Week 9 - Malware
Week 9 - Malware
infected machines
honeypots (bait)
other means
TRADITIONAL MALWARE
assembler/C/ macro code
POLYMORPHIC MALWARE
uses different encryption keys for payloads each time it infects
METAMORPHIC MALWARE
rewrites its own code with each infection
EXPLOIT KITS
prepackaged attacks designed to exploit prewritten/ known or unknown
vulnerabilities.
Example: PrivateLoader
avoiding detection:
stealthy executable
BOTNETS
system for carrying criminal acts
financially motivated
host infected by
Network Worm
Email attachment
Drive by Downloads
Existing Backdoor
push vs pull
centralised control
Distributed control
P2P network and protocols: exisiting peer 2 peer protocols
Communication hiding
Compression
Stepping stones