire),
and it can also be downloaded as a
standalone tool. eZula runs as a separate
process (ezulamain.exe) and it includes the
ability to self-update
Preventive Techniques
 Don't install any application unless you are
certain of what it does or where it came from.
 Always read the license agreement
 Software and OS upgrades
 Utilize browser’s security settings
 Use Anti-Spyware
SPYWARES
ANTI
Spy Sweeper
Spy Sweeper
Microsoft Windows AntiSpyware
Microsoft Windows AntiSpyware
Spyware Doctor
SALAMAT
References
 http://www.webopedia.com
 http://www.wikipedia.org
 http://www.bendelmen.org
 http://lavasoftusa.com
 http://commerce.senate.gov

More Related Content

What's hot

Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
Joel May
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
azman21
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Akhil Sharma
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
aimane
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 

What's hot (20)

Spyware
SpywareSpyware
Spyware
 
DEFINING A SPYWARE
DEFINING A SPYWAREDEFINING A SPYWARE
DEFINING A SPYWARE
 
Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!Viruses Spyware and Spam, Oh My!
Viruses Spyware and Spam, Oh My!
 
spyware
spyware spyware
spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware
SpywareSpyware
Spyware
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
S P Y W A R E4 S I K
S P Y W A R E4 S I KS P Y W A R E4 S I K
S P Y W A R E4 S I K
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
P R I V A C Y!!!
P R I V A C Y!!!P R I V A C Y!!!
P R I V A C Y!!!
 
Aiman
AimanAiman
Aiman
 
Spyware and adware
Spyware and  adwareSpyware and  adware
Spyware and adware
 
Spyware
SpywareSpyware
Spyware
 
Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)Types of attack -Part3 (Malware Part -1)
Types of attack -Part3 (Malware Part -1)
 
Introduction to Malwares
Introduction to MalwaresIntroduction to Malwares
Introduction to Malwares
 
What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
Spyware-A online threat to privacy
Spyware-A online threat to privacySpyware-A online threat to privacy
Spyware-A online threat to privacy
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 

Similar to Spyware report

Similar to Spyware report (20)

Spyware (1).ppt
Spyware (1).pptSpyware (1).ppt
Spyware (1).ppt
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Types of Malware.docx
Types of Malware.docxTypes of Malware.docx
Types of Malware.docx
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Day2.pptx
Day2.pptxDay2.pptx
Day2.pptx
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Aiims Chip
Aiims ChipAiims Chip
Aiims Chip
 
Malware
MalwareMalware
Malware
 
Viruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise NetworksViruses & Malware: Effects On Enterprise Networks
Viruses & Malware: Effects On Enterprise Networks
 
CYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptxCYBER SAFETY COMP PPT.pptx
CYBER SAFETY COMP PPT.pptx
 
Amenazas Informática
Amenazas InformáticaAmenazas Informática
Amenazas Informática
 
Identifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting MalwareIdentifying, Monitoring, and Reporting Malware
Identifying, Monitoring, and Reporting Malware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Spyware.
Spyware.Spyware.
Spyware.
 
Spyware.
Spyware.Spyware.
Spyware.
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 
Spiffy Spyware Stuff
Spiffy Spyware StuffSpiffy Spyware Stuff
Spiffy Spyware Stuff
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 

Spyware report

  • 2. What Is Spyware ?  Applications that send information from your computer to the creator of the spyware  Can be used by web sites for marketing information, to determine their stance with regard to competitors and market trends
  • 3. What Is Spyware?  Software or hardware installed on a computer without the user's knowledge which gathers information about that user for later retrieval by whomever controls the spyware.  Spyware can be broken down into two different categories.
  • 4. What Is Spyware?  Surveillance software: Includes key loggers, screen capture devices, and Trojans. These would be used by corporations, private detectives, law enforcement, intelligence agencies, suspicious spouses.
  • 5. What Is Spyware?  Advertising spyware: Software that is installed alongside other software or via active x controls on the internet, often without the user's knowledge, or without full disclosure that it will be used for gathering personal information and/or showing the user ads.
  • 6. What Is Spyware?  Advertising spyware logs information about the user, possibly including passwords, email addresses, web browsing history, online buying habits, the computer's hardware and software configuration, the name, age, sex,etc.
  • 7. Computers Get Infected Web page Email Downloading End User License Agreement (EULA)
  • 8. Spyware Symptoms  Adware forms of spyware often operate silently. Others display "pop-up" ads on your computer's desktop or on top of other Web pages.  More aggressive spyware will reset your browser's home page.  The most damaging spyware programs can actually install "trojans" -- computer programs which allow other people to remotely access an infected computer.
  • 10. Tracking Cookies  Cookies that can track your Web activities  May include cookies that contain user names passwords other private information that you enter on web sites (SSN, banking info, credit cards)
  • 11. Browser Hijacking  Hosts File Redefine the addresses of trusted sources, i.e. anti-virus tools, software patches and upgrades  Home Page Redefine the page that opens up when you start your browser
  • 12. Browser Hijacking  Search Page Redefine the page that opens up when you enter an undefined URL Redefine the page that opens up when you click your “Search” button  Error Pages Redefine the pages that open when an error occurs.
  • 13. Keyloggers Were originally designed to record all keystrokes of users in order to find passwords, credit card numbers, and other sensitive information
  • 14. Spybots  Spybots are the prototypical example of “spyware.” A spybot monitors a user’s behavior, collecting logs of activity and transmitting them to third parties.  A spybot may be installed as a browser helper object, it may exist as a DLL on the host computer, or it may run as a separate process launched whenever the host OS boots.
  • 15. Malware & Adware  Malware Refers to a variety of malicious software, including viruses, worms, Trojan horses.  Adware Software that displays advertisements tuned to the user’s current activity, potentially reporting aggregate or anonymized browsing behavior to a third party
  • 16. Gator, Cydoor, and eZula  All three are “spybot” or “adware” class programs  They are typically packaged with popular free software.  They all send and retrieve information from remote servers using the HTTP protocol.
  • 17. Gator  Gator is adware that collects and transmits information about a user’s Web activity.  Gator may log and transmit URLs that the user visits, identifying information such as the user’s first name and zip code, and information about the configuration and software on the user’s machine.  When a user installs one of several free software programs produced by Claria Corporation (the company that produces Gator), such as a free calendar application or a time synchronization client
  • 18. Cydoor  Cydoor displays targeted pop-up advertisements  whose contents are dictated by the user’s browsing history. When a user is connected to the Internet, the Cydoor client prefetches advertisements from the Cydoor servers. These advertisements are displayed whenever the user runs an application that contains Cydoor, whether the user is online or offline.
  • 19. eZula  eZula attaches itself to a client’s Web browser and modifies incoming HTML to create links to advertisers from specific keywords. When a client is infected with eZula, these artificial links are displayed and highlighted within rendered HTML. It has been reported that eZula can modify existing HTML links to redirect them to its own advertisers, but we have not observed this ourselves.
  • 20. eZula  It is also known as TopText, ContextPro or HotText.  It is bundled with several popular filesharing applications (such as Kazaa and LimeWire), and it can also be downloaded as a standalone tool. eZula runs as a separate process (ezulamain.exe) and it includes the ability to self-update
  • 21. Preventive Techniques  Don't install any application unless you are certain of what it does or where it came from.  Always read the license agreement  Software and OS upgrades  Utilize browser’s security settings  Use Anti-Spyware
  • 29. References  http://www.webopedia.com  http://www.wikipedia.org  http://www.bendelmen.org  http://lavasoftusa.com  http://commerce.senate.gov