5.4. SoftwareMalware [src] |
||
Malware, short for malicious software, consists of programming (code, scripts, active content, and other software) designed to damage or disable the system or data, disrupt or deny operation, gather information that leads to loss of privacy or exploitation, gain unauthorized access to system resources, and other abusive behavior. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. Malware is not the same as defective software — software that has a legitimate purpose but contains harmful bugs or programming errors. Since the result may be the same, it should be clear that intent is considered important although this is an historically vague rule.What is its Purpose?Categorizing malware by its purpose – the intent of the author – can be difficult or impossible. The following categories just give us a way to think about malware. Others might choose different categories, place a particular piece of malware in a different category, and some malware might reasonably fit into multiple categories. |
||
PranksMany early infectious programs, including a number of MS-DOS viruses, were written as experiments or pranks. They were generally intended to be harmless or merely annoying, rather than to cause serious damage to computer systems. In some cases, the perpetrator did not realize how much harm his or her creations would do. Young programmers learning about viruses and their techniques wrote them simply for practice, or to see how far they could spread. As late as 1999, widespread viruses such as the Melissa virus appear to have been written chiefly as a prank. Many believe the infamous Morris Worm, that shut down a large part of the Internet in 1988 and started a new era in network security, was a prank or experiment gone wrong — others are not so sure it belongs in this category. In any case, none of these efforts had any "legitimate purpose" for you, the user/manager/owner of the system "attacked". |
Smartphone malware is increasing Cabir is the name of a computer worm developed in 2004 that is designed to infect mobile phones running Symbian OS. It is believed to be the first computer worm that can infect mobile phones. When a phone is infected with Cabir, the message "Caribe" is displayed on the phone's display, and is displayed every time the phone is turned on. The worm then attempts to spread to other phones in the area using wireless Bluetooth signals.Never released "in the wild", Caribe was sent to anti-virus firms apparently by white hat hackers as a proof of concept.[src] |
|
Intentionally HarmfulHostile intent related to vandalism can be found in programs designed to cause harm or data loss. Many DOS viruses, and the Windows ExploreZip worm, were designed to destroy files on a hard disk, or to corrupt the file system by writing invalid data to them. Network-born worms, such as the 2001 Code Red worm, fall into the same category. Sometimes a worm is designed to vandalize web pages, like the online equivalent to graffiti tagging, with the author's alias or affinity group appearing everywhere the worm goes. (Note that the basic purpose of most web pages is to provide information, to communicate, so interfering with that goal is generally harmful.) |
DOS Walker virus DOS Phantom 1 virus DOS Aids virus Wait... WTF is DOS? |
|
ProfitSince the rise of widespread broadband Internet access, some malicious software has been designed for a profit, like forced advertising, for example. (Some forced advertising causes your browser to redirect you to an advertising page or displays pop-ups.) Since 2003, the majority of widespread viruses and worms have been designed to take control of users' computers for black-market exploitation. Infected "zombie computers" are used to send email spam, to host contraband data such as child pornography, or to engage in distributed denial-of-service attacks as a form of extortion. The latest versions seems to be claiming that you have a virus and "offering" you a solution or claiming that you have violated a law and need to send money (by credit card) to avoid prosecution. (The latter is often related to pornography and usually occurs when you are visiting such a site, which hints at an avoidance strategy.) In the worst case, your data is encrypted and held hostage until you pay (Ransomware). In each case, your best bet is to not click on anything on the web page or any pop-ups. Intead, start your task manager or system monitor and delete or kill the process. Sort the processes by name, find every instance of your browser application and "force stop" them all. If necessary, reboot your computer. If necessary use a "hard reboot" — hold the power button in for ten seconds. If none of those are successful, it's time to contact your IT department. (Learn more about ransomeware). The sidebar explaining steps taken to kill a process appeared in the last module. |
||
Indirect ProfitAnother strictly for-profit category of malware has emerged in spyware – programs designed to monitor users' web browsing or other activity, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Spyware programs do not generally spread like viruses; they are, in general, installed by exploiting security holes or are packaged with user-installed software, such as peer-to-peer music sharing applications. Sometimes, the spyware is loaded unknowingly by the user in response to a web page pop-up. Probably the easiest step you can take to minimize attacks of all sorts is to use a "non-privileged" user account on a day-to-day basis. (See the discussion on protecting yourself in the next module.) |
Windows ActiveX warning Cropped from Image:Benedelman-spyware-blogspot-2a.png: Screenshot of spyware. Taken from Ben Edelman's Web site with his permission under the GFDL. Original URL: http://www.benedelman.org/spyware/images/blogspot-2a.png Uploaded at 18:48, 14 July 2005 (UTC) by Fubar Obfusco |
|
Hacktivism [src]Hacktivism is the use of (illegal) hacking techniques for an activist cause. Hacktivism could be further defined as "the non-violent use of illegal or legally ambiguous digital tools in pursuit of political ends". These tools include web site defacements, redirects, denial-of-service attacks, information theft, virtual sit-ins, and virtual sabotage. Like any form of activism, doing something for (what you consider to be) a good cause does not make it legal or right. (Learn more about hacktivism.) |
Does hacking imply illegal?Some argue that in the original use of the term (50 years ago), hacking meant something different. Of course, in that era cool had been subverted to mean something that was good, not something at a temperature less than hot. A word which has also taken on an oddly similar meaning. Phat wasn't a word at all. Times change. Outside the computing community, the generally understood meaning of "hacker" is one who gains access to computers illegally. |
|
Viruses & WormsThe best-known types of malware, viruses and worms, are known for the manner in which they spread, rather than any other particular behavior. The term computer virus is used for a program that has infected some executable software and, when run, causes the virus to spread to other executables. Viruses may also perform other actions, like creating a backdoor for later use, damaging files, or even damaging equipment. On the other hand, a worm is a program that actively transmits itself over a network to infect other computers. Worms may also take malicious actions. These definitions lead to the observation that a virus requires user intervention to spread, whereas a worm spreads itself automatically. Using this distinction, infections transmitted by email or Microsoft Word documents, which rely on the recipient opening a file or email to infect the system, would be classified as viruses rather than worms. |
Spread of Conficker worm By Gppande (Own work) [CC-BY-SA-3.0 or GFDL], via Wikimedia Commons Hang on a sec. Who says a virus has to be bad? Check out the sidebar on good viruses. |
|
TrojansIn broad terms, a Trojan horse is any program that invites the user to run it, concealing a harmful or malicious payload. The payload may take effect immediately and can lead to many undesirable effects, such as deleting the user's files or further installing malicious or undesirable software. Trojan horses known as droppers are used to start off a worm outbreak, by "injecting" the worm into users' local networks. |
#95 What is a Trojan? |
|
One of the most common ways that spyware is distributed is as a Trojan horse, bundled with a piece of desirable software that the user downloads from the Internet. When the user installs the software, the spyware is installed alongside. Spyware authors who attempt to act in a legal fashion may include an end-user license agreement that states the behavior of the spyware in loose terms, which the users are unlikely to read or understand. RootkitsOriginally, a rootkit was a set of tools installed by a human attacker on a Unix system, allowing the attacker to gain administrator (root) access. Today, the term rootkit is used more generally for concealment routines in a malicious program. |
||
Once a malicious program is installed on a system, it is essential that it stays concealed, to avoid detection and disinfection. The same is true when a human attacker breaks into a computer directly. Techniques known as rootkits allow this concealment, by modifying the host's operating system so that the malware is hidden from the user. Rootkits can prevent a malicious process from being visible in the system's list of processes, or keep its files from being read. |
RootkitRevealer showing the files hidden by the Sony DRM rootkit Source. Uploaded by Socrates2008. Fair use. |
|
In an attempt to keep the user from stopping a malicious process, another is sometimes installed to monitor it. When the process is stopped (killed), another is immediately created. Modern malware starts a number of processes that monitor and restore one another as needed. In the event that a user running Microsoft Windows is infected with such malware (if they wish to manually stop it), they could use Task Manager's 'processes' tab to find the main process (the one that spawned the "resurrector process(es)"), and use the 'end process tree' function, which would kill not only the main process, but the "resurrector(s)" as well, since they were started by the main process. Some malware programs use other techniques, such as naming the infected file similar to a legitimate or trustworthy file (expl0rer.exe VS explorer.exe) to avoid detection in the process list. |
||
BackdoorsA backdoor is a method of bypassing normal authentication procedures. Once a system has been compromised (by one of the above methods, or in some other way), one or more backdoors may be installed in order to allow easier access in the future. Backdoors may also be installed prior to malicious software, to allow attackers entry. |
What is a backdoor? |
|
Spyware [src]Spyware is a type of malicious software that can be installed on computers, and which collects small pieces of information about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. While the term spyware suggests software that secretly monitors the user's computing, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, such as Internet surfing habits and sites that have been visited, but can also interfere with user control of the computer in other ways, such as installing additional software and redirecting Web browser activity. Spyware is known to change computer settings, resulting in slow connection speeds, different home pages, and/or loss of Internet connection or functionality of other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is provided by the term privacy-invasive software. Classification of code as spyware (or sometimes browser cookies as "tracking" cookies) can be controversial. Often the software is installed by the user knowing that some amount of monitoring will take place. Users generally agree to this activity to get free software and it is often associated with music and video sharing. Some such software allows the user to turn off the monitoring, assuming they are aware of it and can find instructions for disabling it. Anti-spyware is usually part of anti-virus programs; scan using at least two different AV packages. Spybot Search and Destroy is a good freeware program for looking for spyware. |
||
Loggers [src]Keystroke logging (often called keylogging) is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis. Key logging is often used by law enforcement, parents, and jealous or suspicious spouses (lovers). The most common use, however, is in the workplace, where your employer is monitoring your use of the computer. Unfortunately, all of these activities are legal. |
||
|
A logfile from a software-based keylogger. By Own work [GPL or Attribution], via Wikimedia Commons |
Screenshot of what was being logged. By own work (Own work) [MPL 1.1 or Attribution], via Wikimedia Commons |
Adware [src]Adware, or advertising-supported software, is any software package which automatically plays, displays, or downloads advertisements to a computer. These advertisements can be in the form of a pop-up. The object of the Adware is to generate revenue for its author. Adware, by itself, is harmless; however, some adware may come with integrated spyware such as keyloggers and other privacy-invasive software. Advertising functions are integrated into or bundled with the software, which is often designed to note what Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there – making it related to spyware. Adware is usually seen by the developer as a way to recover development costs, and in some cases it may allow the software to be provided to the user free of charge or at a reduced price. The income derived from presenting advertisements to the user may allow or motivate the developer to continue to develop, maintain and upgrade the software product. Conversely, the advertisements may be seen by the user as interruptions or annoyances, or as distractions from the task at hand. |
||
Some adware is also shareware, and so the word may be used as a term of distinction to differentiate between types of shareware software. What differentiates adware from other shareware is that it is primarily advertising-supported, like many free smartphone apps. Users may also be given the option to pay for a "registered" or "licensed" copy to do away with the advertisements. Pandora Radio offers both a free version (with ads) and a paid subscription (without ads). There is a group of software (Alexa toolbar, Google toolbar, Eclipse data usage collector, etc.) that sends data to a central server about which pages have been visited or which features of the software have been used. However they differ from "classic" malware because these tools only send data with the user's approval. The user may opt in to share the data in exchange for additional features and services, or (in case of Eclipse) as a form of voluntary support for the project. Some security tools report such loggers as malware while others do not. The status of this group is questionable. Some tools like PDFCreator are more on the boundary than others because opting out has been made more complex than it could be (during the installation, the user needs to uncheck two check boxes rather than one). However, PDFCreator is only sometimes mentioned as malware and is still subject of discussions. |
Malware statics on 2011-03-16 (Panda Security) By Malware_statics_2011-03-16-es.svg: Kizarderivative work: Kizar (Malware_statics_2011-03-16-es.svg) [CC-BY-SA-3.0-2.5-2.0-1.0 or GFDL], via Wikimedia Commons |
|