Top Banner
SPYWARE By liza ormol
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Spyware

SPYWAREBy liza ormol

Page 2: Spyware

OBJECTIVES

What is spyware Who is spying How spyware operates Impact of spyware Risk of future security incidents Common spyware forms

2

Page 3: Spyware

WHAT IS SPYWARE

Spyware is one type of malicious software (malware) that collects information from a computing system without content

Spyware can capture keystrokes , screenshots , web from data , internet usage habits and other personal information

The data often delivered to online attackers who sell it to others or sell it themselves

3

Page 4: Spyware

WHO IS SPYING

The people who use spyware include : Online attackers Marketing organization Trusted insiders

4

Page 5: Spyware

ONLINE ATTACKERS

Online attackers’ primary interest in spyware is using it to steal personal information for financial crimes

Such as carding (illicit trafficking in stolen credit card and credit card information) and identity theft

Or to sell that information to someone else who then executes more traditional crimes

5

Page 6: Spyware

MARKETING ORGANIZATION

Marketing organization are interested in personal information such as email address , online shopping and browsing habits

That can be used to execute marketing campaigns like spam , browsers popups , homepage hijacking(changing the default web address for a users browser)

6

Page 7: Spyware

TRUSTED INSIDERS

Trusted insiders include those who have physical access to computer system for legitimate purposes

Some examples are employs , contractors , temporary workers , and cleaning crews

For example an employee who uses spyware to collect corporate information that can be sold in underground economy used , for blackmail

7

Page 8: Spyware

HOW SPYWARE OPERATES

Spyware tracks online activity looking for websites visited

Financial data or identity data such as credit card numbers on screen or entered into form field

When keywords of internet like names of banks , online payment system are observed , the spyware starts its data collection process

8

Page 9: Spyware

IMPACT OF SPYWARE

Spyware can cause people to loss trust in the reliability of online business transactions

Similar to the problem of counterfeit currency in the physical world , spyware undermines confidence in online economic activity

Consumer willingness to participate in online monetary transactions decrease for fear of personal financial loss

9

Page 10: Spyware

CONTINUE

Even when financial organizations cover an individual’s loss from online fraud

these costs plus the overhead required to administer loss prevention programs are eventually passed back to customers in the form of high service fees , interest rates

As a result , growth rates in commerce are slowed , cost increase , and demand shrinks

10

Page 11: Spyware

RISK OF FUTURE SECURITY INCIDENTS

These sensitive information collected by spyware often includes authentication credentials that may be used for future access to the infected system

Once access is gained , additional information theft or malware installation take place

Another way spyware puts system at future risk is by installing backdoor access mechanisms

11

Page 12: Spyware

COMMON SPYWARE FORMS

Browser session hijacking Browser helper objects Cookies and web bags False antispyware tools Autonomous spyware Bots

12

Page 13: Spyware

BROWSER SESSION HIJACKING

This class of spyware attempts to modify the users browsers setting

Hijacking spyware can be installed in various ways

These redirects lead users to advertisements that earn the hijacking commissions when they are visited

13

Page 14: Spyware

BROWSER HELPER OBJECTS

Browser helper object (BHOs) are a feature of internet explorer that can be exploited by spyware and they are not always easy to detect

BHOs can access files , network recourses , and anything else the user who launched internet explorer can access

Another social engineering technique is inundating the user with repeated popup request to install the software

14

Page 15: Spyware

COOKIES AND WEB BUGS

Cookies are small pieces of information stored on a user’s system by a web server. During subsequent visitsoften , cookies are used for storing user authentication , preferences , and other type of user informationThey can be used to track a user across multiple websites

15

Page 16: Spyware

FALSE ANTISPYWARE TOOLS

Applications available on some internet sites advertise themselves

as spyware detection or removable tools In fact they themselves are spyware

16

Page 17: Spyware

AUTONOMOUS SPYWARE

Autonomous spyware operates as a separate process or injects itself into other processes running on your system

This type of spyware often starts up when you log onto your computer and can frequently access anything on your system

Autonomous spyware is malicious application , it can be designed to perform any type of spying functions

17

Page 18: Spyware

BOTS

A special class of malware known as a bot or zombie is one of largest malware problems

Bots are remote control agents installed on your system

Once a system is infected with a bot , it become part of a the bot network ( botnet) and is used in conjunction of other botnet members

18

Page 19: Spyware

REFERENCE

Spywarehome_0905.pdf

19

Page 20: Spyware

20