11:01 Social engineering techniques used to spread malware | |
Recently, one of the most effective ways to spread malware is social engineering. Practice shows that the hole in the software eventually closed, and users in mind things are not so rosy ... For example, not so long ago, Microsoft released a patch tightly disable avtoran with flash drives. And many anti-virus products have adopted a ban on the file autorun.inf. It would seem that this should lick wave Malvar, is used to distribute other removable drives. But no! Why ..? Innate curiosity pushes people to many ill-considered actions. Just can not automatically run, you must force the user to do it! I tried to group the most common social engineering techniques that are used by hackers to spread malicious software and give some tips to protect. 1. Substitution will fileexecutable file disguised as a folder, legitimate application or file type using the appropriate icons. Bustling user pokes his arm and runs the file for execution. Defense:
2. An intriguing name of the fileintriguing name of the executable file, inciting a user to run it (for example, "Do not otkryvat.scr). Defense:
3. Playing on the user's desire to gain access to the desired contentUser lured to malicious website, under the pretext of access to content (video, for example) it is invited to download a codec / driver / extractor. Curiosity once again prevails over reason ... Defense:
4. Imitation of live communicationThe fact that e-mails and instant messages to different sypyatsya message pleas send an SMS or a poke in the link is not uncommon, fortunately, most users have learned to pay attention to it. Therefore, the villains learn new ways. In January of this year ICQ users were attacked Malvar «Piggy.zip» or "H1N1", which infects a user's computer is sent to all his contacts, not only in response to a phrase like "that the virus is on ...? ? "and" you're a bot? "quite vpopad answered" no, this flash drive about a pig, look:) "or" you yourself bot = ". According to an analysis of code, the virus is just looking for keywords in the message (spammer, virus, bot, etc.) and throwing out the phrase once correlated with the meaning of the keyword. For all the ease of implementation "intelligence" of such an approach proved extremely effective! Very many people who considered themselves relatively advanced in the field of computer security was hooked. Scary to think what will happen if embedded normal chat bot in this trojan ... It is fair to note that the first such case was as much in 2005. Defense:
5. "Road apple"Thanks to total reduction of prices of various media, including flash, the attacker can not feel sorry to throw a disc or flash drive with a trojan you straight to the threshold. A burning desire to see what is there is likely to prevail, the user connects the disk and activates Malvar (quite possibly one of the above methods), which also achieved an attacker! Sicness already talked about his experience popping "apple". Defense:
According to a tip Antelle another method. 6. Exploitation fears UsersAs a general rule, a man trying to convince him that his computer is infested with viruses, personal data and passwords are funneling hackers, with its IP allegedly sent spam, etc. To solve all problems immediately invited to download and install a "antivirus" (be careful, many of these "solutions" fully replicate the interface of well-known products). After the installation is a lock system, with the requirement to pay "product license", or simply a computer user downloads another packs Malvar, with what you want functionality. Privacy
| |
|
Total comments: 0 | |