Time
3 hours 35 minutes
Difficulty
Intermediate
CEU/CPE
4

Video Transcription

00:00
Hello and welcome to P C Security Intermediate course.
00:04
And this lesson. I will continue talking about
00:08
some of the deck collectors that are used when people are attacking PC's. So you have heard in the previous lesson about fishing and how phishing mail can contain linked to militias pages. So
00:28
in the email clients, you can disable HTML reading so that you view your emails in just them
00:39
a plain text format, which prevents the malicious code that is inserted in the body of the email message to be executed. However, when you're browsing the Internet, everything is HTML and you cannot disable it. So
00:56
you have seen in green the list
00:59
off. Just a small portion of the list of direct recording and documented documented the malicious sites.
01:07
Um, and you have to just go to any of these sides to infect your PC. That's it.
01:14
Um,
01:15
if you are asking yourself, why cannot these sites be taken off the Internet? Well, it's a complicated thing, and nobody is bothering because they will just pop up under another name.
01:27
So
01:29
and it's ah, it's not happening. We just have to live with it and avoid thes addresses.
01:38
So the next tech, the tech director is to programs because programs can contain malware. So if you're using a legitimate program to install viewfin installing legitimate program, for example, like Microsoft Office Package on your PC, there is a fair
01:56
chance that it's not infected by any Mauer.
01:59
At least it has never happened before. However, if you download the installation from
02:06
online by using Torrent client,
02:07
then there is no guarantee that what you're downloading is not infected. And as a matter of fact, my personal experience tells me that
02:15
maybe more than 1/3 off everything, all the content that is being diluted by Tauron clients is
02:24
infected with something. If nothing else, then maybe some
02:30
simple adware or something like that.
02:34
So
02:35
the second way that you can get infected software or program on your PC is through updates off legitimate, softer that sits on that store so you can have ah application that sits on a appstore.
02:47
And if it's an app, store off the manufacturer operating system like play store or
02:55
Apple store or
02:59
whatever, uh, this dissed or a is the programs there have been checked and double checked by the owner of the store, so there
03:12
very likely. Okay.
03:14
However, sometimes the update off that software is not going through the process of being wetted by the owner of the store. And unlike the installation of Softer in which you go to the store and the world content, the
03:32
update is being done
03:35
by your PC connecting directly to the
03:38
owner off the software,
03:42
and in that case it can be
03:44
compromised. It can be intentionally compromised. And we had cases in the past that this waas something that was happening, but mostly for mobile phones. But today you can. You
04:00
you can find these things happening even when it's not intentional. So somebody has managed to
04:05
compromise the company that is making the softer and insert some kind of malware in their updates.
04:14
You know, many ways to do it in one of the example is something that is called supplying chain attack,
04:19
and the most famous one is non petty attack that happened in Ukraine
04:25
a few years ago.
04:26
Basically, the hacking group that did this attack infiltrated the company that was making accounting software for that was used by most of government agencies in Ukraine,
04:41
and they have managed to insert non PETA Moloch wear in them.
04:47
The update of the softer and because everybody and this is this was also government owned company. So everybody had the full trust in what's coming from them.
05:00
They didn't have that
05:01
good security. So these people managed to infiltrate, Insert the Melber,
05:06
and the aftermath was that more than 60,000 PC's were infected and virtually rendered useless within a little bit over two hours, so the entire network went down. It even managed to spread outside the government sector in Ukraine and hid some
05:27
companies in other countries that we're doing business with these
05:30
entities in your crane.
05:34
So this is about programs. And now let's talk about the operating systems by themselves.
05:42
So we have been witness in years before
05:46
or or a couple of firm. That's a last 10 years that there have been flow after flow security flow in all off operating systems that are used today on PC. So both in Windows both in Mac OS X, A built Lennox,
06:02
and you can go online and find these lists, and they're huge. In just one year, there is always over 10 or 20
06:10
on the security flaws But does it mean it means that if somebody has managed to exploit security floor that that security flow before operating system manufacturer has managed to patch it with the operating system update, then they can use it to
06:29
attack your PC's.
06:30
And these things were happening on a daily basis, the floors of being discovered there being patched. But it's a game of cat and mouse, essentially.
06:40
And the reason
06:41
behind this is because first of all, operating systems today are extremely complex. Their list of requirements that is posed upon them in order to do good for the users is huge.
06:57
And, of course, Ah, nobody is developing new versions operating system saying Okay, first of all, let's see
07:03
is the secure and then implemented. No marketing department goes to the users. They do the survey, they say, Okay, we need these futures, and then programmers get the task off developing these features. And then in the end, it's checked for security, but
07:24
sometimes always
07:25
gets true.
07:28
So this is all about the tax collectors on the the pieces.
07:31
The last was about these exploits of the operating system, and now let's do a short landing check about this lesson, The question is, was technique is used to hide malware in J pic files and potential answers is morphing, compiling or steganography, and the correct answer is
07:54
steganography.
07:56
Compiling and morphing have nothing to do with hiding
08:00
malware and pictures.
08:03
So in this lesson you have learned about some of the attack collectors on PCs, and in the next one, I'm going to do a short review or what are actually the goals off PC security
08:16
Speak.

Up Next

Intermediate PC Security

The Intermediate PC Security course will teach students about endpoint protection. Students will learn fundamental information about PC Security and common attack vectors.

Instructed By

Instructor Profile Image
Milan Cetic
IT Security Consultant
Instructor