Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Malware

No description
by

Faham Usman

on 23 May 2014

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of Malware

Information Security
Malware
Awareness Campaign
Agenda
Salim is your Cyber Security Advisor.
Aims at promoting, building and ensuring a safer & secure cyber environment and culture in the UAE.

About aeCERT
One of the initiatives of the UAE Telecommunications Regulatory Authority.
aeCERT is the United Arab Emirates Computer Emergency Response Team.
About aeCERT
Types of Malware
Introduction To Malware
History Of Malware
Example of Recent Malware Attacks
Mobile Malware
How Malware Spreads?
Malware Distribution
Channels
6 Most Common
Malware Variants
Conclusion
Summary
Questions
Contact
aeCERT
Salim (aeCERT)
@salim_aecert
For more information
www.aecert.ae
info@aecert.ae
The term Malware is derived from
“Malicious Software”.
A malicious software that is programmed by attackers to:
Penetrate into the victim's computer
Disrupt/damage the normal functioning
Deleting files
Stealing sensitive user data
It is a collective term used to refer to all types of variants including viruses, worms, rootkits and trojans.

Introduction to Malware
History of Malware
It was designed to infect the boot sector of a floppy disk. So every time a floppy disk was inserted it would infect the computer.
History of Malware
6 Most Common Malware Variants
A Trojan is a type of malware that appears to be a legitimate program but in fact performs hidden malicious functions that allow unauthorized access to the victim’s computer.
Trojan
Rootkit
Rootkit
Worm
Spyware
Spyware is a type of malware that performs malicious functions without properly obtaining user’s permission, such as:

Advertisement
Collecting personal information
Changing the configuration of computer

Spyware is also referred with software that displays advertisements (called adware) or software that tracks personal or sensitive information
How Malware Spreads
There are several ways in which malicious malwares may spread. Some users may be infected by simply visiting a seemingly harmless website.
How Malware Spreads
Hacker Activities
1. Injects malicious iframe to victim’s vulnerable website.
2. Places javascript exploit on hacker-controlled web site (hop point).
3. Plants malware in hacker-controlled server.
The Process of Malware Attack Via Internet
Malware Infection Path
5. Malicous iframe executes exploit code in user’s browser.
6. Exploit leverages browser vulnerabilities to take control and instruct browser to download malware
7. Browser silently request malware from hacker server
8. Malware silently installs and executes on Internet user’s PC
Legitimate Web Usage
4. Internet user request victim’s web page wich opens malicious iframe without their knowledge or consent.
Malware in Mobile Phones
How to Stay Protected
Example of How Malware Propagates Through App Store
Questions

The first malware appeared in 1986 known as Brain.A developed by two Pakistani brothers, Basit and Amjad.
Purpose of Malware
Typically used to
Steal Sensitive
Information
Destroy Data
Misuse Data
Fraud
Types of Malware
Example of Recent Malware Attacks
Dark Seoul
1
Tong
2
10 Days of Rain
3
HTTP Dr0pper
4
Virus
A virus is a malicious program designed to, when executed, infect other programs and files by modifying them to insert copies of itself.

Rootkits may run for as long as they are concealed in an operating system, but even so it will still be harming the system.
Malware Distribution Channels
World Malware Map – October 2013
Where is most malicious code being hosted in the world
Top 5 Most Observed Vulnerabilities - August 20
Anonymised feedback from M86 filtering installation shows most observed threats were based on the Following vulnerabilities:
Malware Propagation Method
Top Websites Containing Malware Delivered by Search Engines
Malware Samples -
Total malware sample in the McAfee Labs Database
Android Virus Wipes Samsung SIII
Mobile Malware
Mobile Malware
Malware Goes Mobile:
The Acceleration of Mobile Threats
Malware Goes Mobile:
The Acceleration of Mobile Threats
Malware Goes Mobile:
The Acceleration of Mobile Threats
Malware Goes Mobile:
The Acceleration of Mobile Threats
Malware Goes Mobile:
The Acceleration of Mobile Threats
Malware Naming Convention
Antivirus companies name the malware and potentially unwanted software that it detects according to the Computer Antivirus Research Organization (CARO) Malware naming scheme.
This scheme uses the following format:
https://www.trustwave.com/support/labs/malware-statistics.asp
Full transcript