Spyware, Botnets and Unix-Linux MalwareModule 5...57 of 699/15/2017, 2:00 PM
Historically most malware was developed by individuals for a number of reasons, including but not limited to:Desire to embarrass a group, organization or business,Revenge against a group, organization or business,Disseminate a political or ideological message, andBeing able to brag to associates that this individual was able to, or responsible for, breaking into the target’ssystems.Over the last 10 to 15 years, criminal organizations have come to see malware as a lucrative source of income.Consequently, the majority of malware is now written with the goal of financial profit. However malware basedattacks for ideological and political reasons still occur.SpywareAs general Internet access grown and use of search engines, with paid advertising, along with widespreadEcommerce usage, a broad category known as spyware has come into existence. Some spyware programs arecommercially produced for the purpose of gathering information about computer users, showing them pop-upads, or altering web-browser behavior for the financial benefit of the spyware creator. For instance, somespyware programs redirect search engine results to paid advertisements. Other spyware programs differ in thattheir creators present themselves openly as businesses, for instance by selling advertising space on the pop-upscreated by the malware.Another form of malware allows the creator to directly use the infected computers to perform activities thelegitimate owner knows nothing about. One example of this are "spammer" viruses which make infectedcomputers act as proxies to send out spam messages. The advantage to spammers of using infected computersis that they are available in large supply (thanks to the virus) and they provide anonymity, protecting thespammer from prosecution.There is also malware designed to steal information about the person whose computer is infected. Somemalware programs install a key logger, which copies down the user's keystrokes when entering a password,credit card number, or other information, useful when stealing identities and transmits the information to themalware creator automatically, enabling credit card or bank account fraud and other theft. A relatively new formof malware is the "phishing" Email which is constructed to induce the recipient to use a web link within the Emailso the targeted individual can log into the web site of their bank, brokerage or other account and verify accountinformation. These Emails are designed to very accurately appear to the reader to have come from their bank,brokerage, etc. and even include fake logos and other graphics virtually identical to the legitimate web site.
You've reached the end of your free preview.
Want to read all 69 pages?
Transmission Control Protocol, Intrusion detection system, Deep packet inspection