ILOVEYOU” Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Computer Security CS 426 Lecture 15
Computer Security CS 426 Lecture 15 Malwares CS426 Fall 2010/Lecture 15 1 Trapdoor • SttitittSecret entry point into a system – Specific user identifier or password that circumvents normal security procedures. • Commonlyyy used by developers – Could be included in a compiler. CS426 Fall 2010/Lecture 15 2 Logic Bomb • Embedded in legitimate programs • Activated when specified conditions met – E.g., presence/absence of some file; Particular date/time or particular user • When triggered, typically damages system – Modify/delete files/disks CS426 Fall 2010/Lecture 15 3 Examppgle of Logic Bomb • In 1982 , the Trans-Siber ian Pipe line inc iden t occurred. A KGB operative was to steal the plans fhititdtltditfor a sophisticated control system and its software from a Canadian firm, for use on their Siberi an pi peli ne. The CIA was tippe d o ff by documents in the Farewell Dossier and had the company itlibbithinsert a logic bomb in the program for sabotage purposes. This eventually resulted in "the most monu mental non-nu clear ex plosion and fire ever seen from space“. CS426 Fall 2010/Lecture 15 4 Trojan Horse • Program with an overt Example: Attacker: (expected) and covert effect Place the following file cp /bin/sh /tmp/.xxsh – Appears normal/expected chmod u+s,o+x /tmp/.xxsh – Covert effect violates security policy rm ./ls • User tricked into executing ls $* Trojan horse as /homes/victim/ls – Expects (and sees) overt behavior – Covert effect performed with • Victim user’s authorization ls CS426 Fall 2010/Lecture 15 5 Virus • Self-replicating -
IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions
IBM Security Solutions May 2011 IBM X-Force Threat Insight Quarterly 2 X-Force Threat Insight Quarterly IBM Security Solutions Contents About the report 2 About the Report The IBM X-Force® Threat Insight Quarterly is designed to highlight some of the most significant threats and challenges 3 Evolution: From Nuisance to Weapon facing security professionals today. This report is a product of IBM Managed Security Services and the IBM X-Force 8 Prolific and Impacting Issues of Q1 2011 research and development team. Each issue focuses on specific challenges and provides a recap of the most significant recent 16 References online threats. IBM Managed Security Services are designed to help an organization improve its information security, by outsourcing security operations or supplementing your existing security teams. The IBM protection on-demand platform helps deliver Managed Security Services and the expertise, knowledge and infrastructure an organization needs to secure its information assets from Internet attacks. The X-Force team provides the foundation for a preemptive approach to Internet security. The X-Force team is one of the best-known commercial security research groups in the world. This group of security experts researches and evaluates vulnerabilities and security issues, develops assessment and countermeasure technology for IBM security products, and educates the public about emerging Internet threats. We welcome your feedback. Questions or comments regarding the content of this report should be addressed to [email protected]. 3 X-Force Threat Insight Quarterly IBM Security Solutions Evolution: From Nuisance to Weapon One of the more notable examples here is Brain3, a boot sector infector which originated in Pakistan and released in 1986, was Creeper, Wabbit, Animal, Elk Cloner, Brain, Vienna, Lehigh, one of the first examples of malware that infected PC’s running Stoned, Jerusalem. -
Computer Viruses and Malware Advances in Information Security
Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A. -
T-AIMD-00-171 Information Security: 'ILOVEYOU'
United States General Accounting Office GAO Testimony Before the Subcommittee on Technology, Committee on Science, House of Representatives For Release on Delivery Expected at 10 a.m. INFORMATION Wednesday, May 10, 2000 SECURITY “ILOVEYOU” Computer Virus Emphasizes Critical Need for Agency and Governmentwide Improvements Statement of Keith A. Rhodes Director, Office of Computer and Information Technology Assessment Accounting and Information Management Division GAO/T-AIMD-00-171 Madam Chairwoman and Members of the Subcommittee: Thank you for inviting me to participate in today’s hearing on the “ILOVEYOU” computer virus. About this time last year, I testified before this Subcommittee on the “Melissa” virus, which temporarily disrupted the operations of some agencies by forcing them to shut down their e- mail systems.1 At that hearing, I stressed that the next virus would likely propagate faster, do more damage, and be more difficult to detect and counter. This is just what we have experienced with ILOVEYOU. While it looked a lot like Melissa in its operation, it moved much more swiftly, and it appears to have caused as much, if not more, disruption. Nevertheless, the lessons to be gleaned from both attacks are the same. Federal agencies must implement vigorous security programs to enable them to closely watch their information resources for signs of attack or intrusion and to quickly react to such events when detected. Moreover, the government as a whole must promptly implement long-term solutions that will ensure that agencies focus on security from an organizationwide perspective and implement a comprehensive set of security controls. It must also establish central tracking and reporting mechanisms to facilitate analyses of these and other forms of attacks and their impact. -
Malware Primer Malware Primer
Malware Primer Malware Primer Table of Contents Introduction Introduction ...........................................................................................................................................................................2 In The Art of War, Sun Tzu wrote, “If you know the enemy and know yourself, you need not fear the result of a hundred battles.” This certainly applies Chapter 1: A Brief History of Malware—Its Evolution and Impact ..............................3 to cyberwarfare. This primer will help you get to know cybercriminals by providing you with a solid foundation in one of their principle weapons: Chapter 2: Malware Types and Classifications ....................................................................................8 malware. Chapter 3: How Malware Works—Malicious Strategies and Tactics ........................11 Our objective here is to provide a baseline of knowledge about the different types of malware, what malware is capable of, and how it’s distributed. Chapter 4: Polymorphic Malware—Real Life Transformers .............................................14 Because effectively protecting your network, users, data, and company from Chapter 5: Keyloggers and Other Password Snatching Malware ...............................16 malware-based attacks requires an understanding of the various ways that the enemy is coming at you. Chapter 6: Account and Identity Theft Malware ...........................................................................19 Keep in mind, however, that we’re only able here -
Cyber Security and Leadership Solutions
Cyber Security and Leadership Solutions James Risler Manager – Security Content Development MBA, CISSP #456200, CCIE# 15412 [email protected] © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 • The “Why” • Trends • Threat Landscape • Examples of Cyber Attacks • Business Challenge • People Problem • Recommendations • Conclusion & Q&A © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2 The “Why” Anthem Home Depot JP Morgan Adobe Target Univ. of MD Neiman Marcus TJ Maxx Sony Zappos LinkedIn Citigroup Florida Courts http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 Attacks per vertical segment • Over 15% of attacks are targeted at financial institutions • Attacks include : DDoS Spyware Ransomware Mobile devices SPAM Web Exploits • Source : IDC ™ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 • 2008 – 100 Million Credit and debit card numbers stolen by spyware from Heartland Payment Systems • 2014 – 76 Million household accounts and 7 million SMB accounts compromised at JP Morgan Chase • 2015 - DDoS attack launched on OP-Pohjola and Danske Bank • ... And more : European Central Bank extortion attempt Multi-bank attack by Eurograbber © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Threat Landscape is Evolving… Reputation Enterpris Antivirus IDS/IPS Intelligence (Global) e (Host- (Network and and Response Based) Perimeter) Analytics Sandboxing (Cloud) Spyware Increased APT’S Attack and Cyberwar Worms Rootkits Surface 2000 2005 2010 Tomorrow © 2010 Cisco and/or its affiliates. All rights reserved. -
The Most Popular Viruses of All Times
The Most Popular Viruses Of All Times Learn All About The Most Popular Viruses of All Time The Coding Eagle The Most Popular Viruses Of All Times Learn All About The Most Popular Viruses of All Time The Coding Eagle This book is for sale at http://leanpub.com/mostpopularviruses This version was published on 2015-03-21 This is a Leanpub book. Leanpub empowers authors and publishers with the Lean Publishing process. Lean Publishing is the act of publishing an in-progress ebook using lightweight tools and many iterations to get reader feedback, pivot until you have the right book and build traction once you do. ©2015 The Coding Eagle Tweet This Book! Please help The Coding Eagle by spreading the word about this book on Twitter! The suggested hashtag for this book is #Viruses. Find out what other people are saying about the book by clicking on this link to search for this hashtag on Twitter: https://twitter.com/search?q=#Viruses Contents Chapter One ............................................ 1 Introduction ........................................... 1 Viruses Covered in This Book ................................. 1 Chapter 2: Terms .......................................... 2 Worms .............................................. 2 Trojans .............................................. 2 Denial of Service Attack (DDoS) ................................ 2 Botnets .............................................. 2 Popular Windows Security Holes ................................ 3 Chapter 3: MyDoom ........................................ 4 Introduction -
Code Red, Code Red II, and Sircam Attacks Highlight Need for Proactive Measures
United States General Accounting Office GAO Testimony Before the Subcommittee on Government Efficiency, Financial Management, and Intergovernmental Relations, Committee on Government Reform, House of Representatives For Release on Delivery Expected at 10 a.m., PDT INFORMATION Wednesday August 29, 2001 SECURITY Code Red, Code Red II, and SirCam Attacks Highlight Need for Proactive Measures Statement of Keith A. Rhodes Chief Technologist GAO-01-1073T Mr. Chairman and Members of the Subcommittee: Thank you for inviting me to participate in today’s hearing on the most recent rash of computer attacks. This is the third time I’ve testified before Congress over the past several years on specific viruses—first, the “Melissa” virus in April 1999 and second, the “ILOVEYOU” virus in May 2000. At both hearings, I stressed that the next attack would likely propagate faster, do more damage, and be more difficult to detect and counter. Again, we are having to deal with destructive attacks that are reportedly costing billions. In the past 2 months, organizations and individuals have had to contend with several particularly vexing attacks. The most notable, of course, is Code Red but potentially more damaging are Code Red II and SirCam. Together, these attacks have infected millions of computer users, shut down Web sites, slowed Internet service, and disrupted business and government operations. They have already caused billions of dollars of damage and their full effects have yet to be completely assessed. Today, I would like to discuss the makeup and potential threat that each of these viruses pose as well as reported damages. I would also like to talk about progress being made to protect federal operations and assets from these types of attacks and the substantial challenges still ahead. -
The Return of Qbot Background
The Return of Qbot Background Qbot, also known as Qakbot, is a network-aware worm with backdoor capabilities, primarily designed as a credential harvester. It is an old threat and was well-described by Symantec back in 2009.1 The company later released a whitepaper which described Qbot version 910 in great detail.2 In December 2015, several researchers reported that websites hosting the Rig Exploit Kit were serving an updated version of Qbot.3 4 5 Then in January 2016, over 500 devices at a large public organisation were infected with Qbot: the worm was back, and it was both more and less effective. While all versions of Microsoft Windows the worm touched in the attack were compromised, a number of Windows XP machines crashed and failed to restart: despite its renewed potency, the programmers behind Qbot hadn’t built their bot to be compatible with older versions of Windows. BAE Systems’ Incident Response team were called in to investigate the ongoing infection and support in containing and remediating the threat. A number of Qbot samples were found within the victim organisation’s network; all samples polymorphic variations of the same Qbot family. Further research and tracking of the campaign led us to discovery of a sizeable botnet, consisting of over 54,517 distinct infected machines across a two-week investigation period. The vast majority of these (over 85%) were located in the United States. This report seeks to provide a description of unique and previously unseen aspects of Qbot functionality primarily, including delivery methods and supporting infrastructure. However, we also describe multiple known aspects of Qbot, especially where those aspects are important and may have been modified or redesigned, making them different from previous versions. -
It Flash Jagan Institute of Management Studies
Jims It Flash Jagan Institute of Management Studies August 2014 IT FLASH Volume 8 Issue 6 Year 2014 Viruses Here are my top 5 Worms, Trojans, or Viruses. 1. Melissa A macro virus named after a Miami stripper, was so effective in 1999 that the tidal wave of email traffic it gen- erated caused the likes of Intel and Microsoft to shut down their email servers. The virus contained a Word document labeled List.DOC as an attachment to an email allowing access to porn sites. 2. The Anna Kournikova Virusq qq This computer virus was attributed to a Dutch programmer Jan de Wit on February 11, 2001. The virus was designed to trick a recipient into opening a message by suggesting that it contained a picture of the lovely Anna Kournikova, instead the recipient triggered a malicious program. 3. MyDoom MyDoom began appearing in inboxes in 2004 and soon became the fastest spreading worm ever to hit the web, exceeding previous records set by the Sobig worm and ILOVEYOU. A side note, though I knew people affect- ed by Sobig and ILOVEYOU, I did not see either of these in the wild. The reason that MyDoom was effective was that the recipient would receive an email warning of delivery fail- ure – a message we have all seen at one time or another. The message prompted the recipient to investigate thus triggering the worm. 4. Sasser & Netsky Easily one of the most famous and prolific variants of computer worms, famous for effectiveness and the fact that it was authored by an 18 year-old German, Sven Jaschan, who confessed to having written these and other worms. -
Antivirus Software Anti Virus
ANTIVIRUS SOFTWARE ANTI VIRUS Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and Trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware 6/20/2012 TechReg-WelkinRaja HISTORY OF ANTIVIRUS Most of the computer viruses that were written in the early and mid '80s were limited to self-reproduction and had no specific damage routine built into the code (research viruses) The first publicly documented removal of a computer virus in the wild was performed by Bernd Fix in 1987. Fred Cohen, who published one of the first academic papers on computer viruses in 1984, started to develop strategies for antivirus software in 1988 that were picked up and continued by later antivirus software developers. 6/20/2012 TechReg-WelkinRaja IDENTIFICATION METHODS There are several methods which antivirus software can use to identify malware. Signature based detection Heuristic-based detection 6/20/2012 TechReg-WelkinRaja SIGNATURE BASED DETECTION Signature based detection is the most common method. To identify viruses and other malware, antivirus software compares the contents of a file to a dictionary of virus signatures. This can be very effective, but cannot defend against malware unless samples have already been obtained and signatures created. Because of this, signature-based approaches are not effective against new, unknown viruses. Because new viruses are being created each day, the signature-based detection approach requires frequent -
The Ultimate Cybersecurity Guide for the It Professional
THE ULTIMATE CYBERSECURITY GUIDE FOR THE IT PROFESSIONAL { 01101000 01110100 01110100 01110000 01110011 00111010 00101111 00101111 01110111 01110111 01110111 00101110 01100011 01100001 01110010 01100010 01101111 01101110 01100010 01101100 01100001 01100011 01101011 00101110 01100011 01101111 01101101 } THE ULTIMATE CYBERSECURITY GUIDE FOR THE IT PROFESSIONAL 2019 Welcome to our comprehensive guide on the basics of cybersecurity. Whether you've been in IT for a long time or are just starting out, there is an expectation that everyone in IT should have some degree of expo- sure to InfoSec. A good way to do that is to learn from and get connected in the community. Cybersecurity is a fascinating and rapidly evolving area of IT. And those that are involved are friendly people who care passionately about keeping us all safe. With information from over 150 sourced references, and personal input from The Howler Hub community of security experts, this guide contains the key information to help you: • Understand key concepts that drive the security professional. • Learn a common language to engage with cybersecurity professionals. • Connect with sources to stay up-to-date on this evolving field. • Engage with cybersecurity experts and the threat hunting community at large. CONTENTS 01 02 03 History of Attackers + Common Cybersecurity Their Motives Attacks <pg num="001" /> <pg num="005" /> <pg num="007" /> 04 05 06 Terms to Know Experts to Blogs to Read <pg num="009" /> Follow <pg num="014" /> <pg num="013" /> 07 08 09 Events to Books to Read Movies + Shows Attend <pg num="017" /> to Watch <pg num="015" /> <pg num="019" /> 10 11 12 Communities Become a References to Engage Threat Hunter <pg num="023" /> <pg num="021" /> <pg num="022" /> 13 Appendices <pg num="024" /> <pg num="001" /> SEC.