Emerging Trends in Malware - Antivirus and Beyond



Similar documents
PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Computer Security Maintenance Information and Self-Check Activities

COMPUTER-INTERNET SECURITY. How am I vulnerable?

Network Security and the Small Business

Module 5: Analytical Writing

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Open an attachment and bring down your network?

Malware, Spyware, Adware, Viruses. Gracie White, Scott Black Information Technology Services

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

What you need to know to keep your computer safe on the Internet

white paper Malware Security and the Bottom Line

What are Viruses, Trojans, Worms & Spyware:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

PC & Internet Security

Identity Theft Protection

STOP. THINK. CONNECT. Online Safety Quiz

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

How Spyware and Anti-Spyware Work

BE SAFE ONLINE: Lesson Plan

INTERNET & COMPUTER SECURITY March 20, Scoville Library. ccayne@biblio.org

How to easily clean an infected computer (Malware Removal Guide)

October Is National Cyber Security Awareness Month!

How To Understand What A Virus Is And How To Protect Yourself From A Virus

Digital Safety and Privacy

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

WHITE PAPER: Cyber Crime and the Critical Need for Endpoint Security

GlobalSign Malware Monitoring

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Keeping you and your computer safe in the digital world.

Software Engineering 4C03 Class Project. Computer Networks and Computer Security COMBATING HACKERS

Protecting your Identity, Computer and Property

1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.

MOBILE MALWARE REPORT

Understanding Internet Security. What you need to protect yourself online.

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

ZNetLive Malware Monitoring

Hesperbot. Analysts at IKARUS Security Software GmbH successfully removed a self-locking Android Malware from an infected smartphone

The Increasing Threat of Malware for Android Devices. 6 Ways Hackers Are Stealing Your Private Data and How to Stop Them

Malware & Botnets. Botnets

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

What Do You Mean My Cloud Data Isn t Secure?

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

G DATA MOBILE MALWARE REPORT THREAT REPORT: Q1/2015

Welcome To The L.R.F.H.S. Computer Group Wednesday 27 th November 2013

Statistical Analysis of Internet Security Threats. Daniel G. James

Computer Viruses: How to Avoid Infection

C&G FLUX MARKET Internet Safety

INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!

Types of cyber-attacks. And how to prevent them

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cyber Security: Beginners Guide to Firewalls

Content Security: Protect Your Network with Five Must-Haves

BUSINESS ADVISORY GUIDE TO SPYWARE AND VIRUSES

Common Cyber Threats. Common cyber threats include:

Don t Fall Victim to Cybercrime:

INTERENT SAFETY AND RESPONSIBILITY CYBER SECURITY

Trust the Innovator to Simplify Cloud Security

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

1949 Self-reproducing cellular automata Core Wars

National Cyber Security Month 2015: Daily Security Awareness Tips

Quick Start. Installing the software. for Webroot Internet Security Complete, Version 7.0

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Spyware: Securing gateway and endpoint against data theft

Cybercrimes NATIONAL CRIME PREVENTION COUNCIL

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

ANDRA ZAHARIA MARCOM MANAGER

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Marlon R Clarke, Ph. D., CISSP, CISM Director Network Operations and Services, NSU

Practical guide for secure Christmas shopping. Navid

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

COB 302 Management Information System (Lesson 8)

Introduction to Cyber Security

WHY DOES MY SPEED MONITORING GRAPH SHOW -1 IN THE TOOLTIP? 2 HOW CAN I CHANGE MY PREFERENCES FOR UPTIME AND SPEED MONITORING 2

Protect your personal data while engaging in IT related activities

Do you constantly get hammered by pop up ads that come from nowhere and interfere with using your computer?

Welcome to Part 2 of the online course, Spyware and Adware What s in Your Computer?

G DATA MOBILE MALWARE REPORT

Almost 400 million people 1 fall victim to cybercrime every year.

Technology in Action. Alan Evans Kendall Martin Mary Anne Poatsy. Eleventh Edition. Copyright 2015 Pearson Education, Inc.

Stopping zombies, botnets and other - and web-borne threats

Introduction to Computer Security

How To Test For Security Protection

F-Secure Anti-Virus for Mac 2015

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Learn to protect yourself from Identity Theft. First National Bank can help.

Computer and Internet Safety

Cyber Security Awareness

Top 10 Tips to Keep Your Small Business Safe

Understanding Spyware

Introduction to Computer Security Table of Contents

Mifflinburg Bank & Trust. Corporate Account Takeover & Information Security Awareness

Corporate Account Takeover & Information Security Awareness. Customer Training

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Viruses, Worms, and Trojan Horses

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Corporate Account Takeover & Information Security Awareness

What's the difference between spyware and a virus? What is Scareware?

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Transcription:

Malware White Paper April 2011 Emerging Trends in Malware - Antivirus and Beyond One need only listen to the news or read the latest Twitter and media updates to hear about cyber crime and be reminded of the importance of internet and data security. The last few months of 2010 were filled with stories of WikiLeaks and the whistle-blowing website s effect on the security of nations across the globe. This story was just one of many that highlighted the fact that all levels of businesses and individuals, not to mention government agencies, are subject to the necessity of data security and the need to be aware of multi-level cyber threats in 2011 and beyond. While the WikiLeaks site was motivated by publicity and politics, the trend in cyber crime has moved towards financial motivation, which indicates that it will continue to grow and put everyone at risk. Cyber crime is the big bad wolf, concealed in many forms, like the wolf dressing up as the grandmother ready to pounce on the unknowing Red Riding Hood. This paper will explore the different types of malware surfacing today and some of the solutions available to protect yourself against them. These types of threats go beyond the standard ones of computer viruses and require more protection and, often, more than one type of security software. Malware and the forms of Malware Malware, short for malicious software, can encompass a variety of hostile or criminal software. Malware is a term that is an umbrella for multiple threats including computer viruses, worms, trojan horses, rootkits and other unwanted software. It is intended to cause harm to or infiltrate computer systems without the user or owner s knowledge. It can even be disguised as legitimate software and appear to come from an official site. This big bad wolf comes in many forms. The most common forms of malware are viruses and worms. A virus is a program that has infected software, and, when run, causes the virus to spread to other executables and requires the user to open the program, thus activating the virus. A worm is spread automatically, actively transmitting itself to spread over other computers.

The first reported self-duplicating virus occurred 25 years ago and was called the Brain Virus, created by two brothers in Pakistan who were V irus: a program that has infected software, and, when run, causes the virus to spread to other executables and requires the user to open the program, thus activating the virus. testing loopholes in their company s software, a company named Brain Telecommunication. 1 This type of virus had to be transmitted by floppy disks, which seems antiquated compared to today s modes of malware threats. The Morris Worm, in 1988, was the first known worm malware. Its creator was a Cornell student who was subsequently convicted of computer fraud. This worm slowed computers down or rendered them useless by exploiting vulnerabilities in the network server. Worms continue to pose such a threat today. Harking back to the story of Troy, a trojan horse is a form of malware that hides within another program. Because this type of malware is disguised as something harmless, the user is misled to run it, which leads to attacks, like the ancient Greek warriors leaping out of the trojan horse. This type of malware is often contained in programs that someone would download on a PC, such as music, games, photos or videos. Once a trojan is downloaded, hackers have the ability to access your computer and save personal information. A rootkit is not the actual malware, but the program used to hide the malware. The rootkit can modify the user s operating system, so that the malware is concealed. Very often, the rootkit comes bundled with other types of malware, such as viruses, etc. Rootkits enable a hacker to store files on your computer and open the opportunity for multiple instances of illegal activity. The level of activity that a hacker can engage in on your computer is frightening and almost unimaginable. The hacker can send information to websites, use credit card information and cause disruption to the user. A type of malware that affects most computer users is spyware. It is designed to steal information about the computer user. It records the activities and habits of the user; some types can even record keystrokes and information that is typed on websites or other T rojan Horse: a form of malware that hides within another program. Because it is disguised as something harmless, the user is misled to run it, which leads to attacks. programs. Spyware is used to gather information for certain advertising or for identity theft. It sends information to advertisers who then use it for pop-ups while you are surfing the web. 1 http://www.pcmag.com/slideshow/story/261678/4-malware/a-brief-timeline

More prevalent Malware threats today As technology grows and develops, so does the malware. Those trends in technology that influence our lives and effect how we spend our days leave us, as individuals and businesses, open to malicious attacks. Malware is growing the most in the areas of search engines, social networks and mobile devices. We now use the word google in our everyday language to describe searching for something online. Even an 85-year-old grandmother has a Facebook page to keep in touch with her family. The mobile phone is now a necessary accessory, like a wallet, to check email, do online banking, buy movie tickets or play a game of Scrabble. While these tools all enhance our lives, they leave us open and vulnerable when unprotected. Search engines are our go-to sources of information on a daily basis, in our work lives and personal lives, yet they are also a prime target of malware attacks. Search results can be manipulated to draw individuals to malicious pages, and this is done through the ordinary search tools, such as Google, Bing, and Yahoo! Very often, malware is introduced through malvertising, faulty advertising that misleads web users and draws them to infected sites. Users computers can be infected and personal information stolen. In 2010, more than 1 million websites were infected with malware in the fourth quarter of the year, alone. According to Dasient, that was more than double the figures of the previous year. 2 Barracuda, Spyware: malware that is designed to steal information about the computer user. It records the activities and habits of the user; some types can even record keystrokes and information that is typed on websites or other programs. a security provider, recently released its 2010 Annual Security Report, which indicates that attackers are shifting from email spam to targeting the Internet. Among its findings, the amount of malware that appears daily across search engines increased 55 percent from June 2010 to December 2010. Equally disturbing, is that one in five search topics lead to malware, while one in 1,000 search results lead to malware. 3 Along with advertising infections, an estimated 1.5 million malvertisements per day were served in 2010, according to Dasient. Other prominent targets of malware have been social media and government sites. As of March of 2011, the blogging site, Wordpress, was being hit by denial-ofservice attacks. Performance and connectivity problems resulted. A recent White House report on cyber security stated that the number of attacks on government networks increased by 40 2 Elinor Mills, http://news.cnet.com/8301-27080 3 http://pr-usa.net, March 7, 2011.

percent last year. 4 PC Magazine s lead analyst for security, Neil Rubenking, finds that government sites may be increasingly vulnerable in this budget belt-tightening era. There might not be enough monitoring and updating as a result of reduced funding. 5 Another area for businesses and individuals to be aware of in the realm of cyber security is mobile malware. Not surprisingly, with the rise of mobile use and applications, mobile malware has also become an issue. According to PC Magazine, mobile malware is becoming ever more sophisticated. The capability of mobile phones to carry out multiple tasks also opens them up to more threats and corruption. Viruses are capable of sending texts, making calls to designated numbers and a variety of other possibilities. In the news most recently, was the malware attack on the Google Android, infecting hundreds of thousands of smartphones, prompting Google to quick action in fighting the attacks and ensuring stronger security in the future. Prevention and Protection So, how does a business or an individual protect itself or himself from the looming threats of cyber crime? A first and important step is antivirus protection. Most antivirus programs, if they are reliable, have kept up with growing threats and are more capable than they were just a couple of years ago. Most now include tools to protect against spyware and spam in addition to antivirus, which make them very reliable. While good antivirus software will protect you against many malware threats, it is important to secure a broad range of protection, one that encompasses more than even a good antivirus program can offer. Protection on many levels is what offers the most security for the business owner and the individual user. A dedicated anti-malware product will often work in conjunction with an antivirus protection, providing the maximum security. An important feature of the antivirus software is that it will unpatch system files. Typically, an anti-malware program will not have that feature but will work alongside the antivirus piece. A reputable anti-malware program will detect, destroy and prevent malware and will detect malware that an antivirus program might fail to identify. Antimalware programs provide network protection through intrusion detection and prevention. They keep protected data safe and prevent malware from existing on the firewall. The most critical piece to protecting oneself against cyber crime is to be protected on multiple levels and to leave 4 http://thehill.com/blogs/hillicon-valley/technology, March 22, 2011. 5 http://www.pcmag.com, November 22, 2010.

nothing to chance. A combination of a firewall along with antivirus and anti-malware software will do that for you. A joint effort of good antivirus and anti-malware will leave the big bad wolf outside, still scheming new points of entry, but incapable of breaking in.