SlideShare a Scribd company logo
1 of 38
WARNING: DEFINITIONS ARE NOT CLEAN
• SIMPLIFICATIONS OF DEFINITIONS INTRODUCE ERRORS
• SEMANTICS WASTE TIME
UNDERSTANDING RISK
• SECURE COMPUTER === PICKY COMPUTER
• CAN YOUR SYSTEM SPARE THE RESOURCES?
• DO YOU REALLY NEED THIS LEVEL OF PROTECTION?
• IS YOUR PROTECTION DUMB?
MALWARE
• SOFTWARE DESIGNED AND EXECUTED FOR MALICIOUS INTENT
• TOLLING
• STEALING
• GENERAL LAW BREAKING
TERMINOLOGY
• VIRUSES
• ATTACHES ITSELF TO A PROGRAM AND PROPAGATES ITSELFTHROUGHOUT THE SYSTEM
• WORMS
• STANDALONE PROGRAM THAT CAN PROPAGATEITSELF TO OTHERSYSTEMS OVER A NETWORK
• TROJAN HORSE
• MASQUERADESAS LEGITIMATE SOFTWARE OR BUNDLES ITSELFWITH LEGITIMATESOFTWARE.
• POTENTIALLY UNDESIRABLE PROCESSES (PUPS)
• RUNSAS HIDDEN PROCESSES
• COMMAND AND CONTROL (C&C, C2)
• A SERVER THE ATTACKUSESTO ISSUE COMMANDS TO INFECTEDSYSTEMS
TERMINOLOGY PT. 2
• “IN THE WILD”
• WHEN MALWAREOR ATTACKSARE FOUNDON THE OPENNET INSTEAD OF A LAB ENVIRONMENT
• ZERO DAY (0DAY, “OH-DAY”)
• SECURITYBUG IN A PROGRAM THATIS UNKNOWNAT TIME OF USE
• VULNERABILITY
• FEATURESOR BUGSIN PROGRAMMING THATCAN HAVEUNINTENDED USES
• EXPLOIT
• THE RESULTS OF A VULNERABILITY
• SCRIPT KIDDIES (SKIDDIES)
• WANNABEHACKERSUSING PREMADETOOLS INSTEAD OF LEARNING
• INSULT
TYPES OF ATTACKS
• ADWARE
• DELIVERS ADVERTISEMENTS TO THE USER
• SPYWARE
• SOFTWARETHAT COLLECTS INFORMATIONABOUT THE USER.(KEY LOGGING, RAM SCRAPING)
• BOTS
• SOFTWARETHAT AUTOMATICALLY PERFORMSA TASK
• RANSOMWARE
• REMOVES USERACCESSTO FILES AND DISPLAYS INSTRUCTIONS ON HOW THE USER CAN GET ACCESS BACK
• ROOTKITS
• PROVIDES REMOTEACCESS TO A SYSTEMAND AVOIDS ANTIVIRUSDETECTION
• SECURITYBUGS/EXPLOITS
• UNINTENDED ERRORS IN PROGRAMMING THAT ALLOW FORMALICIOUS EXPLOITATION
TYPES OF ATTACKS PT. 2
• BACKDOORS
• LEAVES AN ENTRY POINT FOR ATTACKERSTO REGAIN ACCESSTO THE SYSTEM
• DOS/DDOS
• OVERLOAD SERVERSWITH REQUESTS TO PREVENT USABILITY
• PHISHING
• SOCIAL ENGINEERING TRICKUSER INTO INSTALLING MALWARE
• MACROS
• SCRIPTS ATTACHEDTO DOCUMENTS THAT ARE OPENED BY THE DOCUMENT VIEWER
• DROPPERS
• TOOL USED TO UPLOAD MALWARE TO A USER
CREATION/TOOLS
• SKIDDYKIT DEVELOPERS
• INDIVIDUALS
• HACKING GROUPS
• HACKINGTEAM
• EXPLOIT KITS
• MIRAI
• WAREZ
• ANGLER
• EVOLUTION
• TWEAKING PREMADE MALWARE
RED FLAGS
• SYSTEM IS SLOWER THAN USUAL
• MAGICAL POPUPS
• SMALL TRAFFIC PULSES
• UNKNOWN PROCESSES RUNNING
RED FLAGS PT. 2
• INVOLUNTARY SETTING CHANGES
• BROWSER HOMEPAGE
• STARTUP PROGRAMS
• MAGICAL CMD PROMPTS
• MAGICAL WEBCAM ON
• MAGICAL SHORTCUTS
• YOUR COMPUTER WON’T LET YOU DOWNLOAD AN ANTIVIRUS
ANTIVIRUS
• MALWARE BYTES
• WINDOWS DEFENDER
• CLAM AV
FIREWALL RULES
• LINUX UNCOMPLICATED FIREWALL (UFW/GUFW)
• WINDOWS FIREWALL
• MAC FIREWALL
• PALO ALTO
DISABLE AUTO-RUN APPLICATIONS
• MSCONFIG
• AUTOSTART FOLDERS AND OPTIONS
EMAIL FILTERS
• SPAM
• DON’T LOAD EXTERNAL GRAPHICS
• VIEW AS TEXT
TRAFFIC AND LOG ANALYSIS (IDS/IPS)
• SPLUNK
• PROXY
• SNORT
• OSSEC
REMOVE UNUSED PROGRAMS
• UNSUPPORTED PROGRAMS
• ONE-TIME USE PROGRAMS
SAFE DOWNLOADING/INSTALLING
• WATCH FOR FREEWARE ADD-ONS
• DON’T EXPRESS INSTALL
SAFE BROWSING
• GOOGLE A WEBSITE INSTEAD OF TYPING IT IN
• USE A SERIF FONT
• CHECK VIRUSTOTAL
• ADD-ONS
• NOSCRIPT
• ADBLOCKERS
• WOT
STAY PATCHED
• UPDATES ARE MOSTLY SENT OUT WHEN VULNERABILITIES ARE FIXED
SANDBOXING
• FIREJAIL
• BITBOX
• VIRTUAL MACHINES
KNOW YOUR SYSTEM
• KNOW YOUR SYSTEM
BACKUP YOUR SYSTEM
• BACKUP YOUR SYSTEM
EXTRA TALKS
HEART BLEED
• OPENSSL/TLS DECRYPTION VULNERABILITY
MIRAI
• IOT BOTNET
ANGLER
DARKCOMMET
• REMOTE ACCESS/ADMINISTRATION TOOL
ZEUS
• TROJAN VIRUS AIMED AT THE FINANCIAL SECTOR
STUXNET
• FIRST KNOWN CYBER WEAPON OF INTERNATIONAL WARFARE
LUCKY
• RANSOMWARE
SHELLSHOCK
• PRIVILEGE ESCALATION ON INTERNET FACING UNIX SYSTEMS
CODE RED
• DDOS WORM
QUESTIONS
• HTTPS://YOUTU.BE/MBYRZVN3UXS

More Related Content

What's hot

Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackDragos, Inc.
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore developmentgmaran23
 
Behavior-Based Defense in ICS
Behavior-Based Defense in ICSBehavior-Based Defense in ICS
Behavior-Based Defense in ICSDragos, Inc.
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown AlienVault
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionDragos, Inc.
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud AdoptionProtectWise
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutionssecurityxploded
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration testsPriyanka Aash
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureNRC
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions Dragos, Inc.
 
SDN Analytics & Security
SDN Analytics & Security  SDN Analytics & Security
SDN Analytics & Security Scott Raynovich
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchLancope, Inc.
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security ProductsDigital Bond
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionMarketingArrowECS_CZ
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointLancope, Inc.
 

What's hot (20)

Reassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber AttackReassessing the 2016 CRASHOVERRIDE Cyber Attack
Reassessing the 2016 CRASHOVERRIDE Cyber Attack
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore development
 
Behavior-Based Defense in ICS
Behavior-Based Defense in ICSBehavior-Based Defense in ICS
Behavior-Based Defense in ICS
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption7 Security Requirements to Accelerate Cloud Adoption
7 Security Requirements to Accelerate Cloud Adoption
 
Malicious Client Detection using Machine learning
Malicious Client Detection using Machine learningMalicious Client Detection using Machine learning
Malicious Client Detection using Machine learning
 
Fingerprinting healthcare institutions
Fingerprinting healthcare institutionsFingerprinting healthcare institutions
Fingerprinting healthcare institutions
 
Breaking and entering how and why dhs conducts penetration tests
Breaking and entering  how and why dhs conducts penetration testsBreaking and entering  how and why dhs conducts penetration tests
Breaking and entering how and why dhs conducts penetration tests
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-SecureRADAR - Le nouveau scanner de vulnérabilité par F-Secure
RADAR - Le nouveau scanner de vulnérabilité par F-Secure
 
How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions  How to Respond to Industrial Intrusions
How to Respond to Industrial Intrusions
 
SDN Analytics & Security
SDN Analytics & Security  SDN Analytics & Security
SDN Analytics & Security
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
The Future of ICS Security Products
The Future of ICS Security ProductsThe Future of ICS Security Products
The Future of ICS Security Products
 
Staying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day ProtectionStaying One Step Ahead with Zero-Day Protection
Staying One Step Ahead with Zero-Day Protection
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Qradar as a SOC core
Qradar as a SOC coreQradar as a SOC core
Qradar as a SOC core
 

Similar to introtomalware

Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet EtiquteAnay Mishra
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield, Inc.
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondAlgoSec
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationJoshua Prince
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation Maytal Levi
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCharles Cline
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comAravind R
 
Assume Compromise
Assume CompromiseAssume Compromise
Assume CompromiseZach Grace
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingDavid Strom
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017TriNimbus
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security OperationsSam Bowne
 
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...SolarWinds
 

Similar to introtomalware (20)

Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...Seguridad de la Información y Controles contra Hackers - Getting hacked 101  ...
Seguridad de la Información y Controles contra Hackers - Getting hacked 101 ...
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
 
Internet Etiqute
Internet EtiquteInternet Etiqute
Internet Etiqute
 
NormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration OverviewNormShield Cyber Threat & Vulnerability Orchestration Overview
NormShield Cyber Threat & Vulnerability Orchestration Overview
 
Ransomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respondRansomware Attack: Best Practices to proactively prevent contain and respond
Ransomware Attack: Best Practices to proactively prevent contain and respond
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Inetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentationInetsecurity.in Ethical Hacking presentation
Inetsecurity.in Ethical Hacking presentation
 
Tying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigationTying cyber attacks to business processes, for faster mitigation
Tying cyber attacks to business processes, for faster mitigation
 
Cyber Security.pdf
Cyber Security.pdfCyber Security.pdf
Cyber Security.pdf
 
cloud basics.pptx
cloud basics.pptxcloud basics.pptx
cloud basics.pptx
 
Cyber Security Overview for Small Businesses
Cyber Security Overview for Small BusinessesCyber Security Overview for Small Businesses
Cyber Security Overview for Small Businesses
 
Cybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.comCybersecurity Basics - Aravindr.com
Cybersecurity Basics - Aravindr.com
 
Assume Compromise
Assume CompromiseAssume Compromise
Assume Compromise
 
How to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computingHow to make the move towards hybrid cloud computing
How to make the move towards hybrid cloud computing
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017Web App Security Presentation by Ryan Holland - 05-31-2017
Web App Security Presentation by Ryan Holland - 05-31-2017
 
7. Security Operations
7. Security Operations7. Security Operations
7. Security Operations
 
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...
Q42015 SolarWinds Federal SE Webinar - Best Practices for IT Asset Discovery:...
 

introtomalware