0% found this document useful (0 votes)
39 views54 pages

Malware Hassan and Laith

- Malware includes viruses, worms, trojans, spyware, and adware that can infect systems and perform unauthorized actions. - Worms are self-replicating programs that spread across networks without user intervention by exploiting vulnerabilities. The basic worm algorithm uses address dispersion tables and prevalence tables to track infected sources and destinations to select new targets for infection. - Anti-virus software detects malware by analyzing system behavior and binary files to identify known viruses and monitor systems in real-time.

Uploaded by

laithlemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views54 pages

Malware Hassan and Laith

- Malware includes viruses, worms, trojans, spyware, and adware that can infect systems and perform unauthorized actions. - Worms are self-replicating programs that spread across networks without user intervention by exploiting vulnerabilities. The basic worm algorithm uses address dispersion tables and prevalence tables to track infected sources and destinations to select new targets for infection. - Anti-virus software detects malware by analyzing system behavior and binary files to identify known viruses and monitor systems in real-time.

Uploaded by

laithlemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 54

Malware

Done by : Laith mkarem


Hassan obeid
Class: 8C
Lesson Aims

• To know :
• What malware are
• How do they infect hosts
• How do they hide
• How do they spread
• About Worms
What is a malware ?

• A Malware is a set of instructions that


run on your computer and make your
system do something that an attacker
wants it to do.
What it is good for ?

• Steal personal information


• Delete files
• Steal software serial numbers
• Use your computer as relay
The Malware Zoo

• Virus
• Bomb
• Trojan horse
• Spyware
• Adware
• Worm
What is a Virus ?

• a program that can infect other programs by


modifying them to include a, possibly
evolved, version of itself
Some Virus Type

• Polymorphic : uses a polymorphic


engine to mutate while keeping the
original algorithm intact (packer)
• Methamorpic : Change after each
infection
What is a trojan

A trojan describes the class of malware that appears


to perform a desirable function but in fact performs
undisclosed malicious functions that allow
unauthorized access to the victim computer
What is Spyware

• A Spyware is a component that uses


stealth to maintain a persistent and
undetectable presence on the machine
What is a worm

A computer worm is a self-replicating computer


program. It uses a network to send copies of itself
to other Devices and do so without any user
intervention.
Almost 30 years of Malware

• From Malware fighting malicious code


History
• 1981 First reported virus : Elk Cloner (Apple 2)
• 1983 Virus get defined
• 1986 First PC virus MS DOS
• 1988 First worm : Morris worm
• 1990 First polymorphic virus
• 1998 First Java virus
• 1998 Back orifice
• 1999 Melissa virus
• 1999 Zombie concept
• 1999 Knark Spyware
• 2000 love bug
• 2001 Code Red Worm
• 2001 Kernel Intrusion System
• 2001 Nimda worm
• 2003 SQL Slammer worm
Number of malwares
Malware Repartition

Panda Q1 report 2009


Infection methods
What to Infect

• Executable
• Interpreted file
• Kernel
• Service
• MBR
• Hypervisor
Overwriting malware

Targeted Malware
Malware
Executable
prepending malware
Malware

Infected
Targeted
Malware host
Executable
Executable
appending malware

Infected
Targeted
Malware host
Executable
Executable

Malware
Cavity malware

Malware
Targeted
Malware Infected
Executable
host
Executable
Multi-Cavity malware

Malware

Targeted
Malware
Executable Malware

Malware
Packers

Packer Infected host


Malware
Executable
Packer functionalities

• Compress
• steal
• Randomize (polymorphism)
• Add-junk
• Virtualization
Document based malware

• MS Office
• Open Office
Spyware can
• Perform

• login

• password

• Hide activity

• find
Kernel Spyware
P1 P2
PS
P3 P3

Spyware KERNEL

Hardware :
HD, keyboard, mouse, NIC, GPU
Hypervisor Spyware

App App

Target OS

Hardware
Hypervisor Spyware

App App

Rogue app Target OS

Host OS Virtual machine monitor

Hardware
spreading
Shared folder
Email spreading

• from pandalab
blog
Fake antivirus

• from pandalab
blog
Hijack you browser

• from pandalab
blog
Fake page !

• from pandalab
blog
P2P Files
spyware
Basic

Infected
Attacker
Host
Reverse

Infected
Attacker
Host
Advanced

RDV
Point

Infected
Attacker
Host
Adware
Adware

Injects ads and files to your computer


Adware
Detection
Anti-virus
• Analyze system
behavior
• Analyze binary to
decide if it a virus
• Type :

• Scanner

• Real time
monitor
Worms
Worm
A worm is self-replicating software designed to
spread through the network
 Can cause enormous damage
 Launch DDOS attacks, install bot networks

 Access sensitive information

 Cause confusion by corrupting the sensitive information

Worm vs Virus vs Trojan horse


 A virus is uneditable in a file or program
 Viruses and Trojan horses rely on human intervention
 Worms are self-contained and may spread autonomously
How do worms spread ?
Need for automation
Current threats can spread faster than defenses can reaction
Manual capture/analyze/signature/rollout model too slow
Contagion Period

Program

Response Period
months
Viruses Macro
Viruses E-mail

Signature
Worms Network
days
Pre- Worms Post-
automation automation
hrs
Flash
mins
Contagion Period Worms
secs Signature Response Period

1990 2005
Time
The basic algorithm
Detector in
network
B
A

E D

Address Dispersion Table


Prevalence Table Sources Destinations
Detector in
network
B
A

E D

Address Dispersion Table


Prevalence Table Sources Destinations

1 1 (A) 1 (B)
Detector in
network
B
A

E D

Address Dispersion Table


Prevalence Table Sources Destinations

1 1 (A) 1 (B)
Detector in
network
B
A

E D

Address Dispersion Table


Sources Destinations

2 2 (A,B) 2 (B,D)
Detector in
network
B
A

E D

Address Dispersion Table


Sources Destinations

3 3 (A,B,D) 3 (B,D,E)

You might also like