+ All Categories
Home > Documents > Phishing for Worms

Phishing for Worms

Date post: 25-May-2015
Category:
Upload: ebayworld
View: 968 times
Download: 1 times
Share this document with a friend
Popular Tags:
75
1 TCEA Workshop 6898: Phishing for Worms – Why is my Computer so Slow? A brief look at some A brief look at some annoying and sometimes annoying and sometimes dangerous creatures dangerous creatures inhabiting cyberspace inhabiting cyberspace William Ball, Technology William Ball, Technology Coordinator Coordinator Holli Horton, Technology Holli Horton, Technology Trainer Trainer Calallen ISD Calallen ISD Corpus Christi, TX Corpus Christi, TX
Transcript
Page 1: Phishing for Worms

1

TCEA Workshop 6898:Phishing for Worms – Why is my

Computer so Slow?

A brief look at some annoying and A brief look at some annoying and sometimes dangerous creatures sometimes dangerous creatures

inhabiting cyberspaceinhabiting cyberspace

William Ball, Technology William Ball, Technology CoordinatorCoordinator

Holli Horton, Technology TrainerHolli Horton, Technology Trainer

Calallen ISDCalallen ISD

Corpus Christi, TXCorpus Christi, TX

Page 2: Phishing for Worms

2

How prevalent are viruses and things?

More than two thirds of home users think More than two thirds of home users think they are safe from online threats. they are safe from online threats.

Page 3: Phishing for Worms

3

Viruses, worms, and Trojan Horses Viruses, worms, and Trojan Horses are malicious programs that can are malicious programs that can cause damage to your computer cause damage to your computer and information on your computer. and information on your computer.

Page 4: Phishing for Worms

4

With an ounce of prevention and With an ounce of prevention and some good common sense, you are some good common sense, you are less likely to fall victim to these less likely to fall victim to these threats. threats.

Page 5: Phishing for Worms

5

Be a Critical Thinker

Page 6: Phishing for Worms

6

What is a virus?

Virus (n.)Virus (n.) Code written with the Code written with the express intention of replicating express intention of replicating itself. A virus attempts to spread itself. A virus attempts to spread from computer to computer by from computer to computer by attaching itself to a host program. attaching itself to a host program. It may damage hardware, software, It may damage hardware, software, or information.or information.

Page 7: Phishing for Worms

7

What is a worm?

Worm (n.)Worm (n.) A subclass of virus. A A subclass of virus. A worm generally spreads without worm generally spreads without user action and distributes user action and distributes complete copies (possibly complete copies (possibly modified) of itself across networks. modified) of itself across networks. A worm can consume memory or A worm can consume memory or network bandwidth, thus causing a network bandwidth, thus causing a computer to stop responding. computer to stop responding.

Page 8: Phishing for Worms

8

What is a Trojan Horse?

Trojan Horse (n.)Trojan Horse (n.) A computer A computer program that appears to be useful but program that appears to be useful but that actually does damage.that actually does damage.

One of the most insidious types of Trojan horse is a One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses program that claims to rid your computer of viruses but instead introduces viruses onto your computer. but instead introduces viruses onto your computer.

Page 9: Phishing for Worms

9

How do these spread?

Many of the most dangerous Many of the most dangerous viruses are primarily spread viruses are primarily spread through e-mailthrough e-mail

Page 10: Phishing for Worms

10

Tip:

Never open anything that is Never open anything that is attached to an e-mail unless you attached to an e-mail unless you were expecting the attachment were expecting the attachment andand you know the exact contents of that you know the exact contents of that file. file.

Page 11: Phishing for Worms

11

Be a Critical Thinker

Page 12: Phishing for Worms

12

Page 13: Phishing for Worms

13

Googling the phone number (703) 482-0623 gets:• Phonebook results for 703-482-0623: Phonebook results for 703-482-0623:

United States Government, Central United States Government, Central Intelligence Agency, (Intelligence Agency, (703703) ) 482482--06230623, , Mc Lean, VA 22101 Mc Lean, VA 22101

• This is not the CIA Office of Public Affairs This is not the CIA Office of Public Affairs in Washington, D.C., as the email reports.in Washington, D.C., as the email reports.

Page 14: Phishing for Worms

14

FBI Warns of Email Scam

The Federal Bureau of Investigation issued an alert about a scam involving unsolicited e-mails, purportedly sent by the FBI, that tell computer users that their Internet surfing is being monitored by the agency. The users are told they have visited illegal Web sites and are instructed to open an attachment to answer questions, reports CNN.

This email virus is a variant of the Sober Y worm which was originally discovered on November 16th, 2005. Like the previous variants, this one sends itself inside a ZIP archive as an attachment in e-mail messages with English or German texts.

It should be noted that along with the "usual" messages that look like fake bounces, password change notification requests, Paris Hilton video ads and so on, the worm sends messages that look like they come from FBI or CIA. The From field of such messages contains any of the following:

[email protected] (also can be Office@, Admin@, Mail@, Post@)[email protected] (also can be Office@, Admin@, Mail@, Post@)

The Subject field contains any of the following: You visit illegal websitesYour IP was logged

The FBI is investigating the scam.

Page 15: Phishing for Worms

15

Page 16: Phishing for Worms

16

The reason this email was successful was because:

• It came from a perceived important or It came from a perceived important or powerful personpowerful person

• Accused wrongdoing; plays on guiltAccused wrongdoing; plays on guilt• Gave an opportunity to right a wrongGave an opportunity to right a wrong

This is called…This is called…

Page 17: Phishing for Worms

17

Social Engineering

Page 18: Phishing for Worms

18

In the field of computer security, social engineering is the practice of obtaining confidential information by manipulation of legitimate users.

Page 19: Phishing for Worms

19

By this method, social engineers exploit the natural tendency of a person to trust his or her word, rather than exploiting computer security holes. It is generally agreed upon that “users are the weak link” in security and this principle is what makes social engineering possible.

Page 20: Phishing for Worms

20

Beware of messages that request password or credit card information in order to “set up their account” or “reactivate settings”.

Page 21: Phishing for Worms

21

Do not divulge sensitive information, passwords or otherwise, to people claiming to be administrators.

Page 22: Phishing for Worms

22

System administrators do not need to know your password to do any work on the servers.

Page 23: Phishing for Worms

23

Social engineering works — in an Infosecurity survey, 90% of office workers gave away their password in exchange for a cheap pen!

Page 24: Phishing for Worms

24

Be a Critical Thinker

Page 25: Phishing for Worms

25

What is Phishing?

Phishing (v.)Phishing (v.) is a high-tech scam is a high-tech scam that uses spam or pop-up messages that uses spam or pop-up messages to deceive you into disclosing your to deceive you into disclosing your credit card numbers, bank account credit card numbers, bank account information, Social Security information, Social Security number, passwords, or other number, passwords, or other sensitive information. sensitive information.

Page 26: Phishing for Worms

26

• In 2005, phishing represented an average of In 2005, phishing represented an average of one in every 304 emails, compared to one in one in every 304 emails, compared to one in every 943 in 2004.every 943 in 2004.

Page 27: Phishing for Worms

27

Page 28: Phishing for Worms

28

              

  Dear Citibank Customer,Dear Citibank Customer,When signing on to Citibank Online, you or somebody else When signing on to Citibank Online, you or somebody else have made several login attempts and reached your daily have made several login attempts and reached your daily attempt limit. As an additional security measure your access attempt limit. As an additional security measure your access to Online Banking has been limited. This Web security to Online Banking has been limited. This Web security measure does not affect your access to phone banking or measure does not affect your access to phone banking or ATM banking. ATM banking.

Please verify your information Please verify your information herehere, before trying to sign on , before trying to sign on again. You will be able to attempt signing on to Citibank again. You will be able to attempt signing on to Citibank Online within twenty-four hours after you verify your Online within twenty-four hours after you verify your information. (You do not have to change your Password at this information. (You do not have to change your Password at this time.)time.)  Citibank Online Customer ServiceCitibank Online Customer Service

Copyright © 2004 CiticorpCopyright © 2004 Citicorp

Page 29: Phishing for Worms

29

<font color="#000000" face="Arial">

<p>When signing on to Citibank Online, you or somebody else have made several login attempts and reached your daily attempt limit. As an additional security measure your access to Online Banking has been limited. This Web security measure does not affect your access to phone banking or ATM banking. </p>

<p>Please verify your information <a href="http://200.189.70.90/citi">here</a>, before trying to sign on again. You will be able to attempt signing on to Citibank Online within twenty-four hours after you verify your information. (You do not have to change your Password at this time.)</p>

<p>&nbsp;</p>

<p><b>Citibank Online Customer Service</b></p> <br>

</td>

Page 30: Phishing for Worms

30

We regret to inform you that your eBay account could be suspended if you don't re-update your account information. To resolve this problems please click here and re-enter your account information. If your problems could not be resolved your account will be suspended for a period of 3-4 days, after this period your account will be terminated.

For the User Agreement, Section 9, we may immediately issue a warning, temporarily suspend, indefinitely suspend or terminate your membership and refuse to provide our services to you if we believe that your actions may cause financial loss or legal liability for you, our users or us. We may also take these actions if we are unable to verify or authenticate any information you provide to us.

Due to the suspension of this account, please be advised you are prohibited from using eBay in any way. This includes the registering of a new account. Please note that this suspension does not relieve you of your agreed-upon obligation to pay any fees you may owe to eBay.

Regards,Safeharbor Department eBay, Inc

Dear valued customer

    Need Help?

Dear valued customer

Dear valued customer

Page 31: Phishing for Worms

31

<DIV style="width: 605; height: 224"><STRONG><FONT face=arial> We regret to inform you that your eBay account could be suspended if you don't re-update your account information. To resolve this problems please </FONT> <a target="_blank" a href="http://211.239.171.57/alfa/eBayISAPI.php?MfcISAPICommand=SignInFPP&UsingSSL=1&email=&userid="><FONT face=arial color=#0000ff>click here</FONT></a></STRONG><FONT face=arial> and re-enter your account information. If your problems could not be resolved your account will be suspended for a period of 3-4 days, after this period your account will be terminated.

Page 32: Phishing for Worms

32

Page 33: Phishing for Worms

33

Page 34: Phishing for Worms

34

href="http://wordart.co.jp/.online/co/

login.php">https://service.capitalone.com/oas/

login.do?objectclicked=LoginSplash</

a></FONT></TD>

The code disguises the real target of this link:

href="http://wordart.co.jp/.online/co/login.php">https://service.capitalone.com/oas/login.do?objectclicked=LoginSplash</a></FONT></TD>

Page 35: Phishing for Worms

35

Where is this taking you?

Is this a secure site?

Page 36: Phishing for Worms

36

Where is this taking you?

Is this a secure site?

Page 37: Phishing for Worms

37

How Not to Get Hooked by a Phishing Scam

from the Federal Trade Commissionfrom the Federal Trade Commission

Page 38: Phishing for Worms

38

Do not reply or click the link

Legitimate companies don’t ask for Legitimate companies don’t ask for account information via email. If account information via email. If you are concerned about your you are concerned about your account, contact the organization in account, contact the organization in the email using a telephone number the email using a telephone number you know to be genuine, or open a you know to be genuine, or open a new Internet browser session and new Internet browser session and type in the company’s correct Web type in the company’s correct Web address.address.

Page 39: Phishing for Worms

39

Don’t email personal or financial information

Email is not a secure method of Email is not a secure method of transmitting personal information.transmitting personal information.

Period. Period.

Page 40: Phishing for Worms

40

Review credit card and bank statements as soon as you receive

them

Determine whether there are any Determine whether there are any unauthorized charges. If your unauthorized charges. If your statement is late by more than a statement is late by more than a couple of days, call your credit couple of days, call your credit card company or bank to confirm card company or bank to confirm your billing address and account your billing address and account balances.balances.

Page 41: Phishing for Worms

41

Use anti-virus software and keep it up to date

Some phishing emails contain Some phishing emails contain software that can harm your software that can harm your computer or track your activities computer or track your activities on the Internet without your on the Internet without your knowledge.knowledge.

Page 42: Phishing for Worms

42

Be cautious about opening any attachment regardless of who sent

them

Have you heard this before?Have you heard this before?

Page 43: Phishing for Worms

43

Report suspicious activity to the FTC

If you get spam that is phishing for If you get spam that is phishing for information, forward it to information, forward it to [email protected] If you believe [email protected] If you believe you’ve been scammed, file your you’ve been scammed, file your complaint at www.ftc.gov. complaint at www.ftc.gov.

Page 44: Phishing for Worms

44

Be a Critical Thinker

Page 45: Phishing for Worms

45

What is spyware?

SpywareSpyware is Internet jargon for is Internet jargon for Advertising Supported software.Advertising Supported software. It is a way for shareware authors to It is a way for shareware authors to make money from a product, other make money from a product, other than by selling it to the users. than by selling it to the users.

Page 46: Phishing for Worms

46

Spyware is any technology that Spyware is any technology that aids in gathering information about aids in gathering information about a person or organization without a person or organization without their knowledge.their knowledge.

Page 47: Phishing for Worms

47

Drive-by Download?

A drive-by download is a program A drive-by download is a program that is automatically downloaded that is automatically downloaded to your computer, often without to your computer, often without your consent or even your your consent or even your knowledge. knowledge.

Page 48: Phishing for Worms

48

Unlike a pop-up download, which Unlike a pop-up download, which asks for assent (albeit in a asks for assent (albeit in a calculated manner likely to lead to calculated manner likely to lead to a "yes"), a drive-by download is a "yes"), a drive-by download is carried out invisibly to the user: it carried out invisibly to the user: it can be initiated by simply visiting can be initiated by simply visiting a Web site or viewing an HTML e-a Web site or viewing an HTML e-mail message. mail message.

Page 49: Phishing for Worms

49

Why is it called spyware?

While this may be a great concept, While this may be a great concept, the downside is that the advertising the downside is that the advertising companies also install additional companies also install additional tracking software on your system, tracking software on your system, which is continuously "calling which is continuously "calling home", using your Internet home", using your Internet connection and reports statistical connection and reports statistical data to the "mothership".data to the "mothership".

Page 50: Phishing for Worms

50

Is spyware illegal?

Even though the name may Even though the name may indicate so, Spyware is not an indicate so, Spyware is not an illegal type of software in any way. illegal type of software in any way. However there are certain issues However there are certain issues that a privacy oriented user may that a privacy oriented user may object to and therefore prefer not to object to and therefore prefer not to use the product.use the product.

Page 51: Phishing for Worms

51

What is adware?

Generically, adware is any Generically, adware is any software application in which software application in which advertising banners are displayed advertising banners are displayed while the program is running.while the program is running.

Page 52: Phishing for Worms

52

Adware has been criticized Adware has been criticized because it usually includes code because it usually includes code that tracks a user's personal that tracks a user's personal information and passes it on to information and passes it on to third parties, without the user's third parties, without the user's authorization or knowledge. authorization or knowledge.

Page 53: Phishing for Worms

53

In addition to privacy and security In addition to privacy and security concerns, resource-hogging adware concerns, resource-hogging adware and spyware can cause system and and spyware can cause system and browser instability and slowness. browser instability and slowness. For users paying for dialup For users paying for dialup services by time used, ad-loading services by time used, ad-loading and hidden communications with and hidden communications with servers can be costly.servers can be costly.

Page 54: Phishing for Worms

54

Adware isn't necessarily spyware. Adware isn't necessarily spyware. Registered shareware without ads Registered shareware without ads may be spyware. Purchased out-of-may be spyware. Purchased out-of-the-box software may contain the-box software may contain adware and may also be spyware. adware and may also be spyware.

Page 55: Phishing for Worms

55

All this makes for a confusing All this makes for a confusing mess and users need to be on guard mess and users need to be on guard when installing any type of when installing any type of software. software.

Page 56: Phishing for Worms

56

Be a Critical Thinker

Page 57: Phishing for Worms

57

Top 10 Cyber Security Tips

from StaySafeOnline.com from StaySafeOnline.com

Page 58: Phishing for Worms

58

1. Use anti-virus software and keep it up to date

Anti-virus software is designed to Anti-virus software is designed to protect you and your computer against protect you and your computer against known viruses so you don’t have to known viruses so you don’t have to worry. But with new viruses emerging worry. But with new viruses emerging daily, anti-virus programs need regular daily, anti-virus programs need regular updates, like annual flu shots, to updates, like annual flu shots, to recognize these new viruses. Be sure to recognize these new viruses. Be sure to update your anti-virus software update your anti-virus software regularly.regularly.

Page 59: Phishing for Worms

59

2. Don’t open emails or attachments from unknown sources

A simple rule of thumb is that if A simple rule of thumb is that if you don't know the person who is you don't know the person who is sending you an email, be very sending you an email, be very careful about opening the email careful about opening the email and any file attached to it. Should and any file attached to it. Should you receive a suspicious email, the you receive a suspicious email, the best thing to do is to delete the best thing to do is to delete the entire message, including any entire message, including any attachment. attachment.

Page 60: Phishing for Worms

60

3. Protect your computer from Internet intruders – use firewalls

Firewalls create a protective wall between Firewalls create a protective wall between your computer and the outside world. They your computer and the outside world. They come in two forms, software firewalls that come in two forms, software firewalls that run on your personal computer and run on your personal computer and hardware firewalls that protect a number of hardware firewalls that protect a number of computers at the same time. They work by computers at the same time. They work by filtering out unauthorized or potentially filtering out unauthorized or potentially dangerous types of data from the Internet, dangerous types of data from the Internet, while still allowing other (good) data to while still allowing other (good) data to reach your computer. reach your computer.

Page 61: Phishing for Worms

61

4. Regularly download updates and patches for your OS and other

software

Most major software companies Most major software companies today release updates and patches today release updates and patches to close newly discovered to close newly discovered vulnerabilities in their software.vulnerabilities in their software.

Page 62: Phishing for Worms

62

5. Use hard-to-guess passwords

Mix upper case, lower case, Mix upper case, lower case, numbers, or other characters not numbers, or other characters not easy to find in a dictionary, and easy to find in a dictionary, and make sure they are at least eight make sure they are at least eight characters long. Don’t share your characters long. Don’t share your password, and don’t use the same password, and don’t use the same password in more than one place. password in more than one place.

Page 63: Phishing for Worms

63

6. Back-up your data on disks or CDs regularly

Back up small amounts of data on Back up small amounts of data on floppy diskettes and larger floppy diskettes and larger amounts on CDs or DVDs. If you amounts on CDs or DVDs. If you have access to a network, save have access to a network, save copies of your data on another copies of your data on another computer in the network.computer in the network.

Page 64: Phishing for Worms

64

7. Don’t share access to your computers with strangers

Your computer operating system may allow Your computer operating system may allow other computers on a network, including the other computers on a network, including the Internet, to access the hard-drive of your Internet, to access the hard-drive of your computer in order to “share files”. This computer in order to “share files”. This ability to share files can be used to infect ability to share files can be used to infect your computer with a virus or look at the your computer with a virus or look at the files on your computer if you don’t pay files on your computer if you don’t pay close attention. (Music sharing programs close attention. (Music sharing programs like Kazaa, Napster, and Gnutella are like Kazaa, Napster, and Gnutella are common music file sharing programs.)common music file sharing programs.)

Page 65: Phishing for Worms

65

8. Disconnect from the Internet when not in use

Disconnecting your computer from Disconnecting your computer from the Internet when you’re not online the Internet when you’re not online lessens the chance that someone lessens the chance that someone will be able to access your will be able to access your computer. computer.

Page 66: Phishing for Worms

66

9. Check your security on a regular basis

You should evaluate your You should evaluate your computer security at least twice a computer security at least twice a year. Look at the settings on year. Look at the settings on applications that you have on your applications that you have on your computer. Your browser software, computer. Your browser software, for example, typically has a for example, typically has a security setting in its preferences security setting in its preferences area. area.

Page 67: Phishing for Worms

67

10. Make sure you know what to do if your computer becomes infected

It’s important that everyone who uses a It’s important that everyone who uses a computer be aware of proper security computer be aware of proper security practices. People should know how to practices. People should know how to update virus protection software, how update virus protection software, how to download security patches from to download security patches from software vendors and how to create a software vendors and how to create a proper password. proper password.

(If in doubt, contact the nearest 14 year-old.)(If in doubt, contact the nearest 14 year-old.)

Page 68: Phishing for Worms

68

Be a Critical Thinker

Page 69: Phishing for Worms

69

Free Tools

Page 70: Phishing for Worms

70

Microsoft Anti-Spyware

Page 71: Phishing for Worms

71

Lavasoft’s AdAware

Page 72: Phishing for Worms

72

Spybot Search and Destroy

Be careful – none of these sites is what you want!

Page 73: Phishing for Worms

73

Spybot Search and Destroy

Tucows is a safe site to download from.

Page 74: Phishing for Worms

74

How do you fix this mess?

• Be aware of Social Engineering techniquesBe aware of Social Engineering techniques• Never share your password with anyone Never share your password with anyone • Protect your computer:Protect your computer:

• Keep your OS updates currentKeep your OS updates current• Use antivirus software and keep it up-to-Use antivirus software and keep it up-to-

datedate• Use programs like Adaware and Spybot Use programs like Adaware and Spybot

Search and Destroy to keep your Search and Destroy to keep your computer free from malwarecomputer free from malware

Page 75: Phishing for Worms

75

Be a Critical Thinker


Recommended