Chapter 5: Malware

Computer Security Fundamentals

Chapter 5: Malware

Author: Dr. Chuck Easttom
Chapter Objectives
  • Understand viruses (including worms) and their propagation methods.

    • Review famous viruses: WannaCry, Pegasus, Titanium.

  • Acquaintance with specific virus outbreaks.

  • Dynamics of virus scanners.

  • Comprehension of Trojan horses and their functioning.

  • Familiarity with specific Trojan horse attacks.

  • Understanding ransomware and current trends.

  • Grasping the concept of buffer-overflow attacks.

  • Insight into spyware and its entry points into systems.

  • Ability to defend against various attacks through effective practices, antivirus, and antispyware software.

Introduction to Malware
  • Overview of virus outbreaks:

    • How they work, why they succeed, and how they are deployed.

  • Other notable malware forms:

    • Buffer-overflow attacks and spyware.

Understanding Viruses
  • Definition of a Computer Virus:

    • Self-replicating programs capable of rapidly spreading across networks.

    • Potential to diminish the functionality and responsiveness of a network.

    • May carry a malicious payload or be benign.

Virus Propagation Methods
  • How a Virus Spreads:

    • Network Connection:

    • Copies itself to additional hosts, requiring programming skills.

    • Email Transmission:

    • Sends itself to contacts in the host's address book, requiring less technical skill.

    • This is the most frequent infection pathway.

Types of Viruses
  • Classification of Computer Viruses:

    • Macro viruses.

    • Boot sector viruses.

    • Multi-partite viruses.

    • Memory resident viruses.

    • Armored viruses.

    • Sparse infectors.

    • Polymorphic viruses.

    • Metamorphic viruses.

Notable Virus Examples
  • List of Noteworthy Viruses:

    • Black Basta

    • Titanium

    • WannaCry

    • Petya

    • Shamoon

    • Rombertik

    • Gameover ZeuS

    • CryptoLocker and CryptoWall

    • IoT Malware

    • Mindware

    • Thanatos

    • Clop (or CL0p)

    • FakeAV

    • MacDefender

    • Kedi RAT

    • Sobig

    • Shlayer

    • Mimail

    • Flame

Virus Prevention Guidelines
  • Rules for Avoiding Viruses:

    • Implement the use of reliable virus scanners.

    • Avoid opening suspicious email attachments:

    • Use a predefined code word for transferring safe attachments.

    • Do not trust unsolicited “security alerts.”

Trojan Horses
  • Definition of Trojan Horses:

    • Seemingly harmless programs that harbor malicious functionality.

  • Capabilities of a Trojan Horse:

    • Can download harmful software.

    • Install keyloggers or spyware.

    • Delete files.

    • Create backdoors for unauthorized access.

    • Can be custom-made for individual targets.

  • Company Policy Recommendation:

    • Strict prohibition against unauthorized downloads.

Buffer-Overflow Attack
  • Definition:

    • Involves inputting more data into a buffer than it can handle, leading to data overflow.

  • Prevention Techniques:

    • Developers can ensure overflow is rejected or truncated through thorough application design.

  • Execution Complexity:

    • More difficult to execute compared to Denial of Service (DoS) attacks or simple script-based viruses.

    • Requires expert knowledge of programming languages like C or C++.

    • Most modern operating systems and web servers mitigate susceptibility.

Spyware
  • Definition and Deployment:

    • Requires significant technical expertise and is often customized for specific targets.

  • Forms of Spyware:

    • Web cookies.

    • Keyloggers.

  • Legitimate Uses: (With Ethical Implications)

    • Monitoring by employers.

    • Parental control over children's internet use.

Other Forms of Malware
  • Rootkits:

    • A suite of tools enabling a hacker to disguise an intrusion and secure administrative-level access.

    • Functionalities include:

    • Traffic and keystroke monitoring.

    • Creating system backdoors.

    • Altering log files and existing system tools to avoid detection.

  • Malicious Web-Based Code:

    • Also recognized as web-based mobile code, functional across various platforms (e.g. HTTP, Java).

    • Poorly scripted code often results from rushed development.

  • Logic Bombs:

    • Activate malicious actions once specified conditions are met, frequently tied to date/time.

  • Spam:

    • Unwanted, unsolicited emails usually aimed at mass marketing.

  • Advanced Persistent Threats (APTs):

    • Employs advanced techniques rather than simple script kiddie methods.

    • Represents ongoing attacks sustained over long durations.

  • Deep Fakes:

    • Emerging technology creating hyper-realistic videos that can deceive viewers.

    • Although not directly harmful to devices, they may create societal disruptions.

Detecting and Eliminating Viruses and Spyware
  • Antivirus Software Functionality:

    • Operates by:

    • Scanning for virus signatures and maintaining updated signature files.

    • Monitoring executable behaviors such as:

      • Self-replication efforts.

      • Attempts to access email address books.

      • Modifying Windows Registry settings.

    • Notable examples include Norton and McAfee.

  • Anti-Malware and Machine Learning Enhancements:

    • Machine learning applications contribute significantly to malware defense.

    • Notable antivirus products utilizing machine learning:

    • Cylance Smart Antivirus

    • Deep Instinct D-Client

    • Avast Antivirus

Summary
  • Overview of malware variety and the necessity of computer security to protect personal data and intellectual property.

  • Acknowledgment that many attacks are preventable.

  • Emphasis on employing solid defense strategies together with antivirus and antispyware software to mitigate risks.