SlideShare a Scribd company logo
Introduction to
Malwares
NATIONAL CONFERENCE ON CYBER SECURITY AND DIGITAL
THREATS 2015
Are you a Victim ?
Abdelhamid Limami
IT Security Consultant @ ITDefence
Overview
 What Malwares Are ?
 Types of Malwares.
 How do they infect hosts ?
 How do they Hide ?
 How do they propagate?
 Statistic Data.
 How They can be Detected ?
 Demo (Real scenario).
 Conclusion.
What is A Malware ?
Malicious Software :
• any software that brings harm to a computer system
which steal protected data, delete documents or add
software without user permission.
• Generally they are stealthy and Invisible.
Types of Malwares
 Virus
 Backdoor
 Trojans
 Rootkit
 Adware
 Worm
 Ransomware
 …
Virus
 Virus is a computer program usually hidden within another
seemingly innocuous program that produces copies of itself and
inserts them into other programs or files, and that usually performs
a malicious action (such as destroying data or corrupting the
system).
Trojan Horse
 Known as "Trojans" , is a type of malware that disguises itself as a
normal file or program to trick users into downloading and
installing malware. A Trojan can give a malicious party remote
access to an infected computer.
 It is possible for the attacker to steal data (logins, financial data,
even electronic money), install more malware, modify files,
monitor user activity (screen watching, keylogging, etc), use the
computer in botnets.
Worm
 Computer worm is a program that replicates itself in order to spread
to other computers. Often, it uses a computer network to spread
itself, relying on security failures on the target computer to access it.
Unlike a computer virus, it does not need to attach itself to an
existing program.
 It doesn't need any user intervention.
 Worms often spread by sending mass emails with infected
attachments to users contacts.
Backdoors
 Backdoor is a technique in which a system security mechanism is
bypassed undetectably to access a computer or its data. It
exploits undocumented processes in the system's code to
secretly control a program, computer or network, while
attempting to remain undetected.
 Some backdoors are placed in the software by the original
programmer
 consists of 2 components -: the client and its server(s)
Rootkit
 A rootkit is a type of software designed to hide the fact that an
operating system has been compromised, sometimes by
replacing vital executable(s). Rootkits allow viruses and malware
to “hide in plain sight” by disguising as necessary files that your
antivirus software will overlook.
 An attacker can install it once they've obtained access on the
compromised machine.
 In other words, rootkits are all about hiding things.
How do they Infect us ?
Rogue Security Softwares
Ransomware
Drive-by downloads
Social Networks
How Do They Hide ?
 Hiding in plain sight:
• An entry in process list.
• Unknown process name.
• Unexpected Process.
• Process binary at unusual location.
• Process with unexpected user account/privilege.
 Hiding deep inside:
• No entry in process list.
• Unexpected library.
• Unusual usage of system resources.
• Re-appearance of some files after deletion.
How do they propagate?
File sharing & P2P
Adware
Email spoofing & phishing
Some Stats
MALWARE INFECTIONS BY TYPE IN Q1 2013 (PandaLabs)
Av-Test 2014 statistics
How they can be Detected ?
Malware Symptoms:
 Computer is running extremely slow (seems like a Virus).
 Antivirus and firewall protection is unexpectedly disabled.
 Modifications on the Registry
 Unwanted toolbars on your web Browser.
 Even if you remove them, they might return each time you restart your
computer.
 Unfamiliar and peculiar error messages.
 programs won't run or files won't open.
 can't access certain drives on your computer.
 File sizes
Detection
 Analyze program behavior:
 Network access
 File open
 Attempt to delete file
 Attempt to modify the boot sector
 Use Sandbox:
 Running the executable in a VM
 Observe it
 File activity & Network TCP/UDP
 Memory
 Detect change by comparing checksum.
 Beware of pop-ups!
 Have an Anti-virus & Anti-Malware that is up to date.
 “It is not possible to build a perfect virus/malware detector “ (Cohen)
Demo Time
NO PWN, NO PARTY !
Conclusion
 Do Not Fear Malwares, Understand how they work!
 It’s not just Computer malwares: There’s Mobiles, ATM, POS … Malwares.
 Be Updated.
 Don’t Trust Unknown sources.
 Avoid Malwares is easier then removing.
Thank You!

More Related Content

What's hot

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
Lookout
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
rawaabdullah
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
Amjad Bhutto
 
Computer virus
Computer virusComputer virus
Computer virus
Ra Bia
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseSpandan Patnaik
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security riskshazirma
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
Gaurav Dalvi
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
Adeel Khurram
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
Annies Minu
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
Aasim Mushtaq
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
Shreya Singireddy
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
PraphullaShrestha1
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
Mohammad Shakirul islam
 
Types of malware
Types of malwareTypes of malware
Types of malware
techexpert2345
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
Abdul Rahman Sherzad
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
izzul
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
Vivek Sinha Anurag
 

What's hot (20)

What Is Spyware?
What Is Spyware?What Is Spyware?
What Is Spyware?
 
computer virus Report
computer virus Reportcomputer virus Report
computer virus Report
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
Computer virus
Computer virusComputer virus
Computer virus
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPESMALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
introduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horseintroduction to malwares,virus,trojan horse
introduction to malwares,virus,trojan horse
 
3.2.1 computer security risks
3.2.1 computer security risks3.2.1 computer security risks
3.2.1 computer security risks
 
Trojans and backdoors
Trojans and backdoorsTrojans and backdoors
Trojans and backdoors
 
Computer Security risks Shelly
Computer Security risks ShellyComputer Security risks Shelly
Computer Security risks Shelly
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Computer security risks
Computer security risksComputer security risks
Computer security risks
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Computer Security Presentation
Computer Security PresentationComputer Security Presentation
Computer Security Presentation
 
What is malware
What is malwareWhat is malware
What is malware
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Types of malware
Types of malwareTypes of malware
Types of malware
 
Web Application Security and Awareness
Web Application Security and AwarenessWeb Application Security and Awareness
Web Application Security and Awareness
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
Presentation on Web Attacks
Presentation on Web AttacksPresentation on Web Attacks
Presentation on Web Attacks
 

Viewers also liked

Malwares
MalwaresMalwares
Malwares
Claire Medolla
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
Stavia
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanMegan Bell
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Ferellica
 
Network virus
Network virusNetwork virus
Network virusA M
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
Pace IT at Edmonds Community College
 
Computer Malware
Computer MalwareComputer Malware
Computer Malwareaztechtchr
 

Viewers also liked (7)

Malwares
MalwaresMalwares
Malwares
 
Malware by Ms. Allwood
Malware by Ms. AllwoodMalware by Ms. Allwood
Malware by Ms. Allwood
 
Security Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus TrojanSecurity Awareness 9 10 09 V4 Virus Trojan
Security Awareness 9 10 09 V4 Virus Trojan
 
Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)Virus (Trojan Horse,Salami Attack)
Virus (Trojan Horse,Salami Attack)
 
Network virus
Network virusNetwork virus
Network virus
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Computer Malware
Computer MalwareComputer Malware
Computer Malware
 

Similar to Introduction to Malwares

TIC
TICTIC
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
sandeep shergill
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
Manish Kumar
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
Satria Ady Pradana
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
asujal2009
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
Mohammed Jaseem Tp
 
Dickmaster
DickmasterDickmaster
Dickmaster
DickMaster1
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
Satria Ady Pradana
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
JohnRebenRequinto1
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
Muhammad FAHAD
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
AsadbekAbdumannopov
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
CAS
 
Computer virus
Computer virusComputer virus
Computer virus
Ankita Shirke
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
piyushkamble6
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
Sagilasagi1
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
Computer virus
Computer virusComputer virus
Computer virus
Kaushik Vemani Venkata
 

Similar to Introduction to Malwares (20)

TIC
TICTIC
TIC
 
Malicious Software Identification
Malicious Software IdentificationMalicious Software Identification
Malicious Software Identification
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)Malware: To The Realm of Malicious Code (Training)
Malware: To The Realm of Malicious Code (Training)
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Type of Malware and its different analysis and its types !
Type of Malware and its different analysis and its types  !Type of Malware and its different analysis and its types  !
Type of Malware and its different analysis and its types !
 
Dickmaster
DickmasterDickmaster
Dickmaster
 
(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code(Training) Malware - To the Realm of Malicious Code
(Training) Malware - To the Realm of Malicious Code
 
Computer-software (1).pptx
Computer-software (1).pptxComputer-software (1).pptx
Computer-software (1).pptx
 
Module 5.Malware
Module 5.MalwareModule 5.Malware
Module 5.Malware
 
Module 5.pdf
Module 5.pdfModule 5.pdf
Module 5.pdf
 
Common Malware Types Vulnerability Management
Common Malware Types Vulnerability ManagementCommon Malware Types Vulnerability Management
Common Malware Types Vulnerability Management
 
viruses.pptx
viruses.pptxviruses.pptx
viruses.pptx
 
Final malacious softwares
Final malacious softwaresFinal malacious softwares
Final malacious softwares
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Computer virus
Computer virusComputer virus
Computer virus
 
CyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topicCyberSecurity presentation for basic knowledge about this topic
CyberSecurity presentation for basic knowledge about this topic
 
MALWARE AND ITS TYPES
MALWARE AND ITS TYPES MALWARE AND ITS TYPES
MALWARE AND ITS TYPES
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Computer virus
Computer virusComputer virus
Computer virus
 

Recently uploaded

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 

Recently uploaded (16)

Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 

Introduction to Malwares

  • 1. Introduction to Malwares NATIONAL CONFERENCE ON CYBER SECURITY AND DIGITAL THREATS 2015 Are you a Victim ? Abdelhamid Limami IT Security Consultant @ ITDefence
  • 2. Overview  What Malwares Are ?  Types of Malwares.  How do they infect hosts ?  How do they Hide ?  How do they propagate?  Statistic Data.  How They can be Detected ?  Demo (Real scenario).  Conclusion.
  • 3. What is A Malware ? Malicious Software : • any software that brings harm to a computer system which steal protected data, delete documents or add software without user permission. • Generally they are stealthy and Invisible.
  • 4. Types of Malwares  Virus  Backdoor  Trojans  Rootkit  Adware  Worm  Ransomware  …
  • 5. Virus  Virus is a computer program usually hidden within another seemingly innocuous program that produces copies of itself and inserts them into other programs or files, and that usually performs a malicious action (such as destroying data or corrupting the system).
  • 6. Trojan Horse  Known as "Trojans" , is a type of malware that disguises itself as a normal file or program to trick users into downloading and installing malware. A Trojan can give a malicious party remote access to an infected computer.  It is possible for the attacker to steal data (logins, financial data, even electronic money), install more malware, modify files, monitor user activity (screen watching, keylogging, etc), use the computer in botnets.
  • 7. Worm  Computer worm is a program that replicates itself in order to spread to other computers. Often, it uses a computer network to spread itself, relying on security failures on the target computer to access it. Unlike a computer virus, it does not need to attach itself to an existing program.  It doesn't need any user intervention.  Worms often spread by sending mass emails with infected attachments to users contacts.
  • 8. Backdoors  Backdoor is a technique in which a system security mechanism is bypassed undetectably to access a computer or its data. It exploits undocumented processes in the system's code to secretly control a program, computer or network, while attempting to remain undetected.  Some backdoors are placed in the software by the original programmer  consists of 2 components -: the client and its server(s)
  • 9. Rootkit  A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable(s). Rootkits allow viruses and malware to “hide in plain sight” by disguising as necessary files that your antivirus software will overlook.  An attacker can install it once they've obtained access on the compromised machine.  In other words, rootkits are all about hiding things.
  • 10. How do they Infect us ?
  • 15. How Do They Hide ?  Hiding in plain sight: • An entry in process list. • Unknown process name. • Unexpected Process. • Process binary at unusual location. • Process with unexpected user account/privilege.  Hiding deep inside: • No entry in process list. • Unexpected library. • Unusual usage of system resources. • Re-appearance of some files after deletion.
  • 16. How do they propagate?
  • 19. Email spoofing & phishing
  • 20. Some Stats MALWARE INFECTIONS BY TYPE IN Q1 2013 (PandaLabs) Av-Test 2014 statistics
  • 21. How they can be Detected ?
  • 22. Malware Symptoms:  Computer is running extremely slow (seems like a Virus).  Antivirus and firewall protection is unexpectedly disabled.  Modifications on the Registry  Unwanted toolbars on your web Browser.  Even if you remove them, they might return each time you restart your computer.  Unfamiliar and peculiar error messages.  programs won't run or files won't open.  can't access certain drives on your computer.  File sizes
  • 23. Detection  Analyze program behavior:  Network access  File open  Attempt to delete file  Attempt to modify the boot sector  Use Sandbox:  Running the executable in a VM  Observe it  File activity & Network TCP/UDP  Memory  Detect change by comparing checksum.  Beware of pop-ups!  Have an Anti-virus & Anti-Malware that is up to date.  “It is not possible to build a perfect virus/malware detector “ (Cohen)
  • 24. Demo Time NO PWN, NO PARTY !
  • 25. Conclusion  Do Not Fear Malwares, Understand how they work!  It’s not just Computer malwares: There’s Mobiles, ATM, POS … Malwares.  Be Updated.  Don’t Trust Unknown sources.  Avoid Malwares is easier then removing.