1 / 9

CRIMEWARE

CRIMEWARE. A MALWARE SOFTWARE USED FOR HACKING. INTRODUCTION:. THE CRIMEWARE IS A CLASS OF MALWARE DESIGNED SPECIFICALLY TO AUTOMATE CYBERCRIME. THE TERM WAS COINED BY PETER CASSIDY, SECRETARY GENERAL OF THE ANTI-PHISHING WORKING GROUP TO DISTINGUISH IT FROM OTHER KINDS OF MALEVOLENT PROGRAMS .

zoie
Download Presentation

CRIMEWARE

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. CRIMEWARE A MALWARE SOFTWARE USED FOR HACKING.

  2. INTRODUCTION: • THE CRIMEWARE IS A CLASS OF MALWARE DESIGNED SPECIFICALLY TO AUTOMATE CYBERCRIME. THE TERM WAS COINED BY PETER CASSIDY, SECRETARY GENERAL OF THE ANTI-PHISHING WORKING GROUP TO DISTINGUISH IT FROM OTHER KINDS OF MALEVOLENT PROGRAMS

  3. WHAT IS CRIMEWARE? • CRIMEWARE IS ANY COMPUTER PROGRAM OR SET OF PROGRAMS DESIGNED EXPRESSLY TO FACILITATE ILLEGAL ACTIVITY ONLINE. MANY SPYWARE PROGRAMS, BROWSER HIJACKERS, AND KEYLOGGERS CAN BE CONSIDERED CRIMEWARE, ALTHOUGH ONLY THOSE USED ILLICITLY. ONE COMMON TYPE OF CRIMEWARE IS THE PHISHING KIT, A COLLECTION OF TOOLS ASSEMBLED TO MAKE IT EASIER FOR PEOPLE WITH LITTLE TECHNICAL SKILL TO LAUNCH A PHISHING EXPLOIT. • THE ACT OF SENDING AN E-MAIL TO A USER FALSELY CLAIMING TO BE AN ESTABLISHED LEGITIMATE ENTERPRISE IN AN ATTEMPT TO SCAM THE USER INTO SURRENDERING PRIVATE INFORMATION THAT WILL BE USED FOR IDENTITY THEFTS.

  4. (Mal, spy) ware & Keyloggers • MALWARE, SHORT FOR MALICIOUS SOFTWARE, IS SOFTWARE DESIGNED TO INFILTRATE OR DAMAGE A COMPUTER SYSTEM WITHOUT THE OWNER'S INFORMED CONSENT. THE EXPRESSION IS A GENERAL TERM USED BY COMPUTER PROFESSIONALS TO MEAN A VARIETY OF FORMS OF HOSTILE, INTRUSIVE, OR ANNOYING SOFTWARE OR PROGRAM CODE • SPYWAREIS A TYPE OF MALWARE THAT IS INSTALLED ON COMPUTERS AND COLLECTS INFORMATION ABOUT USERS WITHOUT THEIR KNOWLEDGE. • KEYSTROKE LOGGING(OFTEN CALLED KEYLOGGING) IS THE PRACTICE OF TRACKING (OR LOGGING) THE KEYS STRUCK ON A KEYBOARD, TYPICALLY IN A COVERT MANNER SO THAT THE PERSON USING THE KEYBOARD IS UNAWARE THAT THEIR ACTIONS ARE BEING MONITORED. KEYSTROKE LOGGING(OFTEN CALLEDKEYLOGGING) IS THE PRACTICE OF TRACKING (OR LOGGING) THE KEYS STRUCK ON A KEYBOARD, TYPICALLY IN A COVERT MANNER SO THAT THE PERSON USING THE KEYBOARD IS UNAWARE THAT THEIR ACTIONS ARE BEING MONITORED.

  5. DELIVERY VECTORS & TECHNIQUES:- • CRIMEWARE THREATS CAN STEAL PASSWORDS CACHED ON A USER’S SYSTEM .THEY CAN WAIT FOR USER TO LOG INTO THEIR ACCOUNT AT A FINANCIAL INSTITUTION, THEN DRAIN THE ACCOUNT BEHIND THE SCENES. • TARGETED ATTACKS SENT VIA SMTP . THESE SOCIAL-ENGINEERED TREATS OFTEN ARRIVE DISGUISED AS A VALID E-MAIL MESSAGES AND INCLUDE SPECIFIC COMPANY INFORMATION AND SENDERS ADDRESSES.

  6. P H I S H I N G : - • IN THE FIELD OF COMPUTER SECURITY, PHISHING IS CRIMINALLY FRAUDULENT PROCESS OF ATTEMPTING TO ACQUIRE SENSITIVE INFORMATION SUCH AS USERNAMES , PASSWORDS AND CREDIT CARDS DETAILS BY MASQUERADING AS A TRUSTWORTHY ENTITY IN AN ELECTRONIC COMMUNICATION. • PHISHING IS AN EXAMPLE OF SOCIAL ENGINEERING TECHNIQUES USED TO FOOL USERS AND EXPLOITS THE POOR USABILITY OF CURRENT WEB SECURITY TECHNOLOGY. • IT WAS DESCRIBED IN DETAIL IN 1987 AND THE WAS RECORDED IN 1996.

  7. PHISHING:-

  8. ANTI-PHISHING:-- • SOCIAL RESPONSES – ON E STRATEGY FOR COMBATING PHISHING IS TO TRAIN PEOPLE TO RECOGNISE PHISHING ATTEMPTS AND TO DEAL WITH THEM. • TECHNICAL RESPONSES – MORE WEBSITES TARGETED FOR PHISHING ARE SECURE WEBSITES , MEANING THAT SSL WITH STRONG CYTOGRAPHY IS USED FOR SERVER AUTHENTICATION .

  9. C O N C L U S I O N : - • AS CAMPAIGNS INCREASINGLY LOOK TO ONLINE MEDIUM TO GATHER SUPPORT, IT IS IMPORTANT TO CONSIDER THE INHERENT RISKS THAT WILL FOLLOW. • THE LONGEST WORD IN WORLD IS SMILES.

More Related