1 of 41

Malware I

2013

2 of 41

Hello

Toomas Lepik

Information Security Expert

3 of 41

Who else

Allan Vein

And some other

4 of 41

Cource information and communication

course-malware@cert.ee

http://lambda.ee/wiki/Malware

Probably we will have additional resources they will be published in lambda !

5 of 41

Malware I Malware II

  • Malware overview
  • Modern attack trends (attacker strategies)
  • General concepts for organization protection
  • Commonly available resources
  • Malware Incident handling
  • introduction to static and dynamic analysis

Overview computer languages

Reverse engineering at advanced level

6 of 41

Requiaments / Graiding

1. Attendance at leas in 6 lectures from 8

(Exemption are on pre agreement to to additional work)

2. All given lab assignments (4 to 6) are passed:

- the assignments are done in time and correctly

- the student is able defend his work

3. The result of the final test is at least 70 points

Late “fees” will be applied.

7 of 41

Homework

  • Extention of lab in terms of finding additional information and writing lab report
  • Reading and writing essay
  • Finding 3 new things in week and preparing to talk about it.

8 of 41

Expectations

You will be active

I try to make it interactive !

I will make mistakes (sometimes intentional)

encourage you finding them :)

9 of 41

Remarcs

Chatham House Rule

When a meeting, or part thereof, is held under the Chatham House Rule, participants are free to use the information received, but neither the

identity nor the affiliation of the speaker(s), nor that of any other participant, may be revealed

10 of 41

Books

11 of 41

Malware what ?

Buzzwords anyone ?

12 of 41

My 5 cents From last week

13 of 41

Is it Bad or Good ?

14 of 41

15 of 41

16 of 41

17 of 41

18 of 41

19 of 41

http://www.csmonitor.com/var/ezflow_site/storage/images/media/images/1004-bushehr-iran-stuxnet.jpg/8751383-1-eng-US/1004-Bushehr-Iran-Stuxnet.JPG_full_600.jpg

20 of 41

21 of 41

Malware

Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code

http://en.wikipedia.org/wiki/Malware

22 of 41

Malware what ?

Software that “deliberately fulfills the harmful intent of an attacker” is commonly referred to as malicious software or malware

23 of 41

Some numbers and pictures.

24 of 41

25 of 41

26 of 41

Some where are THEY

27 of 41

What THEY want from us ?

28 of 41

Some Random Fluffy animals

29 of 41

Who THEY are !

•“Businessmen”

•“Anonymous's”

• States

• Other interested parties

30 of 41

Enviroment ! ?

31 of 41

32 of 41

With that a bit of statistic !

Operation system usage trends

http://www.netmarketshare.com/operating-system-market-share.aspx?qprid=10

33 of 41

A bit of statistic !

34 of 41

A bit of statistic !

35 of 41

How it infects ?

36 of 41

Vectors

  • Drive byes
  • exploiting unpatched security holes
  • Clickjacking
  • Social engineering
  • Thumb drives
  • Backups

37 of 41

Vectors

  • Desktop
    • Drive byes
    • web –Chat
    • removable media
    • Social enginering
    • Bacups
  • Servers
    • Leaked passwords
    • password cracking
    • exploiting unpatched security holes
    • Social enginering

38 of 41

39 of 41

40 of 41

http://www.youtube.com/watch?v=yVL34RpjOWc

41 of 41

In some sens the reality for fighting modern Malware is Advesary model.

Sun Tzu 

So it is said that if you know your enemies and know yourself, you can win a hundred battles without a single loss.

If you only know yourself, but not your opponent, you may win or may lose.

If you know neither yourself nor your enemy, you will always endanger yourself.