Tech Soul

bringing technology to your soul

Home Archive for 2012-07-29

What is botnet?

A botnet is a collection of infected computers that are remotely controlled by a hacker.

More about it...

Once a computer is infected with a bot, the hacker can control the computer remotely over the Internet. From then on, the computer is a zombie, doing the bidding of the hacker, although the user is completely unaware. Collectively, such computers are called botnet.

The hacker can share or sell access to control the botnet, allowing others to use it for malicious purposes.

For example, a spammer can use a botnet to send out spam email. Up to 99% of all spam is distributed this way. This allows the spammers to avoid detection and to get around any blacklisting applied to their own servers. It can also reduce their costs because the computer’s owner is paying for the Internet access.

Hackers can also use zombies to launch a distributed denial-of-service attack, also known as a DDoS. They arrange for thousands of computers to attempt to access the same website simultaneously, so that the web server is unable to handle all the requests reaching it.

The website thus becomes inaccessible.





Everyone knows about computer viruses. Or at least they think they do.


copied from sophos.com

Thirty years ago, the first computer virus appeared, Elk Cloner, displaying a short poem when an infected computer booted up for the 50th time. Since then, cybercriminals have created millions of viruses and other malware—email viruses, Trojans, Internet worms, spyware, keystroke loggers—some spreading worldwide and making headlines.
Many people have heard about viruses that fill your computer screen with garbage or delete your files. In the popular imagination, malware still means pranks or sabotage. The early 1990s saw global panic about the Michelangelo virus. In the 2000s, when millions of computers were infected with the SoBig-F virus and primed to download unknown programs from the web at a set time, antivirus companies scrambled to persuade Internet service providers to shut down servers to avoid a doomsday scenario. Hollywood movies like Independence Day reinforced this perception, with virus attacks signaled by flashing screens and alarms.
However, this is far from the truth today.
The threats are no less real now, but they are low-profile, well-targeted, and more likely to be about making cash than creating chaos.
Today, malware is unlikely to delete your hard disk, corrupt your spreadsheet, or display a message. Such cyber-vandalism has given way to more lucrative exploits. Today’s viruses might encrypt all your files and demand a ransom.
Or a hacker might blackmail a large company by threatening to launch a denial-of-service attack, which prevents customers from accessing the company’s website.
More commonly, though, viruses don’t cause any apparent damage or announce their presence at all. Instead, a virus might silently install a keystroke logger, which waits until the victim visits a banking website and then records the user’s account details and password, and forwards them to a hacker via the Internet.
The hacker is an identity thief, using these details to clone credit cards or plunder bank accounts. The victim isn’t even aware that the computer has been infected. Once the virus has done its job,
it may delete itself to avoid detection.
Another trend is for malware to take over your computer, turning it into a remote-controlled zombie. It uses your computer without your knowledge to relay millions of profit-making spam messages. Or, it may launch other malware attacks on unsuspecting computer users.

And as social networks like Facebook and Twitter have grown in popularity, hackers and cybercriminals are exploiting these systems to find new ways of infecting computers and stealing identities.
Hackers may not even target large numbers of victims any more. Such high-visibility attacks bring unwanted attention, and antivirus companies can soon neutralize malware that is widely reported. In addition, large-scale exploits can bring hackers more stolen data than they can handle. Because of this, threats are becoming more carefully focused.
Spearphishing is an example. Originally, phishing involved sending out mass-mail messages that appeared to come from banks, asking customers to re-register confidential details, which could then be stolen. Spearphishing, by contrast, confines itself to a small number of people, usually within an organization. The mail appears to come from colleagues in trusted departments, asking for password information. The principle is the same, but the attack is more likely to succeed because the victim thinks that the message is internal, and his or her guard is down.
Stealthy, small-scale, well-targeted: for now,
this seems to be the way that security threats
are going.
What of the future, though? Predicting how security threats will develop is almost impossible. Some commentators assumed that there would never be more than a few hundred viruses, and Microsoft’s Bill Gates declared that spam would no longer be a problem by 2006. It’s not clear where future threats will come from, or how serious they will be. What is clear is that whenever there is an opportunity for financial gain, hackers and criminals will attempt to access and misuse data.

Malware - Malicious Software



If you are reading this, it's certain that you have a computer, and if you have used a computer, I am sure you have found malware or a virus inside your PC atleast once. So let us see what exactly is a malware?

Malware, short for malicious software, is software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general term used to refer to a variety of forms of hostile, intrusive, or annoying software.It includes computer virus, worm, spyware, adware and other malicious code/script which is not good for us. 

Many early infectious programs, including the first internet worm (morris worm) were written as experiments or pranks. Today, malware is used primarily to steal sensitive personal, financial, or business information for the benefit of others.Malware is sometimes used broadly against government or corporate websites to gather guarded information, or to disrupt their operation in general. However, malware is often used against individuals to gain personal information such as social security numbers, bank or credit card numbers, and so on. 

Before Internet access became widespread, viruses spread on personal computers by infecting the executable boot sectors of floppy disks. By inserting a copy of itself into the machine code instructions in these executables, a virus causes itself to be run whenever a program is run or the disk is booted. Early computer viruses were written for the Apple II and Macintosh, but they became more widespread with the dominance of the IBM PC and MS-DOS system. Executable-infecting viruses are dependent on users exchanging software or boot-able floppies, so they spread rapidly in computer hobbyist circles.

Source : wikipedia .



What is Trojan?

A Trojan horse, or Trojan, is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer. Trojans do not attempt to inject themselves into other files like a computer virus. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. Many trojans rely on drive-by downloads or install via online games or internet driven applications in order to reach target computers. The term is derived from the Trojan Horse story in Greek mythology because Trojan horses employ a form of “social engineering,” presenting themselves as harmless, useful gifts, in order to persuade victims to install them on their computers.

A trojan is used for

1.Capturing the user's screen

2.Crashing the computer


3.Keystroke logging (Including usernames and password )


4.Use of the machine as part of a botnet (e.g. to perform  

    automated spamming or to distribute Denial-of-service attacks)

5.Electronic money theft


6.Data theft (e.g. retrievin
g passwords or credit card

    information)

7.Installation of software, including third-party malwares


8.Downloading or uploading of files on the user's computer


9.Modification or deletion of files


10.Anonymising internet viewing

These are some few functionality of trojan horse, different scripts have different functions.


Popular trojan horses

  • Netbus (by Carl-Fredrik Neikter)
  • Subseven or Sub7(by Mobman)
  • Y3K Remote Administration Tool (by Konstantinos & Evangelos Tselentis)
  • Back Orifice (Sir Dystic)
  • Beast
  • Zeus
  • The Blackhole exploit kit
  • Flashback Trojan (Trojan.BackDoor.Flashback)



Avoiding Trojan 


1. Never execute programs unless they are from a trusted source.

2. Never open e-mail attachments unless you know who they're from, especially attachments with the extensions .exe,                .ink and .vbs.

3. Update your antivirus and security software on a regular basis.

4. Install patches and security updates for your operating system and software as they become available.

5. Beware of homemade CDs and floppy disks or pen-drive. If you plan to use these disks in your computer, scan them    with your anti-virus software first.

6. Never accept programs transferred by instant messaging applications.







Introduction

Strong passwords are important, but even the best password won’t keep you safe from keyloggers  that’s designed to secretly record your keystrokes.
Hi today we'll discuss about keyloggers, software or hardware designed to capture key strokes or simply to get passwords. But now a days keyloggers not just capture key strokes but do much more than excepted. Different key loggers have different functions depending upon the producer of those s/w or h/w. 


A keylogger is a device that is installed on your computer and is used to record passwords, keystrokes and other important information. These are the most common tools used by hackers and can be very dangerous if you have important information on your computer that you need to protect. There are several programs that you can use to protect your computer and prevent keyloggers from stealing your information.

Keyloggers are of two types : 
  1. software keylogger
  2. hardware keylogger

The hard ware keylogger is installed in the computer's mother board manually to capture key strokes, not much entertained by the hackers. 


The most common is software keylogger, these softwares are installed remotely. A keylogger can be downloaded from internet for free but paid ones are also available. A keylogger can take screen shots after a fixed interval of time say 2 min and send it to the hacker, it can save every og in/out information and yeah it sure capture your facebook/gmail/etc passwords, your messages and mails. So its not good to have one such s/w in your PC.

How to avoid it.


  1. Use on-screen keyboard while typing passwords.
  2. Always turn on your fire-wall.
  3. Use a good paid anti-virus for your PC, as most of the keyloggers are detectable.
  4. Never download anything which is not secure.
  5. Do not avoid warning message from the browser while downloading.
  6. Keep changing your password every month or two. 
  7. Be conscious while doing anything on net.
  8. and Enjoy!




PHISHING -  an introduction

The most common way a usual internet user get attacked by hackers is phishing. Phishing is one of many ways by which your private data can be attacked. Wikipedia describes phishing as :
Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication.
Phishing attack can be used to get your social networks's password, your bank account's information or any other private information which can be dangerous in hands of hackers. Broadly speaking it is a way of fooling a person. I mean the victim gives the information on a site which look legitimate, but it is not.

For explaining the rest of the part let us take an example of bank account's phishing attack.

Suppose the hacker want to have back account's information. So he go to the bank's official web site and make a copy of  the page where users log in to their account. The copied page looks similar to the original one. The attacker creates a php script , that copies the user name and password to a simple text file accessible to the hacker. Little changes are made in the copied log in page of bank to get the password but it does not affect the look of the page, it is similar to the original page. Now he upload the copied page, the php script and a blank text file to get passwords to a server.

This was the hackers part, now here come the step where the user get trapped.
The attacker will send the link of the copied fake page of bank's login area to the user, claiming that he is a bank authority. The user generally log in through the fake copied page and his password is stolen and the hacker can access his account using his password. There are numerous ways in which a fake mail can be sent, editing the from field, the header and much more.

Using a similar way facebook's or gmail's fake page can be created.
The hacker get the passwords written on a text file as follows : 




OK! so how to stop this and prevent phishing attack?

PREVENTING  phishing attack



Be suspicious of any email with urgent requests for personal financial information

Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender or user's handle

Avoid filling out forms in email messages that ask for personal financial information 

Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser 

Remember not all scam sites will try to show the "https://" and/or the security lock. Get in the habit of looking at the address line, too. Were you directed to facebook? Does the address line display something different like "http://www.somethibgelse.com/facebook/login.htm?" Be aware of where you are going.

Consider installing a Web browser tool bar to help protect you from known fraudulent websites. These toolbars match where you are going with lists of known phisher Web sites and will alert you.

Regularly check your bank, credit and debit card satements to ensure that all transactions are legitimate 

If you are on facebook and you click on any suspicious link(other than facebook)link that asks you to enter password and login details. Never do it.

At last if you find that this is a phishing/spoofing , bring it in notice of reportphishing@antiphishing.org 

Indian users can go to: www.complaints-india.com/Online-Scam-Complaints/Phishing-Scams/


The most important step towards avoiding phishing is to look at the URL where you are entering any information 


Subscribe to: Posts ( Atom )

Categories

security phone tips review smartphone android google hacking game howto tablet windows htc mobile phones programming racing XOLO web definition

Popular Posts

  • manage your contacts with ease : contacts+
    One way or another we all are tied to our personal gadgets and gizmos, and why shouldn't we? it is the best way to stay connected with ...
  • Nokia ASHA 502 and 503
    Note : Nokia Asha 502 has been released in India for Rs.5,739 and official release date for Asha 503 in India has not been announced yet. N...
  • The Best Android Tablets
    Apple iPad has dominated the tablet market since its first release in early 2010, but lower priced, variety of designs and other feature...

Blog Archive

  • ►  2015 (1)
    • ►  11/08 - 11/15 (1)
  • ►  2014 (5)
    • ►  02/16 - 02/23 (1)
    • ►  02/02 - 02/09 (4)
  • ►  2013 (53)
    • ►  12/29 - 01/05 (2)
    • ►  12/22 - 12/29 (3)
    • ►  12/15 - 12/22 (3)
    • ►  12/08 - 12/15 (11)
    • ►  12/01 - 12/08 (4)
    • ►  11/24 - 12/01 (5)
    • ►  11/17 - 11/24 (6)
    • ►  11/10 - 11/17 (12)
    • ►  11/03 - 11/10 (7)
  • ▼  2012 (12)
    • ►  08/19 - 08/26 (2)
    • ►  08/12 - 08/19 (1)
    • ►  08/05 - 08/12 (3)
    • ▼  07/29 - 08/05 (6)
      • Botnet
      • An introduction to cyber threat
      • Malware
      • Trojan Horse
      • Avoiding keyloggers
      • avoid getting phished!
Powered by Blogger.

Contact us

Name

Email *

Message *

Followers

Copyright 2014 Tech Soul.
Designed by OddThemes