0% found this document useful (0 votes)
5 views32 pages

Phishing, Adware, Spyware, Rootkit Guide

The document provides a comprehensive overview of various cybersecurity threats, including phishing, adware, spyware, and rootkits, detailing their definitions, historical context, and famous incidents. It discusses the mechanisms of these threats, their impact on users, and preventive measures that can be taken. The document also includes a technical view of these threats and concludes with references for further reading.

Uploaded by

Ezioiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views32 pages

Phishing, Adware, Spyware, Rootkit Guide

The document provides a comprehensive overview of various cybersecurity threats, including phishing, adware, spyware, and rootkits, detailing their definitions, historical context, and famous incidents. It discusses the mechanisms of these threats, their impact on users, and preventive measures that can be taken. The document also includes a technical view of these threats and concludes with references for further reading.

Uploaded by

Ezioiz
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

PCT0101 - Computing Tech

Security

Name and ID
TABLE OF CONTENTS

NO CONTENTS
PAGE

1 Introduction 1-5

2 History Of Phishing, Adware, Spyware 5-9


and Rootkit
3 Famous Issues 9-13

4 Technical View of Phishing, Adware, 13-20


Spyware and Rootkit
5 Preventive Measures 20-24

6 Conclusion 25

7 References 26-31

1
1.0 Introduction

1.1 Briefly describe all chapters in case study

In the world full of technological advancement, security plays an extremely large

role as more and more breaches have been made worldwide. There are many types of

security breaches or hacks made by irresponsible people. Among them are phishing and

adware.

1.1.1 Phishing

Phishing is an attempt by a scammer to obtain sensitive information such

as the target’s username, password, and credit card information mainly for

malicious reasons. They grab the target’s attention by disguising themselves as a

2
trustworthy company and replicates the emails that the legitimate company would

send to their customers.

1.1.2 Adware

Adware is unwanted or redundant software popping up on your screen, in

most cases often within web browsers. Security professionals view adware as

forerunner as PUP (Potentially Unwanted Program). Typically, adware uses an

underhanded method or secretly disguise itself as legitimate, or piggyback on

another program to trick you into installing it on your PC, tablet or mobile device.

The way adware generates revenue for its developer is that they

automatically display online advertisements in the user interface of the software

or on a screen that pops up in the user’s face during the installation process. Also,

you might experience new tabs opening, a change in your home page, findings

from a search engine you never heard of, or even a redirect to a NSFW (Not Safe

for Work) website.

Here are a few typical tell-tale signs that you have adware on your system:

• Advertisements appear in places they shouldn’t be.

• Your web browser’s homepage has mysteriously changed without your

permission.

• Web pages that you typically visit are not displaying properly.

3
• Website links redirect to sites different from what you expected.

• Your web browser performance drops drastically.

• New toolbars, extensions, or plugins suddenly populate your browser.

• Your Mac starts automatically installing unwanted software applications.

• Your browser crashes.

1.1.3 Spyware

Spyware is software with purposes to gather information about a person or

organization sometimes without their knowledge, that may send such information

to another entity without the consumer's consent, that asserts control over a device

without the consumer's knowledge, or it may send such information to another

entity with the consumer's consent, through cookies.

Spyware is actually a generic term for malicious software that infects your

PC or mobile device and gathers information about you, your browsing and

Internet usage habits, as well as other data.

Spyware is sneaky and usually finds its way onto your computer without

your knowledge or permission, attaching itself to your operating system,

4
maintaining a presence on your PC. The way it enters through your computer

‘backdoor’ is when you inadvertently given permission for the spyware to install

itself when you agree to the terms and conditions of a seemingly legitimate

program you downloaded without reading the fine print.

1.1.4 Rootkit

The term “rootkit” comes from “root kit,” a package giving the highest

privileges in the system. Rootkits are used when the attackers need to backdoor a

system and preserve unnoticed access as long as possible. In addition, they may

register system activity and alter typical behavior in any way desired by the

attacker.

Rootkit installation can be automated, or an attacker can install it after

having obtained root or Administrator access. Obtaining this access is a result of

direct attack on a system, such as exploiting a known vulnerability (such as

privilege escalation) or a password (obtained by cracking or social engineering

tactics like "phishing"). Once installed, it becomes possible to hide the intrusion

as well as to maintain privileged access. Full control over a system means that

existing software can be modified, including software that might otherwise be

used to detect or circumvent it.

Rootkit detection is difficult because a rootkit may be able to subvert the

software that is intended to find it. Detection methods include using an alternative

and trusted operating system, behavioral-based methods, signature scanning,

difference scanning, and memory dump analysis. Removal can be complicated or

5
practically impossible, especially in cases where the rootkit resides in the kernel;

reinstallation of the operating system may be the only available solution to the

problem. When dealing with firmware rootkits, removal may require hardware

replacement, or specialized equipment.

2.0 History of Phishing, Adware, Spyware and Rootkit

2.1 Phishing

The first time phishing had occurred, it was during the 90s when America Online

was still prevalent. A group of hackers and pirates banded together to make themselves as

the warez community. The community first made their move by creating an algorithm

that randomized to create phony AOL accounts. When they got a hit, they instantly open

AOL accounts and spam messages to other users. Fortunately, AOL stop their actions by

putting security measures that prevents randomizing credit card numbers to be accepted.

However, that didn’t stop them. They moved on to trick users to give their sensitive

information by pretending to be AOL employees or AOL administrator. This caused

AOL to issue a warning to all of their users about the potential phishing scam going on in

their service.

2.2 Adware

6
Roughly, the storyline of adware started in around year 1995 where, industry

experts considered the first ad-supported software to be part of the larger category of

spyware. Soon, security professionals began to differentiate adware from spyware as a

less harmful type of PUPs. They were even seen as “legitimate,” at least in theory,

because legal businesses with actual offices and payrolls were creating adware software.

But the affiliates to these legitimate businesses often spread their adware without

themselves being checked for legitimacy by the adware vendor. Unchecked, the adware

grows in number by every means at their disposal—peer-to-peer sites, botnets, instant

messaging infections, and the aforementioned browser hijacks.

Luckily with enough time, adware vendors started to shut down their badly

behaved affiliates, and issued denials of responsibility for the affiliate’s actions. This was

a common pattern of activity during peak adware years, which flourished from about

2005 to 2008. After that, governing authorities started to issue large fines for these

offenses, which forced the biggest adware players to pick up their code and leave. More

recently, browsers have been cracking down with ad blockers, and ad block plugins are

ubiquitous or omnipresent.

Today, although adware persists, it is usually once again viewed as a form of

potentially unwanted program (PUP), which presents a threat level below the category of

malware. Nonetheless, adware is experiencing a bit of a revival. However, adware

makers today are fortifying power. In order to stay afloat, they’re using techniques more

aggressive than simply hijacking, including hiding within Trojans, bundling with ad fraud

components, or demonstrating rootkit capability, making them difficult to be removed.

7
2.3 Spyware

History of spyware was way back on October 16, 1995 in a Usenet post that

poked fun at Microsoft's business model. Spyware at first denoted software meant for

espionage (spying) purposes. However, in early 2000 the founder of Zone Labs, Gregor

Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in

2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational

software marketed to children by the Mattel toy company, was surreptitiously sending

data back to Mattel. Since then, "spyware" has taken on its present sense.

According to a 2005 study by AOL and the National Cyber-Security Alliance in

US, 61 percent of surveyed users' computers were infected with form of spyware. 92

percent of surveyed users with spyware reported that they did not know of its presence,

and 91 percent reported that they had not given permission for the installation of the

spyware. As of 2006, spyware has become one of the preeminent security threats to

computer systems running Microsoft Windows operating systems and also Internet

Explorer because it’s being used worldwide.

The Windows Registry also has modification capabilities like modifying key

values that allows software executed automatically when operating system boots.

Spyware can typically exploit this design by link itself into each location in the registry

that allows execution. Thus, making it hard to be removed because, it can be

automatically restored once operating system is rebooted. Once running, the spyware will

8
periodically check if any of these links are removed. If so, they will be automatically

restored.

2.4 Rootkit

The concept of modifying system functionality, on which modern rootkits have

grown, appeared in 1980. Viruses implemented at that time were not only patching

programs but also modifying system interrupt tables and memory to remain undetected

by antivirus software.

In 1999 an NTRootkit appeared. It was the first malicious rootkit dedicated to

Windows NT. 2009 brought on the scene the first rootkit for Mac OS X and in 2010 the

infamous Stuxnet (targeting PLC devices) was discovered. In 2006, a Polish researcher

named Joanna Rutkowska presented at Black Hat conference on new type of rootkit, a

hypervisor level called BluePill. In 2008, a credentials-stealing Trojan called Sinoval

(aka Torpig) used a rootkit module Mebroot to hide its malicious activities,

circumventing antivirus software

Lane Davis and Steven Dake wrote the earliest known rootkit in 1990 for Sun

Microsystems' SunOS UNIX operating system. In the lecture he gave upon receiving the

Turing award in 1983, Ken Thompson of Bell Labs, one of the creators of Unix,

theorized about subverting the C compiler in a Unix distribution and discussed the

exploit.

9
The modified compiler would detect attempts to compile the Unix login command

and generate altered code that would accept not only the user's correct password, but an

additional "backdoor" password known to the attacker.

Additionally, the compiler would detect attempts to compile a new version of the

compiler, and would insert the same exploits into the new compiler. A review of the

source code for the login command or the updated compiler would not reveal any

malicious code. This exploit was equivalent to a rootkit.

3.0 Famous Issues of Phishing, Adware, Spyware and Rootkit:

3.1 Phishing

Some of the biggest issues regarding to phishing is the Sony Pictures

Entertainment phishing attack. In 2014, a hacker group managed to penetrate the entire

network and stole a lot of important documents including statistics and unreleased

movies. The way that hackers managed to infiltrate the organization is by sending

phishing emails to the Sony employees which asks those who received it to verify their

Apple IDs. Once hackers obtained their Apple IDs and passwords, they then use the

credentials to make a malware which is known as Wiper, to steal sensitive information

about it.

Another controversy caused by phishing is the UK’s biggest phishing scam. The

Met Police Central e-Crime Unit(PCeU), the US Secret Service and another agency have

found that 2,600 pages are impersonating as banking websites which cause a lot of people

logging into them and giving their credentials to the scammers. Three men were involved

10
in this phishing scam and they were stealing money from people all around the world.

The police managed to traced them to a luxury hotel and arrested them. What they found

after that was servers containing details of 30,000 bank customers. The three men were

jailed for 20 years.

3.2 Adware

There were some major issues related to adware like when the security firm

Check Point Software Technologies Ltd. has warned of a massive new outbreak: They

count 250 million PCs infected with malicious code they've called Fireball, designed to

hijack browsers to change the default search engine, and track their web traffic on behalf

of a Beijing-based digital marketing firm called Rafotech. Sadly, more disturbingly,

Check Point says it found that the adware also has the ability to remotely run any code on

the victim's machine, or download new malicious files. It's potentially serious malware,

disguised as something more trivial.

Other recognized adware outcome was respective to a distinguished social media,

MySpace. Online banner ads running on [Link] and web sites infected more than

one million users with adware, according to net security firm iDefense. The attack

exploited a Windows Metafile (WMF) exploit, fixed by Microsoft in January, to infect

vulnerable Windows machines with malware from PurityScan or ClickSpring family of

adware. The malware stealthily tracks internet usage while bombarding infected users

with pop-up ads.

The banner ad that played a starring role in the attack seemingly advertised a site

called [Link]. In reality, machines were directed to Russian-language

11
website in Turkey, which tracked the number of times adware programs were

downloaded, the Washington Post reports.

3.3 Spyware

In most cases, issues found on spyware are regarding user experience when

running or even installing software. Hence, they might face something as follow:

3.3.1 Gator

Gator is installed by users as a password vault. That means that passwords

can be recalled for you automatically when visiting sites. The trade-off for this

service is that you have to endure pop-ups when visiting certain sites. Claria, the

maker of Gator, has cleaned up its act a little by labeling the pop-up ads, but

they're still annoying.

3.3.2 CoolWebSearch

This is one of the most notorious browser hijackers out there. This is the

name given to a program with many different variants that redirect users to

[Link] or [Link]. Uninstallation can be extremely complex

3.3.3 180SearchAssistant

This software either serves ads in pop-ups or pops up website windows

based on your keyword searches. This software usually comes bundled with other

"freebie" type software installs like emoticons or wallpaper. Newer versions of

the software have an add or remove program uninstall item.

3.3.4 Huntbar

12
An annoying software, installs a toolbar onto internet explorer and

windows explorer windows. It changes your home page and search page settings

to point to their servers. If you use another search engine, Huntbar will redirect

you to theirs and drains 15% on memory resources.

3.3.5 Cydoor

This software usually comes with P2P software, like Peer-to-peer. Again,

it barrages you with a series of pop up advertisements. It also tracks usage

information.

3.4 Rootkit

Issues regarding rootkits have been mentioned to some distinguished companies

like:

3.4.1. Sony

The first corporation known to create and distribute its own rootkit was

Sony Entertainment. In 2005, they launched a hidden campaign of spreading Sony

BMG Rootkit. Their motive was to protect their copyrighted publications by

interrupting the process of coping them. When CDs published by SONY were

played on a PC, a rootkit was installed in the background. From that moment, it

kept watching how the user accessed Sony CDs and was breaking any attempts of

making a copy. The full plot has been disclosed and badly affected the company’s

reputation.

13
3.4.2. Lenovo

In 2015, another company, Lenovo, was caught distributing rootkits

reinstalled on their machines. Their role was to automatically download dedicated

software, not taking into consideration user’s will.

4.0 Technical View

4.1 Phishing

There are many types of phishing available for attackers to use depending on the

situation. First of all, there is Deceptive Phishing. This is the most common type of

phishing which targets are being asked to give attackers their information to them. For

example, attackers made a fake email account to their targets to try to get their bank

information.

Another type of phishing is Spear Phishing. It targets individuals rather than large

groups of people. Attackers focuses more on stalking the individual’s social media

account and learns about the individual’s interests and likings in order to communicate

with that individual more naturally.

Whaling normally targets high level executives like for example, a CEO.

Attackers does some profiling about them before they initialize their plans to attack the

executives. Once they infiltrate the executives credentials, they will begin their second

14
phase to be impersonating as the executives and trying to lure victims to make a wire

transfer to them by email.

Lastly, Pharming is a way that attackers lead their victims to fake and unverified

websites to access their credentials. Victims don’t need to click on the websites

themselves as attackers can redirect them to that fake website despite the victim entering

the correct URL by using the DNS server.

4.2 Adware

4.2.1 How do I get adware?

Simply, there are two ways:

[Link] When you download a program

 Usually freeware or shareware and it quietly installs

adware without your knowledge, or permission. That’s

because the program’s author signed up with the

adware vendor. Why? Because the revenue generated

by the advertisements enables the program to be offered

gratis

[Link] When you’re visiting a website

 Whether it a secured site or a sketchy one. Either way,

it can be infected with adware, which takes advantage

of a vulnerability in the user’s web browser to deliver a

15
drive-by download. After it burrows in, the adware

starts collecting your information, redirecting you to

malicious websites, and throwing more advertisements

into your browser.

4.2.2 Types of adware

[Link] DeskAd

 DeskAd is considered to be malicious software, a

destructive adware program that is packaged as ad-

supported software that provides targeted

advertisements. It starts off in subtle fashion,

functioning in stealth mode to avoid detection. Over

time, it begins to seize control, making alterations to

your web browser with additional buttons, toolbars and

links.

[Link] WeatherBug

 WeatherBug is a computer application that displays

data of live weather. It is available for download from

the company's website along with the sites of nearly 85

of its TV broadcasting partners. WeatherBug first came

under fire in 2005. Windows Defender, detected

WeatherBug in a test scan and labeled the program as

spyware because of its behavior.

16
4.3 Spyware

Spyware usually comes and installed into a number of freeware such as tray

clocks, weather forecasting software, games, keygens, pop-ups, and pop-under. Users

often find the software while surfing the internet and tend to download them without

considering the premise that the software may contain harmful spyware infections.

4.3.1 Types of Spyware

Some typical functions designed into spyware include the following:

[Link] Password stealers

 Applications designed to harvest passwords from

infected computers. The types of collected passwords

may include stored credentials from web browsers,

system login credentials, and sundry critical passwords.

[Link] Banking Trojans

 Applications designed to harvest credentials from

financial institutions. They take advantage of

vulnerabilities in browser security to modify web pages,

modify transaction content, or insert additional

transactions, all in a completely covert fashion invisible

to both the user and host web application.

17
[Link] Info stealers

 Applications that scan infected computers and seek out

a variety of information, including usernames,

passwords, email addresses, browser history, log files,

system information, documents, spreadsheets, or other

media files.

[Link] Key loggers

 Referred to as system monitors, are applications

designed to capture computer activity, including

keystrokes, websites visited, search history, email

discussions, chatroom dialogue, and system credentials.

They typically collect screenshots of the current

window at scheduled intervals.

4.4 Rootkit

4.4.1 How do I get Rootkit

Generally, as many other computer’s most hated foe, the most common

infection mechanism is to trick an unsuspecting user to download and install a file

or program of some kind such as an image, an executable file, a PDF file, a

macro, and so forth, often from a website or an email attachment.

18
4.4.2 Types of Rootkit:

[Link] Persistent Rootkit

 This Rootkit virus triggers every time the computer

startup or reboots. It hides as a valid registry files and

replicate action of valid windows registry files. It can’t

be recognized easily and gets uploaded every time

whenever the computers restart or reboot without any

help from external factor. It remains in your computer

registry even if the computer is rebooted.

[Link] Memory based Rootkit

 This type of Rootkit virus lies in your computer

memory. They occupy an unallocated portion of your

computer RAM and remain until computer is shut down

by the owner.

[Link] User Mode Rootkits

 In this case rootkits virus digs deep inside the operating

system and stores itself in the system drive location and

can’t be detected by the antivirus program. It escapes

antivirus program detection by integrating itself with

the antivirus program. When Antivirus program is

initiated to scan the system, rootkit obstruct it and

19
imitate the action of antivirus program and in result

does not show any malware in result.

[Link] Kernel Mode Rootkits

 Kernel mode rootkits are more dangerous as compared

to the other rootkits. This type of rootkits modifies the

Kernel data structures by adding or replacing the

existing code. This is one of the most lethal rootkits

which can’t be detected by antivirus program as they

operate at the same security level as the operating

systems.

[Link] Firmware Rootkits

 Firmware rootkits affects the device attached by getting

access to the device code and cease operation. One as

an example is Mebromi rootkit which affects the

graphic card of computer. This rootkit will reinstall

itself when you restart your computer.

[Link] Boot kits

 Boot kits is the rootkit which is designed to

contaminate the MBR (Master Boot Record) of the

computer. It mainly affects the booting process and

POST (Power on Self-Test) of computer.

20
[Link] Hypervisor Rootkits:

 This kind of rootkits is designed to affect the virtual

machine setup. Hypervisor is a layer which is present

between the physical layer and the virtual layer; it does

not load itself when the computer restarts and become

active when operating system is being prompted to

initiate virtual machine. Its task is to exploit hardware

virtualization and thus exploit system by intercepting

hardware operation triggered by genuine operating

system.

5.0 Preventative Measurement

5.1 Phishing

Although there are a lot of scams happening every day, we can do our part to

prevent ourselves from falling into these scams.

First of all, make sure to train your employees to detect and recognize phishing

scams or emails. For example, employees will be trained to see if the website they visited

are secured and the URL address matches the real website. Teaching not only employees

but also consumers would help decrease the chances of them getting themselves from

becoming victims.

21
Secondly, people should be encouraged to use two factor authentication to further

protect themselves from hackers. Two factor authentication will notify users through

SMS, email, or 2-factor authentication app if any attempted logins are detected.

Another way is keep your system up to date at all times. Users and providers

should get the latest patches and security updates so that they would not be compromised.

This method will be useful as it will stop attackers from hacking your DNS Address in

pharming.

Lastly, make sure that users have an antivirus installed in their computers. An

antivirus alone can help them preventing phishing scams from happening excluding

emails. Users will need to scan their computer once every few weeks to ensure that they

are not being compromised.

5.2 Adware

Despite all the consequences of adware, some can do to counter them:

5.2.1 Use caution and practice safe computing.

 This means thinking twice before immediately

downloading and installing any new software—

especially freeware. Read the terms and conditions

before agreeing to them, and quit out of the download

process if anything smells like a permission to load

adware. Avoid torrent sites, illegal downloads, and

never open an app from an unknown source.

22
5.2.2 Make sure you have a good set of backups.

 Having a good set of backups make the process of

removing malware exponentially easier. Instead of

having to rebuild a system from scratch, you’ll be able

to turn to the last clean backups. If you’re backing up

regularly, you’ll only lose a few hours of work instead

of the totality of your data. The better your backups are,

the less a malware infection will hurt you.

5.2.3 Use a malware scanner.

 When you’re expecting to be attacked, it’s wise to set a

watchman. Use malware scanners as they can notify

you in the event of an attack, and some will even help

you to repair the damage.

 When choosing a malware scanner, go with a well-

reputed, name-brand option like Malwarebytes or

Bitdefender. And remember to be careful when

downloading a scanner; ironically, malware is often

disguised as a security scanner, and inexperienced users

looking to protect their systems can sometimes end up

compromising them by downloading viruses.

23
5.3 Spyware

The best defense against spyware, as with most malware, starts with your

behavior. Follow these basics of good cyber self-defense:

• Don’t open emails from unknown senders.

• Don’t download files unless they come from a trusted source.

• Mouse-over links before clicking on them and make sure you’re being sent to

the right webpage.

But as people have gotten smarter about cyber self-defense, hackers have turned

to more sophisticated spyware delivery methods, so installing a reputable cybersecurity

program is necessary to counter advanced spyware.

Look for cybersecurity that includes real-time protection. Real-time protection

automatically blocks spyware and other threats before they can activate on your

computer. Some traditional cyber security or antivirus products rely heavily on signature-

based technology—these products can be easily circumvented, especially by new threats.

You should also look out for features that block the delivery of spyware itself on

your machine, such as anti-exploit technology and malicious website protection, which

blocks websites that host spyware.

5.4 Rootkit

Many malicious rootkits manage to infiltrate computer systems and install

themselves by propagating with a malware threat such as a virus. A successful risk

24
management strategy includes putting multiple systems in place to combat the threats,

including appropriate system configuration, strong authentication, patch and

configuration management, and the latest malware detection solutions.

You can safeguard your system from rootkits by ensuring it is kept patched

against known vulnerabilities, that antivirus software is updated and running, and that

you don’t accept files from or open email file attachments from unknown sources. You

should also be careful when installing software and read carefully before agreeing to

EULA’s (end user license agreements), because some may state overtly that a rootkit of

some sort will be installed.

 One of the easiest ways to prevent your computer from rootkit is to create

system restore points at regular interval.

 In most of the cases rootkit enters in computer through spam mails, it is

always advised to avoid spam mails.

 It is always recommended to scan every external device before using it as

they may contain harmful malwares.

 You must regularly update computer antivirus program from the genuine

website of manufacturer. Apart from the genuine website of manufacturer

don’t use antivirus which promises to provide full security these are traps

created by the bad people to fulfill their evil intentions.

 Use Microsoft security essential security tools available on the Microsoft

support website.

25
6.0 Conclusion

Hence, throughout this assignment and documentation process, we certainly have learned

boundless information especially with reference to cyber-attacks on this case, as what we have

chosen in our assignment which consists of Adware, Spyware, Rootkit and Phishing.

Surely, the story behind these major computer menace have been widely known to all

users and since its existence has stand out since the last few decades, more and more

programmers and even computer scientists are in helping hand going all out, in order to solve

such computer threats collision. This is mostly for the sake of users to use, manage and deal with

their computer with no big deal or problems.

The point is that, the utmost important things is the way how we (users) support and

cooperate with such helpful people in aiding us to prevent facing computer attacks problems as

how the past era people did. We have to be extra cautious and always keep an eye and even

always know what’s what in our surrounding preeminently, famous cyber-attacks like Adware,

Spyware, Rootkit and Phishing.

Else, we would be an easy target for computer hackers to hack and get into our computer

systems and obtain all extra credential information or data which, we do not want.

26
7.0 References

7.1 Phishing

1. Phishing Definition and History. Retrieved September 12, 2018, from

[Link]

definition-and-history/

2. The Hack of Sony Pictures: What We Know and What You Need to Know.

(2014, December 08). Retrieved September 12, 2018, from

[Link]

sony-pictures-what-you-need-to-know

3. Sony hackers targeted employees with fake Apple ID emails. (April 23, 2015).

Retrieved September 14, 2018, from

[Link]

[Link]

4. Sony Hackers Used Phishing Emails to Breach Company Networks (April 22,

2015). Retrieved September 14, 2018, from [Link]

security/latest-security-news/sony-hackers-used-phishing-emails-to-breach-

company-networks/

5. Sony Hackers Used Phishing Emails to Breach Company Networks (April 22,

2015). Retrieved September 14, 2018, from [Link]

security/latest-security-news/sony-hackers-used-phishing-emails-to-breach-

company-networks/

27
6. Phishing scammers jailed for attempted £59m fraud (September 04, 2014).

Retrieved September 15, 2018, from [Link]

scammers-jailed-for-attempted-59m-fraud-jun13

7. 6 Common Phishing Attacks and How to Protect Against Them (June 5, 2016).

Retrieved September 15, 2018, from

[Link]

phishing-attacks-and-how-to-protect-against-them/

8. 6 Common Phishing Attacks and How to Protect Against Them (June 5, 2016).

Retrieved September 15, 2018, from

[Link]

phishing-attacks-and-how-to-protect-against-them/

9. Phishing Attack Prevention: How to Identify & Avoid Phishing Scams (July 11,

2018). Retrieved September 15, 2018, from

[Link]

phishing-scams

7.2 Adware, Spyware, Rootkit

1. MALWARE, VIRUS, WORMS, TROJAN, SPYWARE, ROOTKIT &

ADWARE. (2014, August 5). Retrieved September 12, 2018, from

[Link]

WORMS-TROJAN-SPYWARE-ROOTKIT--ADWARE

2. Adware. Retrieved September 12, 2018, from

[Link]

28
3. (n.d). All about adware. Retrieved September 12, 2018, from

[Link]

4. Andy Greenberg. Hack Brief: Dangerous 'Fireball' Adware Infects a Quarter

Billion PCs. (2017, February 2). Retrieved September 12, 2018, from

[Link]

quarter-billion-pcs/

5. All About spyware. Retrieved September 12, 2018, from

[Link]

6. Spyware. Retrieved September 12, 2018, from

[Link]

7. (n.d.). a Symantec employee. What is spyware? And how to remove it. Retrieved

September 12, 2018, from [Link]

[Link]

8. Rootkits. (2016, June 16). Retrieved September 12, 2018, from

[Link]

9. Tony Bradley. What Is a Rootkit and How Can You Avoid It? (2017, August 24).

Retrieved September 12, 2018, from [Link]

can-avoid/

10. (n.d.). Master Copy. The Ten Most Common Spyware Threats. Retrieved

September 12, 2018, from

[Link]

mon_spyware_threats.html

29
11. Margaret Rouse. (2007, April). Top 10 Spyware Threats. Retrieved September 12,

2018, from [Link]

12. John Leyden. MySpace adware attack hits hard. (2006, July 21). Retrieved

September 12, 2018, from

[Link]

13. (n.d.). 3 Malware Prevention Tips. Retrieved September 12, 2018, from

[Link]

14. Rootkit. Retrieved September 12, 2018, from

[Link]

15. Wade Roush. Three Arrested in Sony Rootkit Virus Case. (2006, June 27).

Retrieved September 12, 2018, from

[Link]

virus-case/

16. (n.d.). Bella Martin. Types Of Rootkit Viruses - Preventive Measures. Retrieved

September 12, 2018, from [Link]

[Link]

17. (n.d.). Types of Adware: DeskAd. Retrieved September 12, 2018, from

[Link]

18. (n.d.). Types of Adware: WeatherBug. Retrieved September 12, 2018, from

[Link]

19. (n.d.). anandsafi. How Spyware infects your computer. Retrieved September 12,

2018, from [Link]

infects-your-computer/

30
20. Ed Tiddel, Kari Finn. How to detect and remove a rootkit in Windows 10. (2017,

September 5). Retrieved September 12, 2018, from

[Link]

[Link]

31

You might also like