Phishing, Adware, Spyware, Rootkit Guide
Phishing, Adware, Spyware, Rootkit Guide
Security
Name and ID
TABLE OF CONTENTS
NO CONTENTS
PAGE
1 Introduction 1-5
6 Conclusion 25
7 References 26-31
1
1.0 Introduction
role as more and more breaches have been made worldwide. There are many types of
security breaches or hacks made by irresponsible people. Among them are phishing and
adware.
1.1.1 Phishing
as the target’s username, password, and credit card information mainly for
2
trustworthy company and replicates the emails that the legitimate company would
1.1.2 Adware
most cases often within web browsers. Security professionals view adware as
another program to trick you into installing it on your PC, tablet or mobile device.
The way adware generates revenue for its developer is that they
or on a screen that pops up in the user’s face during the installation process. Also,
you might experience new tabs opening, a change in your home page, findings
from a search engine you never heard of, or even a redirect to a NSFW (Not Safe
Here are a few typical tell-tale signs that you have adware on your system:
permission.
• Web pages that you typically visit are not displaying properly.
3
• Website links redirect to sites different from what you expected.
1.1.3 Spyware
organization sometimes without their knowledge, that may send such information
to another entity without the consumer's consent, that asserts control over a device
Spyware is actually a generic term for malicious software that infects your
PC or mobile device and gathers information about you, your browsing and
Spyware is sneaky and usually finds its way onto your computer without
4
maintaining a presence on your PC. The way it enters through your computer
‘backdoor’ is when you inadvertently given permission for the spyware to install
itself when you agree to the terms and conditions of a seemingly legitimate
1.1.4 Rootkit
The term “rootkit” comes from “root kit,” a package giving the highest
privileges in the system. Rootkits are used when the attackers need to backdoor a
system and preserve unnoticed access as long as possible. In addition, they may
register system activity and alter typical behavior in any way desired by the
attacker.
tactics like "phishing"). Once installed, it becomes possible to hide the intrusion
as well as to maintain privileged access. Full control over a system means that
software that is intended to find it. Detection methods include using an alternative
5
practically impossible, especially in cases where the rootkit resides in the kernel;
reinstallation of the operating system may be the only available solution to the
problem. When dealing with firmware rootkits, removal may require hardware
2.1 Phishing
The first time phishing had occurred, it was during the 90s when America Online
was still prevalent. A group of hackers and pirates banded together to make themselves as
the warez community. The community first made their move by creating an algorithm
that randomized to create phony AOL accounts. When they got a hit, they instantly open
AOL accounts and spam messages to other users. Fortunately, AOL stop their actions by
putting security measures that prevents randomizing credit card numbers to be accepted.
However, that didn’t stop them. They moved on to trick users to give their sensitive
AOL to issue a warning to all of their users about the potential phishing scam going on in
their service.
2.2 Adware
6
Roughly, the storyline of adware started in around year 1995 where, industry
experts considered the first ad-supported software to be part of the larger category of
less harmful type of PUPs. They were even seen as “legitimate,” at least in theory,
because legal businesses with actual offices and payrolls were creating adware software.
But the affiliates to these legitimate businesses often spread their adware without
themselves being checked for legitimacy by the adware vendor. Unchecked, the adware
Luckily with enough time, adware vendors started to shut down their badly
behaved affiliates, and issued denials of responsibility for the affiliate’s actions. This was
a common pattern of activity during peak adware years, which flourished from about
2005 to 2008. After that, governing authorities started to issue large fines for these
offenses, which forced the biggest adware players to pick up their code and leave. More
recently, browsers have been cracking down with ad blockers, and ad block plugins are
ubiquitous or omnipresent.
potentially unwanted program (PUP), which presents a threat level below the category of
makers today are fortifying power. In order to stay afloat, they’re using techniques more
aggressive than simply hijacking, including hiding within Trojans, bundling with ad fraud
7
2.3 Spyware
History of spyware was way back on October 16, 1995 in a Usenet post that
poked fun at Microsoft's business model. Spyware at first denoted software meant for
espionage (spying) purposes. However, in early 2000 the founder of Zone Labs, Gregor
Freund, used the term in a press release for the ZoneAlarm Personal Firewall. Later in
2000, a parent using ZoneAlarm was alerted to the fact that "Reader Rabbit," educational
software marketed to children by the Mattel toy company, was surreptitiously sending
data back to Mattel. Since then, "spyware" has taken on its present sense.
US, 61 percent of surveyed users' computers were infected with form of spyware. 92
percent of surveyed users with spyware reported that they did not know of its presence,
and 91 percent reported that they had not given permission for the installation of the
spyware. As of 2006, spyware has become one of the preeminent security threats to
computer systems running Microsoft Windows operating systems and also Internet
The Windows Registry also has modification capabilities like modifying key
values that allows software executed automatically when operating system boots.
Spyware can typically exploit this design by link itself into each location in the registry
automatically restored once operating system is rebooted. Once running, the spyware will
8
periodically check if any of these links are removed. If so, they will be automatically
restored.
2.4 Rootkit
grown, appeared in 1980. Viruses implemented at that time were not only patching
programs but also modifying system interrupt tables and memory to remain undetected
by antivirus software.
Windows NT. 2009 brought on the scene the first rootkit for Mac OS X and in 2010 the
infamous Stuxnet (targeting PLC devices) was discovered. In 2006, a Polish researcher
named Joanna Rutkowska presented at Black Hat conference on new type of rootkit, a
(aka Torpig) used a rootkit module Mebroot to hide its malicious activities,
Lane Davis and Steven Dake wrote the earliest known rootkit in 1990 for Sun
Microsystems' SunOS UNIX operating system. In the lecture he gave upon receiving the
Turing award in 1983, Ken Thompson of Bell Labs, one of the creators of Unix,
theorized about subverting the C compiler in a Unix distribution and discussed the
exploit.
9
The modified compiler would detect attempts to compile the Unix login command
and generate altered code that would accept not only the user's correct password, but an
Additionally, the compiler would detect attempts to compile a new version of the
compiler, and would insert the same exploits into the new compiler. A review of the
source code for the login command or the updated compiler would not reveal any
3.1 Phishing
Entertainment phishing attack. In 2014, a hacker group managed to penetrate the entire
network and stole a lot of important documents including statistics and unreleased
movies. The way that hackers managed to infiltrate the organization is by sending
phishing emails to the Sony employees which asks those who received it to verify their
Apple IDs. Once hackers obtained their Apple IDs and passwords, they then use the
about it.
Another controversy caused by phishing is the UK’s biggest phishing scam. The
Met Police Central e-Crime Unit(PCeU), the US Secret Service and another agency have
found that 2,600 pages are impersonating as banking websites which cause a lot of people
logging into them and giving their credentials to the scammers. Three men were involved
10
in this phishing scam and they were stealing money from people all around the world.
The police managed to traced them to a luxury hotel and arrested them. What they found
after that was servers containing details of 30,000 bank customers. The three men were
3.2 Adware
There were some major issues related to adware like when the security firm
Check Point Software Technologies Ltd. has warned of a massive new outbreak: They
count 250 million PCs infected with malicious code they've called Fireball, designed to
hijack browsers to change the default search engine, and track their web traffic on behalf
Check Point says it found that the adware also has the ability to remotely run any code on
the victim's machine, or download new malicious files. It's potentially serious malware,
MySpace. Online banner ads running on [Link] and web sites infected more than
one million users with adware, according to net security firm iDefense. The attack
adware. The malware stealthily tracks internet usage while bombarding infected users
The banner ad that played a starring role in the attack seemingly advertised a site
11
website in Turkey, which tracked the number of times adware programs were
3.3 Spyware
In most cases, issues found on spyware are regarding user experience when
running or even installing software. Hence, they might face something as follow:
3.3.1 Gator
can be recalled for you automatically when visiting sites. The trade-off for this
service is that you have to endure pop-ups when visiting certain sites. Claria, the
maker of Gator, has cleaned up its act a little by labeling the pop-up ads, but
3.3.2 CoolWebSearch
This is one of the most notorious browser hijackers out there. This is the
name given to a program with many different variants that redirect users to
3.3.3 180SearchAssistant
based on your keyword searches. This software usually comes bundled with other
3.3.4 Huntbar
12
An annoying software, installs a toolbar onto internet explorer and
windows explorer windows. It changes your home page and search page settings
to point to their servers. If you use another search engine, Huntbar will redirect
3.3.5 Cydoor
This software usually comes with P2P software, like Peer-to-peer. Again,
information.
3.4 Rootkit
like:
3.4.1. Sony
The first corporation known to create and distribute its own rootkit was
interrupting the process of coping them. When CDs published by SONY were
played on a PC, a rootkit was installed in the background. From that moment, it
kept watching how the user accessed Sony CDs and was breaking any attempts of
making a copy. The full plot has been disclosed and badly affected the company’s
reputation.
13
3.4.2. Lenovo
4.1 Phishing
There are many types of phishing available for attackers to use depending on the
situation. First of all, there is Deceptive Phishing. This is the most common type of
phishing which targets are being asked to give attackers their information to them. For
example, attackers made a fake email account to their targets to try to get their bank
information.
Another type of phishing is Spear Phishing. It targets individuals rather than large
groups of people. Attackers focuses more on stalking the individual’s social media
account and learns about the individual’s interests and likings in order to communicate
Whaling normally targets high level executives like for example, a CEO.
Attackers does some profiling about them before they initialize their plans to attack the
executives. Once they infiltrate the executives credentials, they will begin their second
14
phase to be impersonating as the executives and trying to lure victims to make a wire
Lastly, Pharming is a way that attackers lead their victims to fake and unverified
websites to access their credentials. Victims don’t need to click on the websites
themselves as attackers can redirect them to that fake website despite the victim entering
4.2 Adware
gratis
15
drive-by download. After it burrows in, the adware
[Link] DeskAd
links.
[Link] WeatherBug
16
4.3 Spyware
Spyware usually comes and installed into a number of freeware such as tray
clocks, weather forecasting software, games, keygens, pop-ups, and pop-under. Users
often find the software while surfing the internet and tend to download them without
considering the premise that the software may contain harmful spyware infections.
17
[Link] Info stealers
media files.
4.4 Rootkit
Generally, as many other computer’s most hated foe, the most common
18
4.4.2 Types of Rootkit:
by the owner.
19
imitate the action of antivirus program and in result
systems.
20
[Link] Hypervisor Rootkits:
system.
5.1 Phishing
Although there are a lot of scams happening every day, we can do our part to
First of all, make sure to train your employees to detect and recognize phishing
scams or emails. For example, employees will be trained to see if the website they visited
are secured and the URL address matches the real website. Teaching not only employees
but also consumers would help decrease the chances of them getting themselves from
becoming victims.
21
Secondly, people should be encouraged to use two factor authentication to further
protect themselves from hackers. Two factor authentication will notify users through
SMS, email, or 2-factor authentication app if any attempted logins are detected.
Another way is keep your system up to date at all times. Users and providers
should get the latest patches and security updates so that they would not be compromised.
This method will be useful as it will stop attackers from hacking your DNS Address in
pharming.
Lastly, make sure that users have an antivirus installed in their computers. An
antivirus alone can help them preventing phishing scams from happening excluding
emails. Users will need to scan their computer once every few weeks to ensure that they
5.2 Adware
22
5.2.2 Make sure you have a good set of backups.
23
5.3 Spyware
The best defense against spyware, as with most malware, starts with your
• Mouse-over links before clicking on them and make sure you’re being sent to
But as people have gotten smarter about cyber self-defense, hackers have turned
automatically blocks spyware and other threats before they can activate on your
computer. Some traditional cyber security or antivirus products rely heavily on signature-
You should also look out for features that block the delivery of spyware itself on
your machine, such as anti-exploit technology and malicious website protection, which
5.4 Rootkit
24
management strategy includes putting multiple systems in place to combat the threats,
You can safeguard your system from rootkits by ensuring it is kept patched
against known vulnerabilities, that antivirus software is updated and running, and that
you don’t accept files from or open email file attachments from unknown sources. You
should also be careful when installing software and read carefully before agreeing to
EULA’s (end user license agreements), because some may state overtly that a rootkit of
One of the easiest ways to prevent your computer from rootkit is to create
You must regularly update computer antivirus program from the genuine
don’t use antivirus which promises to provide full security these are traps
support website.
25
6.0 Conclusion
Hence, throughout this assignment and documentation process, we certainly have learned
boundless information especially with reference to cyber-attacks on this case, as what we have
chosen in our assignment which consists of Adware, Spyware, Rootkit and Phishing.
Surely, the story behind these major computer menace have been widely known to all
users and since its existence has stand out since the last few decades, more and more
programmers and even computer scientists are in helping hand going all out, in order to solve
such computer threats collision. This is mostly for the sake of users to use, manage and deal with
The point is that, the utmost important things is the way how we (users) support and
cooperate with such helpful people in aiding us to prevent facing computer attacks problems as
how the past era people did. We have to be extra cautious and always keep an eye and even
always know what’s what in our surrounding preeminently, famous cyber-attacks like Adware,
Else, we would be an easy target for computer hackers to hack and get into our computer
systems and obtain all extra credential information or data which, we do not want.
26
7.0 References
7.1 Phishing
[Link]
definition-and-history/
2. The Hack of Sony Pictures: What We Know and What You Need to Know.
[Link]
sony-pictures-what-you-need-to-know
3. Sony hackers targeted employees with fake Apple ID emails. (April 23, 2015).
[Link]
[Link]
4. Sony Hackers Used Phishing Emails to Breach Company Networks (April 22,
security/latest-security-news/sony-hackers-used-phishing-emails-to-breach-
company-networks/
5. Sony Hackers Used Phishing Emails to Breach Company Networks (April 22,
security/latest-security-news/sony-hackers-used-phishing-emails-to-breach-
company-networks/
27
6. Phishing scammers jailed for attempted £59m fraud (September 04, 2014).
scammers-jailed-for-attempted-59m-fraud-jun13
7. 6 Common Phishing Attacks and How to Protect Against Them (June 5, 2016).
[Link]
phishing-attacks-and-how-to-protect-against-them/
8. 6 Common Phishing Attacks and How to Protect Against Them (June 5, 2016).
[Link]
phishing-attacks-and-how-to-protect-against-them/
9. Phishing Attack Prevention: How to Identify & Avoid Phishing Scams (July 11,
[Link]
phishing-scams
[Link]
WORMS-TROJAN-SPYWARE-ROOTKIT--ADWARE
[Link]
28
3. (n.d). All about adware. Retrieved September 12, 2018, from
[Link]
Billion PCs. (2017, February 2). Retrieved September 12, 2018, from
[Link]
quarter-billion-pcs/
[Link]
[Link]
7. (n.d.). a Symantec employee. What is spyware? And how to remove it. Retrieved
[Link]
[Link]
9. Tony Bradley. What Is a Rootkit and How Can You Avoid It? (2017, August 24).
can-avoid/
10. (n.d.). Master Copy. The Ten Most Common Spyware Threats. Retrieved
[Link]
mon_spyware_threats.html
29
11. Margaret Rouse. (2007, April). Top 10 Spyware Threats. Retrieved September 12,
12. John Leyden. MySpace adware attack hits hard. (2006, July 21). Retrieved
[Link]
13. (n.d.). 3 Malware Prevention Tips. Retrieved September 12, 2018, from
[Link]
[Link]
15. Wade Roush. Three Arrested in Sony Rootkit Virus Case. (2006, June 27).
[Link]
virus-case/
16. (n.d.). Bella Martin. Types Of Rootkit Viruses - Preventive Measures. Retrieved
[Link]
17. (n.d.). Types of Adware: DeskAd. Retrieved September 12, 2018, from
[Link]
18. (n.d.). Types of Adware: WeatherBug. Retrieved September 12, 2018, from
[Link]
19. (n.d.). anandsafi. How Spyware infects your computer. Retrieved September 12,
infects-your-computer/
30
20. Ed Tiddel, Kari Finn. How to detect and remove a rootkit in Windows 10. (2017,
[Link]
[Link]
31