7
Malware , Trojans & Slurpware Varun Arora www.varunarora.in | [email protected]

Malware, Trojans and Slurpware

Embed Size (px)

DESCRIPTION

Presentation on the basics of Trojans, Malwares, Slurpwares

Citation preview

Page 1: Malware, Trojans and  Slurpware

Malware , Trojans & Slurpware

Varun Arora

www.varunarora.in | [email protected]

Page 2: Malware, Trojans and  Slurpware

What is Malware? Malicious + Software Made to cause harm Comes bundled with other programs

Types Adware

• Adware is the class of programs that place advertisements on your screen.

Spyware• Send information about you and your computer to somebody else.

Hijackers• Hijackers take control of various parts of your web browser, including

your home page, search pages, and search bar. Toolbars

• Toolbars plug into Internet Explorer and provide additional functionality such as search forms or pop-up blockers.

Dialers• Dialers are programs that set up your modem connection to connect to

a 1-900 number.

www.varunarora.in | [email protected]

Page 3: Malware, Trojans and  Slurpware

Trojan Malware that appears to perform a desirable function but

in fact performs undisclosed malicious functions.

Types Remote Access Data Sending Destructive Proxy FTP Security Software Disabler DoS Attacks (Denial of Service Attacks)

www.varunarora.in | [email protected]

Page 4: Malware, Trojans and  Slurpware

What a Trojan can do?

Erasing or overwriting data on a computer Re-installing itself after being disabled. Upload and download files Copying fake links, which lead to false websites, chats, or other account

based websites, showing any local account name on the computer falsely engaging in untrue context

Falsifying records of downloading software, movies, or games from websites never visited by the victim.

Allowing remote access to the victim's computer. This is called a RAT (remote access trojan)

Spreading other malware, such as viruses (this type of trojan horse is called a 'dropper' or 'vector)

Logging keystrokes to steal information such as passwords and credit card numbers

slowing down your computer displaying pornographic sites

www.varunarora.in | [email protected]

Page 5: Malware, Trojans and  Slurpware

Slurpware

The newest term in Internet security threats

It's when all the effective Internet attack elements come together to potentially steal a lot of money

'organized crime'

www.varunarora.in | [email protected]

Page 6: Malware, Trojans and  Slurpware

References:

http://en.wikipedia.org/wiki/Trojan_horse_(computing)

http://www.webopedia.com/TERM/T/Trojan_horse.html

http://www.informationweek.com/news/security/

vulnerabilities/showArticle.jhtml?articleID=57701972

http://seclab.cs.ucdavis.edu/projects/history/papers/

ande72.pdf

http://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-

thompson.pdf

www.varunarora.in | [email protected]

Page 7: Malware, Trojans and  Slurpware

THANK YOU!!

www.varunarora.in | [email protected]