9
1 © 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems. © 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems. Spyware – Linkages to Malware and its Affects A Multi-Layered Approach to Stopping Information Theft Kim Duffy Internet Security Systems © 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems. Agenda What are the trends? Why should I be concerned? How does Spyware work? How can it be addressed? A Case Study

Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

1

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Spyware – Linkages to Malwareand its Affects

A Multi-Layered Approach to Stopping Information Theft

Kim DuffyInternet Security Systems

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Agenda

• What are the trends?• Why should I be

concerned?• How does Spyware

work?• How can it be

addressed?• A Case Study

Page 2: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

2

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Headlines

It’s a really hostile environment !

88% of home PC’sand

87% of Corporate PC’s

…..Have at least one piece of Spyware

On-board !

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

ISS Company Background

• Founded in 1994• 1998 IPO – NASDAQ: ISSX• 1,200 employees in 20 countries• Pioneer and world leader in intrusion

prevention

• Pioneer and world leader in vulnerability assessment

• Created standard of cybersecurityresearch with X-Force research team

Page 3: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

3

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Attacker knowledge and sophistication

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

What are the Trends?

• One in every 3 companies have detected spyware on the network

• 80% of all “connected” PC’s have spyware

• More than 7,000 spywareprograms are known to exist

• IDC survey says 4th greatest risk to enterprise network security

• SPYBLOCK Part II…

Page 4: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

4

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Why should I be concerned?

• Spyware can undermine good security– Search and send confidential information– Delete or modify registry settings– Key logging– Disable software applications (e.g. security)– Install back doors– Take over peripherals

Web Cam… or Spy Cam?

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Trojans - 101

• The Trojan Horse– Gains unauthorised access without your

knowledge– Appears to be benign– Attacker gains access– Executes code

Page 5: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

5

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Spyware - 101

• Like Trojans, appears to be legitimate software

• Performs malicious activity without your knowledge

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Adware - 101

• Originally not malicious intent• Considered less harmful• Displays Pop-Ups• Highly profitable for the hacker• Catalyst for the development of anti-

Spyware• Often bundled with “freeware” or

“shareware”

Page 6: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

6

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Why should I be concerned?

• Spyware has a financial/resource cost– Computer resources…memory, processor– Network resources… data transmission– Employee productivity… spam, removal

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

How Does Spyware Work?

• Spyware generally propagates via web sites, email messages and pop-ups

• Images-based infection is an emerging threat– Ipods

• Techniques– Personalization Cookies– Tracking Cookies– Trojans– Drive-by Downloads– Hacking– Parasitic or Piggybacking Apps

“ethical”

“unethical”

Page 7: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

7

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

How Does Spyware Work?

• Trojans > Spyware > Adware• What to watch for…

– Long boot times– Slow browsing, unexpected

network activity– Error messages “Insufficient Memory”– Increased frequency of Pop-up ads

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Periodic “search & destroy” is reactive

Too late for manyRelies on diligence of userTypical of free spywareutilities

Automatic “blocking” is preventive

Prevents spyware from compromising systems and confidential dataRequires advanced R&D

Prevention ALWAYS Beats Reaction

Page 8: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

8

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Spyware Prevention: Multilayered Technologies

1. URL Filtering– Prevent user access to known distributors of spyware

applications

2. Intrusion Prevention (IPS)– Prevent ActiveX installers & “Phone Home” communications

3. Virus Prevention (VPS)– Prevent browser hijackers & key loggers

4. Application & Communication Control– Prevent “rogue” application installation and “Phone Home”

communications

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

Spyware Prevention: Multilayered Architecture

1. Gateway Protection– Prevent spyware from

entering the network2. Network Protection

– Prevent spyware from propagating and communicating

3. Host Protection– Prevent spyware from

damaging hosts

1

23

3

3

1

2

3

Page 9: Spyware – Linkages to Malware and its Affects · 2020. 10. 16. · Contents are property of Internet Security Systems. Spyware Prevention: Multilayered Technologies 1. URL Filtering

9

© 2004 Internet Security Systems. All rights reserved. Contents are property of Internet Security Systems.

….What to do now ?

AwarenessEducation

PreparednessSecurity is a Journey…not a Destination!

Questions ?