Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.



Similar documents
1 Introduction. Agenda Item: Work Item:

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

1 Introduction. Agenda Item: Work Item:

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Computer Security Maintenance Information and Self-Check Activities

Spyware. Summary. Overview of Spyware. Who Is Spying?

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Module 5: Analytical Writing

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Introduction to Computer Security Table of Contents

Countermeasures against Spyware

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

BotNets- Cyber Torrirism

Preparing Your Personal Computer to Connect to the VPN

WEBTHREATS. Constantly Evolving Web Threats Require Revolutionary Security. Securing Your Web World

Countermeasures against Bots

Stopping zombies, botnets and other - and web-borne threats

Computer Security: Best Practices for Home Computing. Presented by Student Help Desk Merced Community College

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

Spyware: Securing gateway and endpoint against data theft

The Information Security Problem

Symantec enterprise security. Symantec Internet Security Threat Report April An important note about these statistics.

Student Tech Security Training. ITS Security Office

Network Security and the Small Business

An Introduction on How to Better Protect Your Computer and Sensitive Data

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Remote Deposit Quick Start Guide

Network Security. Demo: Web browser

Why is a strong password important?

What you need to know to keep your computer safe on the Internet

Computer Viruses: How to Avoid Infection

PC Security and Maintenance

How To Understand What A Virus Is And How To Protect Yourself From A Virus

Information Security Threat Trends

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Seminar Computer Security

Don t Fall Victim to Cybercrime:

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

CHAPTER 10: COMPUTER SECURITY AND RISKS

Malware & Botnets. Botnets

Cyber Security: Beginners Guide to Firewalls

COB 302 Management Information System (Lesson 8)

Top tips for improved network security

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

Contents. McAfee Internet Security 3

What are the common online dangers?

WHITE PAPER. Understanding How File Size Affects Malware Detection

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

What's the difference between spyware and a virus? What is Scareware?

Ad-Aware Antivirus Overview

Data Management Policies. Sage ERP Online

BE SAFE ONLINE: Lesson Plan

Identity Theft Protection

Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

What Do You Mean My Cloud Data Isn t Secure?

October Is National Cyber Security Awareness Month!

Spyware Doctor Enterprise Technical Data Sheet

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Computer Security. Uses Zip disks that hold up to 750 MB of data. Must buy and hook up the drive.

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

MacScan. MacScan User Guide. Detect, Isolate and Remove Spyware

Security aspects of e-tailing. Chapter 7

STRONGER ONLINE SECURITY

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

How to stay safe online

Retail/Consumer Client. Internet Banking Awareness and Education Program

High Speed Internet - User Guide. Welcome to. your world.

Security A to Z the most important terms

Beyond the Hype: Advanced Persistent Threats

Infocomm Sec rity is incomplete without U Be aware,

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

IBM Managed Security Services (Cloud Computing) hosted and Web security - express managed Web security

Information Security. Louis Morgan, CISSP Information Security Officer

Transcription:

Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com

Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References 2

Security Fundamentals Every security decision = economic decision Basis of military data classification More security = Less accessibility/usability, higher $$$ Defense in Depth Defense-In-Depth strategy integrates People, Operations, and Technology capabilities to establish information assurance (IA) protection across multiple layers and dimensions. Successive layers of defense will cause an adversary who penetrates or breaks down one barrier to promptly encounter another Defense-In-Depth barrier, and then another, until the attack ends. NSA web site Spheres of Protection Enterprise = Greater restriction of data Service Provider = Less restriction of data 3

Security Fundamentals Five Information Assurance Pillars Confidentiality Integrity Availability Authenticity (authentication) Non-repudiation 4

Current Issues Viruses Worms Bots or Zombies Key Loggers E-mail Spam SPIM Identity Theft Auction Fraud Loss of Privacy Spyware Phishing DoS/DDoS Cyber Extortion Theft of Intellectual Property Investment Fraud International Money Laundering Theft of Services Traditional crimes are migrating to the Internet 5

Spyware What is it? Everyone has a different definition Lots of legislation trying to fix the problem At least 8 different state bills are pending. Several federal bills are in progress. 6

Spyware Definition - Webopedia (n.) Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. www.pcwebopedia.com/term/s/spyware.html 7

Spyware Definition - Microsoft Spyware is a general term used for software that performs certain behaviors such as advertising, collecting personal information, or changing the configuration of your computer, generally without appropriately obtaining your consent. http://www.microsoft.com/athome/security/spyware/s pywarewhat.mspx PUS: Potentially Unwanted Software Microsoft Anti-Spyware EULA 8

Categories of Spyware Non-malicious Generally, programs installed with the user s consent to a EULA or through the setting of cookies in a browser. Usually tracks user preferences and sites visited. It can also present unwanted advertisements to the user or change their computer configuration. Originally developed for targeted advertising. Malicious A program that gathers sensitive user information including e-mail addresses, usernames and passwords, SSN, credit card information, and other financial information. Programs gather information through keystroke logging, data file searches, and e-mail monitoring. Many times the software is a blended threat including virus, worm, bot, trojan horse, spam, and other attack vectors. Spyware is financially driven 9

Blended Threat 10

Infection Methods Web Sites Exploits in IE, Outlook, Mozilla (including Firefox) Combination of non-critical exploits P2P Sharing Software Virus/Worm/Bot infections Windows Media Files 11

Phatbot Bot Swiss Army Knife Feature List Ability to polymorph on install Kills up to 600 different programs including anti-virus software and other infections Scans IRC, FTP, HTTP traffic for user logins, passwords and cookies Can steal product codes for Windows and games Harvests e-mail addresses from local system and web Has many different techniques to distribute SPAM Is able to spread using 12-15 different security holes Can be commanded to launch several different types of DoS attacks Can open, delete, upload, download and execute files on the local system Can update itself through plugins or code downloads Uses P2P for control channel http://www.lurhq.com/phatbot.html 12

Best Practices - Enterprise Keep your systems patched Practice defense in depth Perimeter firewalls: limit inbound and outbound traffic Perimeter IDS/IPS: check both inbound and outbound traffic Host based firewalls Host anti-virus software (on all Windows and Macs) E-mail anti-virus software Regularly run anti-spyware checkups Block unrequested pop-up ads Have method to quickly quarantine infected users Restrict where users can go on the web Published abuse address: abuse@mydomain.gov RFC 2142: Mailbox names for common services, roles and functions 13

What Service Providers Are Doing Working cooperatively Monitoring questionable sites Immediately shutting down illegal/aup violation sites Analyzing malware to understand behavior Turning off customers who violate the SP s AUP Notifying customers of malware infections Quarantining infected residential and small business customers Educating users about spyware, identity theft, and good computer security practices. 14

References http://spywarewarrior.com Lots of information on spyware http://spywarewarrior.com/asw-features.htm Specific test results on anti-spyware software and recommendations on how to clean and protect your computer. http://www.microsoft.com/athome/security/spyware/software/default.mspx Microsoft s new anti-spyware program by Giant. Excellent program but only works for Windows 2000, 2003 and XP. http://www.lavasoft.de/ Ad-aware anti-spyware software. Free for personal use. http://spybot.safer-networking.de/en/index.html Spybot Seach and Destroy. Freeware. Including good spyware blocking tools. Be careful of Spyware Doctor advertising as Spybot S&D. http://www.virustotal.com Free service to check suspicious files using multiple virus vendors software. http://isc.sans.org/contact.php SANS Internet Storm Center reporting site. If you are seeing suspicious activity, there is a team of technical volunteers who can help you with the issue. http://www.qwest.com/about/protection/index.html Good reference on identity theft issues and how to protect yourself. 15

Backup Slides 16

Viruses & Worms Virus: A self-replicating, malicious code that usually requires end user action (click on the attachment) attaches itself to an executable system component and may leave no obvious signs of its presence. Worm: An independent program that replicates from machine to machine across network connections often clogging networks and information systems as it spreads. What is the difference? Viruses usually require you to run them. Worms spread without end user interaction. 17

BOTS Bot = Robot, Single instance of a remote controlled application The largest botnet found to date was 140,000 computers There are primarily 3 methods of bot installation: 1) Scan and exploit 2) Come and get it 3) Virus BotNets can be used for: Distributed Scanning Launch Coordinated Attacks Vulnerability Exploitation Accessing the Computer Exchange of Copyrighted Data Denial of Service (DoS) Sending Spam Breaking Codes by Brute Force 18

Spam and Phishing Spam: E-mail, SPIM Accounts for roughly 65% of e-mail 1 billion IM spam (SPIM) messages delivered in 2004 Very low take rates still make spam profitable FBI has started aggressive enforcement of CAN-SPAM Phishing Never click on a link in an HTML formatted e-mail Practice good risk management when sending e-mails to customers Do not request information directly in the e-mail Do not publish convenient hyperlinks to a web site in the e-mail Report phishing activity to www.antiphishing.org 19