Professional Documents
Culture Documents
INFECTED!
Zhen Wei
Hamzah
Jerolyn
Siti
Jun Hao
• ROBOT + NETWORK = BOTNET
BOTNET
• Distribute malicious software that can turn your computer into a
bot
OSX/DevilRobber (Backdoor):
• A silently installed applications related
to Bitcoin-mining
VirusProfile:Skintrim.gen.f!88147B8A80D7 (Trojan):
• Spread manually, often under the premise that
they are beneficial or wanted
Solution:
• Download free anti malware programs. E.G (Malwarebytes)
• Run the software
• Identify the adware
• It will prompt user to remove the adware accordingly
Prevention:
• Be selective about what you download to your computer
• Read licensing agreements
• Watch out for anti-spyware scams
• Beware of clickable advertisements
Problem: Email 08
• One of shared folders named “Customer
Information” was maliciously deleted
• Major inconvenience caused
• Missing folder’s and files that contains client’s data
was manually restored
• No other departments have access to this folder
• One engineer that was terminated 1 month ago was
the suspect of the problem
• Logical explanation needed as they want to pursue
legal action against the suspect
• Reported By an angry Sales Director, Timothy Wood
Email 08
Possible Infection: Logic Bomb
Ways to use:
Embed code within a fake application, or Trojan horse
will be executed whenever you launch the fraudulent software.
Solution:
• Install malware removal tool to remove all possible malware threats in the computer
Prevention:
• Create a trigger in database so that any amendment to the system can be track and
remove on time if proven dangerous.
• Limit the staff from downloading or inserting new software/code into system without
authorization from higher up.
• Installed a anti-virus and anti-malware so that it can detect and remove virus/malware
before it can cause harm to the system.
References
• http://www.microsoft.com/security/pc-security/botnet.aspx
• http://us.norton.com/catch-spyware-before/article
• Problem 2 worksheet