Malware, Trojans and Slurpware

Preview:

DESCRIPTION

Presentation on the basics of Trojans, Malwares, Slurpwares

Citation preview

Malware , Trojans & Slurpware

Varun Arora

www.varunarora.in | varun@varunarora.in

What is Malware? Malicious + Software Made to cause harm Comes bundled with other programs

Types Adware

• Adware is the class of programs that place advertisements on your screen.

Spyware• Send information about you and your computer to somebody else.

Hijackers• Hijackers take control of various parts of your web browser, including

your home page, search pages, and search bar. Toolbars

• Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers.

Dialers• Dialers are programs that set up your modem connection to connect to

a 1-900 number.

www.varunarora.in | varun@varunarora.in

Trojan Malware that appears to perform a desirable function but

in fact performs undisclosed malicious functions.

Types Remote Access Data Sending Destructive Proxy FTP Security Software Disabler DoS Attacks (Denial of Service Attacks)

www.varunarora.in | varun@varunarora.in

What a Trojan can do?

Erasing or overwriting data on a computer Re-installing itself after being disabled. Upload and download files Copying fake links, which lead to false websites, chats, or other account

based websites, showing any local account name on the computer falsely engaging in untrue context

Falsifying records of downloading software, movies, or games from websites never visited by the victim.

Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)

Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector)

Logging keystrokes to steal information such as passwords and credit card numbers

slowing down your computer displaying pornographic sites

www.varunarora.in | varun@varunarora.in

Slurpware

The newest term in Internet security threats

It's when all the effective Internet attack elements come together to potentially steal a lot of money

'organized crime'

www.varunarora.in | varun@varunarora.in

References:

http://en.wikipedia.org/wiki/Trojan_horse_(computing)

http://www.webopedia.com/TERM/T/Trojan_horse.html

http://www.informationweek.com/news/security/

vulnerabilities/showArticle.jhtml?articleID=57701972

http://seclab.cs.ucdavis.edu/projects/history/papers/

ande72.pdf

http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-

thompson.pdf

www.varunarora.in | varun@varunarora.in

THANK YOU!!

www.varunarora.in | varun@varunarora.in

Recommended