2. SPYWARE
• Spyware is any technology that aids in gathering information about a person
or organization without their knowledge. On the Internet (where it is
sometimes called a spybot or tracking software), spyware is programming
that is put in someone's computer to secretly gather information about the
user and relay it to advertisers or other interested parties.
3. EXAMPLE
• 1.) CoolWebSearch. This is a group of programs that has the ability to exploit the weaknesses of
Internet Explorer. This spyware can manipulate direct traffic to advertisements on coolwebsearch.com.
Also, it has the ability to display pop-up ads,
• 2.) Internet Optimizer (also known as DyFuCa). Ever see an error page by internet explorer? Well this
spyware takes you to advertisements instead of the error page. For example, when a user follows a
broken link or enters a wrong URL, they are directed to a page of advertisements that are strategically
placed. However, one weakness of this spyware, is that it can¡¯t access password-protected sites
because of HTTP Basic authentication
• 3.) Zango (formerly 180 Solutions). This spyware transmits detailed information to advertisers about the
Web sites which you visit. Also, it has the ability to alter HTTP request for affiliates linked from a web
site, so the advertisers can make unearned profits.
• 4.) HuntBar (also know as WinTools). Used by ActiveX, which is downloaded at affiliate websites, or by
advertisements displayed by other spyware programs. This is a prime example of how spyware can
install more syware. These spyware can add toolbars to internet explorer, track your browsing behavior,
and redirect you to affiliate references, which display even more advertisements.
5.) Zlob Trojan. This spyware downloads itself to your computer via ActiveX code and reports your
information back to control server. Some of this information that is stolen from you can be your search
history, keystrokes, and the Zlob Trojan can hijack routers set to defaults.
4. LATEST RELEASE
• WikiLeaks has released a new set of documents in the CIA Vault 7 leak, detailing a CIA spyware project
called ‘Athena/Hera’.
• The Athena malware targets computers running Windows XP to Windows 10, while the Hera variant
was created for Windows 8 to Windows 10.
• Protection for Spyware
• Here are five simple, but critical steps to protect your computer,
• Install Firewall
• Install Antivirus Software
• Install Anti-Spyware Software
• Use Complex and Secure Passwords
• Check on the Security Settings of the Browser
5. WORM
• A computer worm is self-replicating malware that duplicates itself to spread to uninfected computers.
Worms often use parts of an operating system that are automatic and invisible to the user. It is common
for worms to be noticed only when their uncontrolled replication consumes system resources, slowing
or halting other tasks.
6. EXAMPLE
1. Morris Worm (also known as the Great Worm)
• How big is the Internet, you ask? In 1988, Cornell University student named Robert Tappan Morris launched
• 99 lines of codein his quest for the answer.
2. Nimda
• In the fall of 2001, Nimda ("admin" spelled backwards) infected a variety of Microsoft machines very rapidly th
rough an emailexploit. Nimda spread by finding email addresses in .html files located in the user's web cache f
older and by looking at theuser's email contacts as retrieved by the MAPI service.
3. Code Red
• Friday the 13th was a bad day in July of 2001; it was the day Code Red was released. The worm took advantag
e of a bufferoverflow vulnerability in Microsoft IIS servers and would self-
replicate by exploiting the same vulnerability in other Microsoft IISmachines.
4. MSBlast
• The summer of 2003 wasn't much easier for those building anti-
virus definitions or those at businesses or academicinstitutions
5. Storm Worm
• One of the newest worms to hit the Internet was the Storm Worm, which debuted in January of 2007. Its nam
e came from awidely circulated email about the Kyrill weather storm in Europe, and its subject was "230 dead
as storm batters Europe." Thevirus first hit on January 19th, and three days later, the virus accounted for 8% of
all infected machines.
7. LATEST RELEASE WORM
• A highly virulent new strain of self-replicating ransomware shut down computers all over the world, in
part by appropriating a National Security Agency exploit that was publicly released last month by the
mysterious group calling itself Shadow Brokers.
• The malware, known as Wanna, Wannacry, or Wcry, has infected at least 75,000 computers,
8. ADWARE
• Adware is any software application in which advertising banners are displayed while a program is
running. The ads are delivered through pop-up windows or bars that appear on the program's user
interface. Adware is commonly created for computers, but may also be found on mobile devices.
• Example
• A perfect eDeskAd is considered to be malicious software, a destructive adware program that has
infected several homes users and many more businesses. It is packaged as ad-supported software that
provides targeted advertisements. It starts off in subtle fashion, functioning in stealth mode to avoid
detection. Over time, it begins to seize control, making alterations to your web browser with additional
buttons, toolbars and links.
9. PROTECTION
• # 1 - Keep your Windows security up to date: Though widely used, Microsoft Windows is one of the
most vulnerable systems on the market. It does provide you with a few tools that should always be
used. Be sure to keep your system current with weekly updates. This can be done directly from the
Microsoft website where configurations can be made to receive automatic updates.
• # 2 - Install a Firewall: Firewall applications are an essential part of any security system these days. It
will keep hackers out of your system while tracking outbound communications, a feature that will help
to determine if you've been infected with adware.
• # 3 - Install a reliable spyware program: A program such as DeskAd is so complex that it may go
undetected by anti-virus software. Because of this, your computer should be protected by an anti-
spyware scanner. This type of program is built with the technology specifically designed to detect and
remove these stubborn infections
LATEST RELAESE
YeaDesktop
Adware.YeaDesktop is an adware program that modifies browser settings and displays out of context pop-up
advertisements on the computer. It also redirects browsing activity to show advertisements.
10. TORJAN
• A Trojan horse or Trojan is a type of malware that is often disguised as legitimate software. Trojans can
be employed by cyber-thieves and hackers trying to gain access to users' systems. Users are typically
tricked by some form of social engineering into loading and executing Trojans on their systems. Once
activated, Trojans can enable cyber-criminals to spy on you, steal your sensitive data, and gain backdoor
access to your system. These actions can include:
• Deleting data
• Blocking data
• Modifying data
• Copying data
• Disrupting the performance of computers or computer networks
Example
• Trojan-Spy programs can spy on how you’re using your computer –
• for example, by tracking the data you enter via your keyboard, taking
• screen shots or getting a list of running applications.
11. LATEST TROJAN
• Shedun Android malware – 2015 (discovered)
• We've seen Android malware that takes your photos and videos for ransom, and there's one that can mimic your
phone's shutdown process and spy on you even though the phone appears to be off.
Protection
Protecting against Trojan Attacks
– Get an anti-virus scanner of the highest quality and, keep it up to date.
– Install a firewall to prevent hackers from entering the user system.
– Educate users to avoid opening e-mail files, sites, attachments etc.
– In Windows, do not open questionable file extensions such as “exe”, “vbs”, “com”, “bat” and, ensure you can view all
file extensions. Windows hides long extensions so the file maybe “xyz.vbs.jpg and, you see only exyz.jpg
– Install an executable server at mail server level as well as a virus scanner on the network.