Manipulating the Internet Muttik

نویسنده

  • Igor G. Muttik
چکیده

Traditionally, viruses and other malware were distributed using push techniques – viruses directly or malware authors actively distributed copies around. With the exception of auto-executing worms this method of distribution requires user intervention – a user has to click on an email attachment or launch a program. And users have been told for years to be very cautious about all unsolicited emails. So, in such situations users’ defences are higher and such objects are more likely to be avoided or treated with caution. The situation changes if a user himself is browsing the Internet looking for something. Being motivated to complete what he perceives to be his own task, (s)he is very likely to lower his defences. We are seeing now that ‘bad guys’ are manipulating the Internet to make sure their malicious software is executed by a large number of unsuspecting users. So far we have observed at least five different kinds of attack: manipulation of search engines, DNS poisoning, hacking into websites, domain hijacking and exploiting common user mistakes (typos). We analyse and dissect a case where malicious code was distributed using a technique we called ‘index hijacking’ – when popular search engines point unsuspecting users to malicious sites. We also investigate a case of ‘link hijacking’, where a legitimate website pointed users to a bad site involved in ‘index hijacking’. We also discuss DNS poisoning, when users type a URL correctly, but manipulated DNS servers bring them to a completely different location. And finally, we touch on the topic of ‘typosquatting’ for malware distribution – exploitation of common users’ mistakes such as typos in a website’s URL. Important note: many URLs given in this paper point to malicious websites. Do not follow these links. If you do, it is at your own risk.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detection of app collusion potential using logic programming

Android is designed with a number of built-in security features such as app sandboxing and permission-based access controls. Android supports multiple communication methods for apps to cooperate. This creates a security risk of app collusion. For instance, a sandboxed app with permission to access sensitive data might leak that data to another sandboxed app with access to the internet. In this ...

متن کامل

Towards Automated Android App Collusion Detection

Android OS supports multiple communication methods between apps. This opens the possibility to carry out threats in a collaborative fashion, c.f. the Soundcomber example from 2011. In this paper we provide a concise definition of collusion and report on a number of automated detection approaches, developed in co-operation with Intel Security.

متن کامل

Explaining Unwanted Behaviours in Context

Mobile malware has been increasingly identified based on unwanted behaviours like sending premium SMS messages. However, unwanted behaviours for a group of apps can be normal for another, i.e., they are contextsensitive. We develop an approach to automatically explain unwanted behaviours in context and evaluate the automatic explanations via a user-study with favourable results. These explanati...

متن کامل

Basic Security of the ecash Payment System

ecash is a payment system designed and implemented for making purchases over open networks such as the Internet. In this paper we review some of the main cryptographic techniques used throughout the ecash system. We will focus on security aspects as well as some performance related issues. The central notion of an electronic coin is treated in detail, and the basic protocols manipulating coins ...

متن کامل

Basic Security of the ecashTM Payment System

ecash is a payment system designed and implemented for making purchases over open networks such as the Internet. In this paper we review some of the main cryptographic techniques used throughout the ecash system. We will focus on security aspects as well as some performance related issues. The central notion of an electronic coin is treated in detail, and the basic protocols manipulating coins ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005