jennifer leggette and michael tyler. four phases : 1.experiments 2.pranks 3.malicious/for profit...

10
Evolution of Malware Jennifer Leggette and Michael Tyler

Upload: letitia-logan

Post on 01-Jan-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Evolution of MalwareJennifer Leggette and Michael Tyler

Page 2: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Four Phases:

1.Experiments2.Pranks3.Malicious/For Profit4.Future of Malware

Page 3: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Experiments

• Purpose: benign or caused accidental damage, mostly wanted to spread

• Why: Programmers wanted to gain experience

• Example: Creeper

Page 4: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Creeper

•Originated in the early 1970’s in Cambridge, Massachusetts

•Spread through ARPAnet

•Displayed:

I’M THE CREEPER: CATCH ME IF YOU CAN

Page 5: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Pranks

• Some were harmless while others were highly damaging

• First malware prank: Elk Cloner, written by a high school student which the purpose was to display a poem on the screen once in every 50 boot ups.

Page 6: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Code Red

• July 2001 • Exploited buffer

overflow• Defaced websites

and launched denial of service attacks• Affected site read:“HELLO! Welcome to http://www.worm.com! Hacked by Chinese!”

Page 7: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

ExploreZip• Microsoft Office, C source and C++ source files

Page 8: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Malicious/For Profit

• Adware•Display advertisements

• Spyware•Gain information about the user without their knowledge

• Ransomware•Prevents user from using system as normal

Page 9: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

• Fake antivirus software

Page 10: Jennifer Leggette and Michael Tyler. Four Phases : 1.Experiments 2.Pranks 3.Malicious/For Profit 4.Future of Malware

Future of Malware

• Espionage

• Cyberwarfare

• New Platforms