Professional Documents
Culture Documents
ch03
ch03
Detection
Chapter Three
Understanding Malware and Social
Engineering
Understanding Malware
Malicious Software (Malware)
• Installed through devious means
• Symptoms:
– System runs slower
– Unknown processes start
– Sends out email by itself
– Random reboots
– more…
• Boot Virus: The first known successful computer virus . These are not
able to infect over networks. These take the boot process of personal
computers.
Overwriting Viruses: These locate another file on the disk and overwrite with
their own copy.
• http://www.pcworld.idg.com.au/article/345399/
lovebug_worm_hit_10_years_ago_during_simpler_time/
Guide to Firewalls and VPNs, 3rd Edition
Trojan Horse
• Appears to be a good program, but does
something nasty instead
• Very common in warez (pirated games & apps),
keygens, pirated movies, etc.
• Rogue antivirus "scareware"
• http://www.fixrogues.com/internet-security-2012-virus-removal-guide
Guide to Firewalls and VPNs, 3rd Edition
Mac Flashback Trojan
• http://www.forbes.com/sites/adriankingsleyhughes/2012/04/05/why-you-should-install-
antivirus-on-your-mac/
Guide to Firewalls and VPNs, 3rd Edition
Logic Bombs
• Code that waits for some event, like a certain date
• Planted by malicious insiders
• Then executes payload
– May destroy data, etc.
• Passwords appear as
dots