Ransomware in Windows and Android Platforms

Total Page:16

File Type:pdf, Size:1020Kb

Ransomware in Windows and Android Platforms Ransomware in Windows and Android Platforms Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu Department of Computer Science and Engineering Oakland University Rochester, Michigan 48309 Email: faalzahrani, aaalshehri, hmalshahrani, [email protected] Abstract—Malware proliferation and sophistication have Ransomware exhibits behavioral differences if compared to drastically increased and evolved continuously. Recent traditional malware. For instance, most malware types aim indiscriminate ransomware victimizations have imposed critical to steal users’ data, like banking credentials, without raising needs of effective detection techniques to prevent damages. Therefore, ransomware has drawn attention among cyberspace sus-picions. In contrast, ransomware operations behave researchers. This paper contributes a comprehensive overview of differently since the attack notifies victims that their devices ransomware attacks and summarizes existing detection and have been infected [7]. prevention techniques in both Windows and Android platforms. This paper focuses on Windows and Android, the plat-forms Moreover, it highlights the strengths and shortcomings of those frequently targeted by ransomware attacks due to their techniques and provides a comparison between them. popularity in both desktop and mobile market-share. The rest Furthermore, it gives recommendations to users and system administrators. of this paper is organized as follows. Section II defines the concept of ransomware, and illustrates the functionality and Index Terms—Windows ransomware, Android ransomware, how it works. Then, a brief overview of the history of crypto-ransomware, locker-ransomware, ransomware families, ransomware cyberattacks is provided in Section III. Section IV countermeasures lists the most affected industry sectors by malware attacks around the world. Next, Sections V and VI summarize the I. INTRODUCTION notable observed behaviors of ransomware in the Windows Cyber-extorting malware is increasing and evolving con- and Android platforms, respectively. Section VII provides a tinuously. Throughout its growth, it has posed major threats to ransomware attack taxonomy, whereas Section VIII lists modern technologies with daunting prevention tasks. For existing countermeasures and prevention techniques. Aiming instance, computer systems’ security critically depends on the to educate the users, Section IX provides a set of policies and ability of anti-malware products that must be abreast of new recommendations. Finally, Section X concludes the paper. malware deployments. Authors of malware try to thwart anti- malware detection by implementing efforts that are more II. HOW RANSOMWARE WORKS significant [1]. Moreover, some malware has a powerful instru- There are two types of ransomware: locker-ransomware and ment for illegal commercial activities such as ransomware. crypto-ransomware [8]. In the first type, blockers prevent Ransomware is defined as a form of malware that de-ceives victims from accessing their devices. Locker-ransomware can users and infects their devices to limit or deny access. Hence, lock the whole screen of the device and demand payment. attackers demand payments from the victims for a promise to Typically, it masquerades as a notice from a local law en- restore their data, and affected devices do not permit access forcement agency reporting an illegal action done by the user until the ransom is paid [2]. Cyberattack writers have and indicating a spot-fine ransom. It does not encrypt any files diversified their efforts to make money by using well- or affect the data stored on the device. A notable example of established methods. Ransomware has constituted as one of locker-ransomware is WinLocker [9], [10]. the most dangerous cyberattacks facing both organizations By contrast, crypto-ransomware encrypts device services and and individual users with global losses now likely running to files, or even the entire database that the system interacts with. billions of dollars. This type of attack is the latest trend that Usually, once a file/folder is encrypted, it will be deleted from the cybercriminals use for monetization by extorting their victims device. Then a threatening message is displayed with a link to the [3]. Moreover, ransomware’s recent success has acceptable payment methods and instructions [11]. Encryption increased the appearance of new families in the last few keys can be generated locally by the ransomware on infected years [4]. It spreads rapidly through websites, infected machines, or remotely on a C&C server as il-lustrated in software and even email attachments. subsection V-C. Furthermore, accessing encrypted files is As many categories of malware, ransomware uses some restricted by withholding the decryption key [5]. A notable example techniques to evade detection systems in order to trick the of this type is the CryptoLocker family [12]. victims. It is able to encrypt files and establish secure con- After performing a successful infection, the malicious pro- nection with a Command and Control (C&C) server [5], [6]. gram notifies the user by displaying a ransom message, which Also, ransomware can exfiltrate users’ information to a third relies on Bitcoins currency for more confidentiality and party as well as perform multi-infection and process injection. Figure 1: Ransomware timeline over the history anonymity. This message contains instructions on how to Locker ransomware appeared as SMS, the master boot record pay the ransom in order to restore access to the encrypted (MBR), and fake FBI ransomware. The first locker ransomware data. Those persistent messages can be generated by came into existence in 2004 as Antivirus software. In 2005, a calling some dedicated API functions such as series of fake Antivirus ransomware variants appeared such as CreateDesktop(), which creates a new desktop and makes Spysherriff, Registry care, and Performance Optimizer [18]. The it a default for infected machines, locking out the users [13]. last two variants offered paid solutions for problems, which did not Additionally, ransomware cybercriminals do not deter large actually exist in the victim’s machine. Furthermore, they were due to their extortion campaigns. Hence, analysts discriminate deployed over the Internet until 2008. ransomware from wiping attacks. Ransomware attackers are Cybercriminals have implied more effective and sophisti- mostly on the benefit of an unlikely trusted relationship with cated Trojans using asymmetric RSA encryption schemes. A infected users. Attackers rely on the tenet that they will abide pair of keys are generated in asymmetric cryptosystem known by an implicit agreement with their victims to restore access to as public key and private key. The public key is embedded in their files once they make the payment. However, “skiddie” the payload of the ransomware to encrypt data on the victim’s cybercriminals trick their victims into paying the ransom and machine. On the other hand, the private key is kept secret and never return the victims’ files [14]. only known by the payload’s writer. Thus, encrypted data can be recovered at the writer-side, and malware analysts cannot III. HISTORY OF RANSOMWARE determine the private key from monitoring the operations of Crypto-based attacks are relatively old. The first known ransomware as used with symmetric schemes. Notable exam- form was written by Joseph Popp and released in 1989 ples of this type are Gpcode, MayArchive, TROJ.RANSOM.A, named AIDS, short for Aids Info Desk. It is also known as Archiveus, and Krotten [19]. PC Cyborg, which was the first crypto ransomware at-tack New families appeared and started spreading in 2006 seen in December 1989 [15]. This version replaced the such as Cryzip and Archiveus [20]. These variants sniff out AUUTOEXEC.BAT file, and counted how many times the for specific type of files to make them inaccessible. For machine was booted. Once it reached a certain time, it hid instance, Cryzip encrypts particular extensions, then moves directories and encrypted their names. Then it displayed a those encrypted files into a zipped folder. Whereas message claiming that a license of some software that the Archiveus moves files into a password protected folder. user used is expired, and asked the user to pay some In 2010, MBR ransomware variants made their first ap- amount in order to obtain a repair tool. This attack used a pearance under name Ransom.Boot.Seftad.a. Another type combination of a symmetric cryptography and an called bootlock.B came into existence in 2011. It replaces the initialization vector to encrypt files in a victim’s machine. original MBR with its code and locks the user’s machine then Hence, the key could be extracted from its code [11]. displays a ransom message at booting time. This type never Since then, AIDS has been present until now, but has signif- uses encryption. Moreover, the year of 2011 was the first year icant changes [16]. Adam L.Young and Moti Yung proposed of Fake FBI ransomware to come into existence by the the concept of using asymmetric key in 1996 [17]. At that time, appearance of Ransomlock family [21], [22]. Additionally, in cryptographic libraries were restricted by governments’ 2012 other families of the Fake FBI ransomware started legislation. They showed that the AIDS was ineffective by spreading such as ACCDFISA and Reveton. The ransom using one key. Therefore, they introduced public key cryptog- payments of these families were displayed in an official format raphy for such attacks.
Recommended publications
  • The Evolution of Ransomware
    The evolution of ransomware SECURITY RESPONSE The evolution of ransomware Kevin Savage, Peter Coogan, Hon Lau Version 1.0 – August 6, 2015 Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today. CONTENTS OVERVIEW ..............................................................................3 Key information ......................................................................5 Types of ransomware .............................................................5 How ransomware has evolved ...............................................7 Targets for ransomware .......................................................13 Systems impacted by ransomware ......................................14 Ransomware: How it works ..................................................18 Ransom techniques ..............................................................27 How widespread is the problem of ransomware .................33 What does the future hold for ransomware? .......................37 Conclusion ............................................................................45 Appendix ..............................................................................47 Mitigation strategies ............................................................51 Symantec detections for common ransomware families 54 Resources .............................................................................56 OVERVIEW Never before in the history of human kind have people across the world been
    [Show full text]
  • Watch out for Fake Virus Alerts
    State of West Virginia Cyber Security Tip ALERT West Virginia Office of Information Security and Controls – Jim Richards, WV Chief Information Security Officer WATCH OUT FOR FAKE VIRUS ALERTS Rogue security software, also known as "scareware," is software that appears to be beneficial from a security perspective (i.e. free virus scan) but provides limited or no security, generates erroneous or misleading alerts, or attempts to lure users into participating in fraudulent transactions. How does rogue security software get on my computer? Rogue security software designers create legitimate looking pop-up windows that advertise security update software. These windows might appear on your screen while you surf the web. The "updates" or "alerts" in the pop-up windows call for you to take some sort of action, such as clicking to install the software, accept recommended updates, or remove unwanted viruses or spyware. When you click, the rogue security software downloads to your computer. Rogue security software might also appear in the list of search results when you are searching for trustworthy antispyware software, so it is important to protect your computer. What does rogue security software do? Rogue security software might report a virus, even though your computer is actually clean. The software might also fail to report viruses when your computer is infected. Inversely, sometimes, when you download rogue security software, it will install a virus or other malicious software on your computer so that the software has something to detect. Some rogue security software might also: Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).
    [Show full text]
  • ESET Observed That the Focus of Android Ransomware Operators Cybercriminals, Even Though It Had Been Around for Many Years Before
    TRENDS IN ANDROID RANSOMWARE Authors Robert Lipovský – Senior Malware Researcher Lukáš Štefanko – Detection Engineer Gabriel Braniša – Malware Researcher The Rise of Android Ransomware Contents SUMMARY 2 RANSOMWARE ON ANDROID 2 Common infection vectors 3 Malware c&c communication 3 Malware self-protection 4 ANDROID RANSOMWARE CHRONOLOGY 5 Android defender 5 Ransomware meets fake av, meets…porn 7 Police ransomware 8 Simplocker 9 Simplocker distribution vectors 9 Simplocker in English 10 Lockerpin 11 Lockerpin’s aggressive self–defense 12 Jisut 13 Charger 15 HOW TO KEEP YOUR ANDROID PROTECTED 15 – 1 – The Rise of Android Ransomware SUMMARY RANSOMWARE ON ANDROID 2016 brought some interesting developments to the Android ransomware Ransomware, as the name suggests, is any type of malware that demands scene Ransomware is currently one of the most pressing cybersecurity a sum of money from the infected user while promising to “release” issues across all platforms, including the most popular mobile one a hijacked resource in exchange There are two general categories of malware that fall under the “ransomware” label: Authors of lock-screen types as well as file-encrypting “crypto-ransomware” have used the past 12 months to copycat effective techniques from desktop • Lock-screen ransomware malware, as well as develop their own sophisticated methods specialized • Crypto-ransomware for targets running Android devices In lock-screen types of ransomware, the hijacked resource is access to the In addition to the most prevalent scare tactics used by lock-screen
    [Show full text]
  • A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics
    UNIVERSIDAD POLITECNICA´ DE MADRID ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics PH.D THESIS Platon Pantelis Kotzias Copyright c 2019 by Platon Pantelis Kotzias iv DEPARTAMENTAMENTO DE LENGUAJES Y SISTEMAS INFORMATICOS´ E INGENIERIA DE SOFTWARE ESCUELA TECNICA´ SUPERIOR DE INGENIEROS INFORMATICOS´ A Systematic Empirical Analysis of Unwanted Software Abuse, Prevalence, Distribution, and Economics SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF: Doctor of Philosophy in Software, Systems and Computing Author: Platon Pantelis Kotzias Advisor: Dr. Juan Caballero April 2019 Chair/Presidente: Marc Dasier, Professor and Department Head, EURECOM, France Secretary/Secretario: Dario Fiore, Assistant Research Professor, IMDEA Software Institute, Spain Member/Vocal: Narseo Vallina-Rodriguez, Assistant Research Professor, IMDEA Networks Institute, Spain Member/Vocal: Juan Tapiador, Associate Professor, Universidad Carlos III, Spain Member/Vocal: Igor Santos, Associate Research Professor, Universidad de Deusto, Spain Abstract of the Dissertation Potentially unwanted programs (PUP) are a category of undesirable software that, while not outright malicious, can pose significant risks to users’ security and privacy. There exist indications that PUP prominence has quickly increased over the last years, but the prevalence of PUP on both consumer and enterprise hosts remains unknown. Moreover, many important aspects of PUP such as distribution vectors, code signing abuse, and economics also remain unknown. In this thesis, we empirically and sys- tematically analyze in both breadth and depth PUP abuse, prevalence, distribution, and economics. We make the following four contributions. First, we perform a systematic study on the abuse of Windows Authenticode code signing by PUP and malware.
    [Show full text]
  • Solution Brief Recovering from Ransomware with Barracuda Backup
    Solution Brief Recovering from Ransomware with Barracuda Backup Ransomware is a malware variant that locks an end user’s computer or encrypts their files, then demands a sum of money to allow access or decryption. What’s worse, if an organization hands over the cash, there are often times when the attacker doesn’t play nice and still withholds the key even after payment. Ransomware is problematic for businesses because it not only results in financial loss, but also tainted credibility and lost productivity. However, this situation can be avoided if your organization has taken the steps to implement a ransomware prevention plan. In this solution brief, we will discuss some of the steps you can take to prevent ransomware attacks, as well as how to quickly recover from them using Barracuda Backup. Introduction Due to the sophistication of today’s threat landscape, ransomware can be difficult to catch right at the door. Once this malicious malware crosses the threshold, a business user is hit by a daunting message, informing the user that their computer and files have been seized, and payment is required. What’s equally perturbing is that ransomware doesn’t discriminate—it can happen to the mom and pop shops to large enterprises. It’s not a matter of if a business will get hit, but when. Protecting Your Organization from Ransomware Attackers have created many different variations of ransomware over the past few years, such as CryptoLocker, CryptoWall, TorrentLocker, TeslaCrypt, Locky, Petya, WannaCry, Bad Rabbit, and Samas. Each of these variations use new methods of infecting their victims’ computers, thereby compromising the data and network of many organizations worldwide.
    [Show full text]
  • Android Malware Category and Family Detection and Identification Using Machine Learning
    Android Malware Category and Family Detection and Identification using Machine Learning Ahmed Hashem El Fiky1*, Ayman El Shenawy1, 2, Mohamed Ashraf Madkour1 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 1 Systems and Computer Engineering Dept., Faculty of Engineering, Al-Azhar University, Cairo, Egypt. 2 Software Engineering and Information Technology, Faculty of Engineering and Technology, Egyptian Chinese University, Cairo, Egypt. [email protected] [email protected] [email protected] Abstract: Android malware is one of the most dangerous threats on the internet, and it's been on the rise for several years. Despite significant efforts in detecting and classifying android malware from innocuous android applications, there is still a long way to go. As a result, there is a need to provide a basic understanding of the behavior displayed by the most common Android malware categories and families. Each Android malware family and category has a distinct objective. As a result, it has impacted every corporate area, including healthcare, banking, transportation, government, and e-commerce. In this paper, we presented two machine- learning approaches for Dynamic Analysis of Android Malware: one for detecting and identifying Android Malware Categories and the other for detecting and identifying Android Malware Families, which was accomplished by analyzing a massive malware dataset with 14 prominent malware categories and 180 prominent malware families of CCCS-CIC- AndMal2020 dataset on Dynamic Layers. Our approach achieves in Android Malware Category detection more than 96 % accurate and achieves in Android Malware Family detection more than 99% accurate. Our approach provides a method for high-accuracy Dynamic Analysis of Android Malware while also shortening the time required to analyze smartphone malware.
    [Show full text]
  • A Poisoned Apple: the Analysis of Macos Malware Shlayer By: Minh D
    A Poisoned Apple: The Analysis of macOS Malware Shlayer by: Minh D. Nguyen Abstract Historically, the Microsoft Windows operating system family, which currently runs on more than 70 percent of computers in the world,7 has been the main target for malware. However, with the growing popularity of Apple’s MacBook products, the macOS operating system has become a new platform for attackers to target the general computer users. According to the 2016/2017 Security Report of AV-TEST, the number of malware samples for macOS detected in 2016 has increased by an astonishing 370 percent compared to the same figure in 2015.3 In order to address the rising interest of attackers in the macOS operating system, this project provides an analysis of a newly discovered malware for macOS, Shlayer, to reveal a well- known tactic that attackers can utilize to infect machines running on any operating system, and discusses possible countermeasures for this strategy. I. Introduction macOS is often hailed as a more secure operating system compared to its counterpart Microsoft Windows.2 However, in reality, many attacking techniques targeting Windows machines can also be applied to macOS machines. The analysis of the new Shlayer malware, discovered by researchers of Intego in February 2018,1 will reveal a familiar strategy that attackers often utilize to target victim machines without regards of the operating system. With the worldwide growth of macOS usage, it is important to recognize this attacking method and understand that in many cases, the success of an attack does not depend on the security of the operating system but on the awareness of the user.
    [Show full text]
  • Cyren's 2016 Cyberthreat Report
    2016 CYBERTHREAT Report AUTOMATED THREAT INTELLIGENCE: The Key to Preventing, Mitigating, and Identifying Cyber Breaches Introduction .................................................................................................4 The Cloud Sandbox Array: A New Tool Against Cybercrime .....................6 The Benefits of Big Data .......................................................................... 12 2016 Predictions....................................................................................... 14 Malware Newsmakers of 2015 ................................................................ 16 The Criminal Power of the Unknown ...................................................... 22 2015 Statistics: Android, Phishing, Malware, Spam ............................... 26 Table of Contents Table CYREN 2016 CYBERTHREAT REPORT 3 INTRODUCTION Lior Kohavi Chief Technical Officer, CYREN, Inc. There is a false perception that sophisticated attacks are too difficult to prevent and the only alternative is detection. But detection is NOT the new prevention. Cybersecurity professionals must make it their mission to STOP attacks, not just become proficient at detecting them. It's no secret that cybercriminals are willing to spend a lot of time and money to obtain the information they desire. And, the risk that these criminals will be caught and convicted is relatively low. Despite well-publicized botnet takedowns, like that of Darknode this past July, researchers estimate that less than 1% of cybercrimes receive a corresponding conviction.
    [Show full text]
  • Detecting Malware in TLS Traffic
    IMPERIAL COLLEGE LONDON DEPARTMENT OF COMPUTING Detecting Malware in TLS Traffic Project Report Supervisor: Author: Sergio Maffeis Olivier Roques Co-Supervisor: Marco Cova Submitted in partial fulfillment of the requirements for the MSc degree in Computing Science / Security and Reliability of Imperial College London September 2019 Abstract The use of encryption on the Internet has spread rapidly these last years, a trend encouraged by the growing concerns about online privacy. TLS (Transport Layer Security), the standard protocol for packet encryption, is now implemented by every major websites to protect users’ messages, transactions and credentials. However cybercriminals have started to incorporate TLS into their activities. An increasing number of malware leverage TLS encryption to hide their communications and to exfiltrate data to their command server, effectively bypassing traditional detection platforms. The goal of this project is to design and implement an effective alternative to the unpractical method of decrypting TLS packets’ payload before looking for signs of malware activity. This work presents a highly accurate supervised classifier that can detect malicious TLS flows in a company’s network traffic based on a set of features related to TLS, certificates and flow metadata. The classifier was trained on curated datasets of benign and malware observations, which were extracted from capture files thanks to a set of tools specially developed for this purpose. We detail in this report the complete development process, from data collection and feature extraction to model selection and performance analysis. ii Acknowledgments I would like to particularly thank Marco Cova and Sergio Maffeis, my project su- pervisors, for their valuable and continuous suggestions and for their constructive feedbacks on this project.
    [Show full text]
  • Ransomware and Cyber Risk Management
    Ransomware and Cyber Risk Management By Randy Werner Ransomware and cyber extortion represent one of the more malicious types of hacker attacks making the rounds today. It sneaks into computer systems, encrypts files, and demands a ransom before decrypting the files. A major problem is that ransomware does not always decrypt files even after the ransom is paid. Being prepared and taking precautions against cyber risk exposures such as ransomware is therefore essential. Otherwise, if not prepared, you are at the mercy of criminals who prey on unprepared and unsuspecting businesses and individuals. Ransom demands range from a few hundred dollars to several thousand, depending on the size of the victim. Not all ransomware attacks are reported to authorities, so estimates of the total amount paid over the past few years vary widely, ranging up to $300 million. The more notorious names among ransomware are CryptoLocker, CryptoWall, TorrentLocker and Locky, among others. Some attacks rely on software that now has known fixes, so a solution might be found online. However, other ransomware is technically advanced and has no known fix, except for the victim to rely on current backup files. The primary defense is to institute frequent backups of the files you do not want to lose. Some ransomware even seeks out backup copies of files, so best practices include creating multiple backups in different locations. Cloud services, or remote backup services, and external or USB hard drives are options to consider for multiple backups. Even with backup files in place, a firm may still spend many hours gathering, re-entering and reconstructing data.
    [Show full text]
  • Mac Security Report 2020
    Independent Tests of Anti-Virus Software Mac Security Test & Review TEST PERIOD : JUNE 2020 LANGUAGE : ENGLISH LAST REVISION : 26TH JUNE 2020 WWW.AV-COMPARATIVES.ORG Mac Security Report – June 2020 www.av-comparatives.org Contents MACS AND SECURITY SOFTWARE 3 SECURITY SOFTWARE FOR MACOS CATALINA 5 MALWARE PROTECTION TEST 6 RESULTS 7 SUMMARY 8 AV-COMPARATIVES’ MAC CERTIFICATION REQUIREMENTS 9 REVIEW FORMAT 10 AVAST SECURITY FOR MAC 11 AVG INTERNET SECURITY FOR MAC 14 AVIRA ANTIVIRUS PRO FOR MAC 18 BITDEFENDER ANTIVIRUS FOR MAC 21 CROWDSTRIKE FALCON PREVENT FOR MAC 24 FIREEYE ENDPOINT SECURITY FOR MACOS 27 KASPERSKY INTERNET SECURITY FOR MAC 29 POCKETBITS BITMEDIC PRO ANTIVIRUS 32 TREND MICRO ANTIVIRUS FOR MAC 36 APPENDIX – FEATURE LIST 39 COPYRIGHT AND DISCLAIMER 40 2 Mac Security Report – June 2020 www.av-comparatives.org Macs and Security Software It is an often-heard view that macOS computers don’t need antivirus protection. Whilst it is certainly true that the population of macOS malware is very tiny compared to that for Windows and Android, there have been instances of macOS malware 1 getting into the wild. Moreover, Apple Mac security needs to be considered in the wider context of other types of attacks 2. In addition, it should be noted that Apple themselves ship some anti-malware capabilities within macOS. Firstly, there is “Gatekeeper”, which warns when apps without a digital signature are run. Then there is “XProtect”, which checks files against known-malware signatures. Finally, Apple provide the MRT (Malware Removal Tool). Gatekeeper and MRT are essentially invisible to users and have no direct user interface for the user.
    [Show full text]
  • English for It Students
    УКРАЇНА НАЦІОНАЛЬНИЙ УНІВЕРСИТЕТ БІОРЕСУРСІВ І ПРИРОДОКОРИСТУВАННЯ УКРАЇНИ Кафедра англійської філології Ямнич Н. Ю., Данькевич Л. Р. ENGLISH FOR IT STUDENTS 1 УДК: 811.111(072) Навчальний посібник з англійської мови розрахований на студентів вищих навчальних закладів зі спеціальностей «Комп”ютерні науки» та «Програмна інженерія». Мета видання – сприяти розвитку і вдосконаленню у студентів комунікативних навичок з фаху, навичок читання та письма і закріплення навичок з граматики, а також активізувати навички автономного навчання. Посібник охоплює теми актуальні у сучасному інформаційному середовищі, що подаються на основі автентичних професійно спрямованих текстів, метою яких є розвиток у студентів мовленнєвої фахової компетенції, що сприятиме розвитку логічного мислення. Добір навчального матеріалу відповідає вимогам навчальної програми з англійської мови. Укладачі: Л.Р. Данькевич, Н.Ю. Ямнич, Рецензенти: В. В. Коломійцева, к. філол. н., доцент кафедри сучасної української мови інституту філології Київського національного університету імені Тараса Шевченка В.І. Ковальчук, д. пед. наук, професор,завідувач кафедри методики навчання та управління навчальними закладами НУБіП України Кравченко Н. К., д. філ. наук, професор кафедри англійської філології і філософії мови ім. професора О. М. Мороховського, КНЛУ Навчальний посібник з англійської мови для студентів факультету інформаційних технологій. – К.: «Компринт», 2017. – 608 с. ISBN Видання здійснено за авторським редагуванням Відповідальний за випуск: Н.Ю.Ямнич ISBN © Н. Ю. Ямнич, Л.Д. Данькевич, 2017 2 CONTENTS Unit 1 Higher Education 5 Language practice. Overview of verb tenses 18 Unit 2 Jobs and careers 25 Language practice. Basic sentence structures 89 Unit 3 Tied to technology 103 Language practice. Modal verbs 115 Unit 4 Computers 135 Language practice. Passive 153 Unit 5 Communication. E –commerce 167 Language practice.
    [Show full text]