View Full Document

Gone Rogue - An Analysis of Rogue Security Software Campaigns



View the full content.
View Full Document
View Full Document

15 views

Unformatted text preview:

Gone Rogue An Analysis of Rogue Security Software Campaigns Invited Paper Marco Cova Corrado Leita Olivier Thonnard Angelos Keromytis and Marc Dacier University of California Santa Barbara marco cs ucsb edu Symantec Research Labs Corrado Leita Angelos Keromytis Marc Dacier symantec com Royal Military Academy Belgium olivier thonnard rma ac be Abstract In the past few years Internet miscreants have developed a number of techniques to defraud and make a hefty profit out of their unsuspecting victims A troubling recent example of this trend is cybercriminals distributing rogue security software that is malicious programs that by pretending to be legitimate security tools e g anti virus or anti spyware deceive users into paying a substantial amount of money in exchange for little or no protection While the technical and economical aspects of rogue security software e g its distribution and monetization mechanisms are relatively well understood much less is known about the campaigns through which this type of malware is distributed that is what are the underlying techniques and coordinated efforts employed by cyber criminals to spread their malware In this paper we present the techniques we used to analyze rogue security software campaigns with an emphasis on the infrastructure employed in the campaign and the life cycle of the clients that they infect 1 Introduction A rogue security software program is a type of misleading application that pretends to be legitimate security software such as an anti virus scanner but which actually provides the user with little or no protection In some cases rogue security software in the following more compactly rogue AV actually facilitates the installation of the very malicious code that it purports to protect against Rogue AV makes its way on victim machines in two prevalent ways First social engineering techniques can be used to convince unexperienced users that a rogue tool is legitimate and that its use is necessary to remediate



Access the best Study Guides, Lecture Notes and Practice Exams

Loading Unlocking...
Login

Join to view Gone Rogue - An Analysis of Rogue Security Software Campaigns and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Gone Rogue - An Analysis of Rogue Security Software Campaigns and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?