{"id":833,"date":"2014-06-19T18:38:55","date_gmt":"2014-06-19T18:38:55","guid":{"rendered":"http:\/\/blogs.secure-bits.com\/?p=833"},"modified":"2014-08-02T02:33:20","modified_gmt":"2014-08-02T02:33:20","slug":"how-malware-gets-on-the-system","status":"publish","type":"post","link":"https:\/\/blogs.secure-bits.com\/?p=833","title":{"rendered":"Malware and why you should be concerned&#8230;"},"content":{"rendered":"<p>Malware is any software\u00a0that disrupts computer operation, gathers sensitive information, or gains unauthorized access to private computer system. Once it gets a hold of your system, it will cause:<\/p>\n<ol>\n<li>Loss of productivity<\/li>\n<li>Embarrassment with customers<\/li>\n<li>Lost sales<\/li>\n<li>Lost data<\/li>\n<li>Substantial financial loss<\/li>\n<li>Frustration and loud swearing&#8230;<br \/>\n<a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/Angry.gif\"><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-1001\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/Angry.gif\" alt=\"Angry\" width=\"50\" height=\"46\" \/><\/a><\/li>\n<\/ol>\n<p>I\u2019ve been getting questions about how malware infects computers. That made me realize that there is some misunderstandings that the general public has in this area. Certainly lots of information available\u00a0via the web nowadays on this subject; however, most of the available information is intended for IT people and as such, this type of information requires a certain level of technical knowledge in the area of networks, computer systems, malware, etc. The available information is accurate, but most small business owners have limited time and\/or interest in reading through pages and pages of technical information, much less following some and\/or all suggested protection for computers.<\/p>\n<p>I cannot really blame small business owners for shying away from reading all the gibberish (to them), that\u2019s available about how to secure small business systems. Nonetheless, they must have some basic understanding of how malware can reach their business systems, in order to prevent getting malware on their computers. I\u2019ll try to use common terms and simple explanations; hopefully, this won\u2019t be that hard to follow\u2026<\/p>\n<p>The malware can reach a computer, laptop, tablet, smartphone in four different venues:<\/p>\n<ol>\n<li><span style=\"color: #ff0000;\">Internet access, wired and wireless<\/span><\/li>\n<li><span style=\"color: #ff0000;\">Internet browser<\/span><\/li>\n<li><span style=\"color: #ff0000;\">Email clients, in the form of attachment and\/or links<\/span><\/li>\n<li><span style=\"color: #ff0000;\">Removable storage media, such as CD\/DVD, flash drive, etc.<\/span><\/li>\n<\/ol>\n<p>Statistically, 90% of malware reaches the IT equipment over the network while the remaining 10% is attributed to removable storage media. The typical unsecured setup, wired and\/or wireless, for internet access would look like this:<\/p>\n<div id=\"attachment_855\" style=\"width: 575px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/nofw.jpg\"><img aria-describedby=\"caption-attachment-855\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-855\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/nofw.jpg\" alt=\"Missing image...\" width=\"565\" height=\"438\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/nofw.jpg 565w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/nofw-386x300.jpg 386w\" sizes=\"(max-width: 565px) 100vw, 565px\" \/><\/a><p id=\"caption-attachment-855\" class=\"wp-caption-text\">Unsecured small business\/home system<\/p><\/div>\n<p>Why is that important to understand this process? Well, knowing how your business systems may become victimized by malware will help you to prevent it. If knowing this information will simply make you more aware of how to use your small business system, that\u2019s great.<\/p>\n<p>The actual goal of this blog post is to assist in transitioning you from your current set up to a secure business system that looks like this:<\/p>\n<div id=\"attachment_878\" style=\"width: 630px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/fw1.jpg\"><img aria-describedby=\"caption-attachment-878\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-878\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/fw1.jpg\" alt=\"Secure system\" width=\"620\" height=\"438\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/fw1.jpg 620w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/fw1-424x300.jpg 424w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><p id=\"caption-attachment-878\" class=\"wp-caption-text\">Secured small business\/home system<\/p><\/div>\n<p>The end result has accounted for all four potential weaknesses and removed and\/or limited the impact of malware through these venues. Let\u2019s take it step by step on how to eliminate and\/or limit the way malware can reach the system.<\/p>\n<p><strong>1. Internet access, wired and wireless<\/strong><\/p>\n<p>Computer worms and automated scripts for hackers constantly scan the Internet for available services and exploit them automatically, if and when the vulnerable service is identified. For this reason, you should make sure that your computer or network is not open to this type of exploitation from the internet.<\/p>\n<p>Adding a hardware-based broadband router and\/or firewall remove the first major venue off the list. The cost for something of that nature would be around a hundred bucks. Something this simple can eliminate up to 10% of online risks through the Internet. The default factory configuration of the broadband routers blocks all Internet access to your system, in another word, just by installing one made your computers 10% more secure. Go ahead and test your computer at <a title=\"ShieldsUP!\" href=\"https:\/\/www.grc.com\/x\/ne.dll?bh0bkyd2\">ShieldsUP!<\/a> and confirm if your computer is at risk after you installed the broadband router. ShieldsUp! will scan your computer for available services at no cost. The result of this test should look like this:<\/p>\n<div id=\"attachment_841\" style=\"width: 724px\" class=\"wp-caption aligncenter\"><a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/stealth.jpg\"><img aria-describedby=\"caption-attachment-841\" decoding=\"async\" loading=\"lazy\" class=\"size-full wp-image-841\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/stealth.jpg\" alt=\"stealth\" width=\"714\" height=\"190\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/stealth.jpg 714w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/stealth-500x133.jpg 500w\" sizes=\"(max-width: 714px) 100vw, 714px\" \/><\/a><p id=\"caption-attachment-841\" class=\"wp-caption-text\">Stealth<\/p><\/div>\n<blockquote><p><span style=\"color: #008000;\">Please keep in mind that the portable devices, laptops, tablets, etc., require a software based firewall, if and when connected to networks, that are not under your control.<\/span><\/p><\/blockquote>\n<p>If your system scan does not show the same result, adjust the firewall rules to match the result and\/or contact me to do it for you.<\/p>\n<p>Let&#8217;s move to the next venues to protect your system from&#8230;<\/p>\n<p><strong>2. Internet browser, 3. Email clients, and 4. Removable media<\/strong><\/p>\n<p>Protection against\u00a0#2, #3, and #4 venues are principally the same:<\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline;\"><strong>2.1\u00a0 Do not use an administrator account for everyday tasks, such as browsing the web and reading emails.<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\">I do understand and somewhat agree that running your computer with an administrator account does make life easier, especially when the User Access Control or UAC warning disabled, but consider this. If you do that, you\u2019ve just made the hackers\/malware life real easy. When you\u2019ve logged on to your computer with an administrative account, any programs that you\u2019ll run will be running under this access rights. And that\u2019s any program, even the ones that you\u2019re not aware that is running in the background such as malware. Do you see just how easy you made it for the hackers? He or she does not need to find a way to gain access to the administrative account; you\u2019ve already given it to them.<\/p>\n<p style=\"padding-left: 30px;\">The administrator account can also disable the antivirus solution to prevent protecting against the malware. You really should remove the administrator account access from your account that had been created when Windows was installed. <strong><strong>Proceed with caution and don\u2019t lock yourself out of your system. <\/strong><\/strong>Create and administrator account first with a reasonable password for the purpose, name it whatever you want, log in with this account to test it first. Once the new account had been tested successfully, proceed to remove the administrative access for the account that you\u2019ve been using. This step-by-step guidance, titled <a title=\"Change account type\" href=\"http:\/\/blogs.secure-bits.com\/?p=936\" target=\"_blank\">&#8220;How to change user account type in Windows\u2026&#8221;<\/a> can assist you performing this task.<\/p>\n<p style=\"padding-left: 30px;\">If your program(s) require administrative level of access, you should consider replacing them. If that\u2019s not an option, you\u2019ll need to run the program via the \u201cRun as&#8230;\u201d option, that\u2019ll grant administrative access just for the program in question and not the whole system. Alternatively, if you have the UAC enabled, Windows since Vista and later will popup a window for entering administrative credentials, if and when the program requires this access level\/right.<\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline;\"><strong>2.2 Use caution in browsing the web and reading emails<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\">This is how the majority of malware gets on your computer, about 80% of them. Both the browser and email based malware utilizes social engineering to convince the end user that they must perform some action. End users usually need to click on a link that downloads the malware and installs it. The convincing part can be as simple as offering nude picks of celebrities, or links to your financial institution sites, law enforcement warning, etc.<\/p>\n<p style=\"padding-left: 30px;\">For social engineering sample and how to be cautious in reading emails, please see <a title=\"Spearphishing\" href=\"http:\/\/blogs.secure-bits.com\/?p=127\" target=\"_blank\"><em>this link<\/em><\/a><\/p>\n<p style=\"padding-left: 30px;\">Internet browsing on the other hand is a different story due to how the browsers work. All web pages are just scripts for browsers and they are executed under the logged on user\u2019s access rights to the system. Browsing the web with an account that have administrative access to computer is asking for trouble, as explained above in \u201ca.\u201d. So, what can you do, other than not browsing the Internet logged on with an administrator account?<\/p>\n<p style=\"padding-left: 30px;\">Common sense will protect you in most cases. Certainly, staying away from \u201cshady websites\u201d such as porno, pirated software, MP3 download, and similar sites, will avoid getting malware on your computer. It would nice that this avoidance would secure you from malware, but that\u2019s not always the case. Hackers are smart and know that most people intentionally do not go to these shady sites. As such, they hack legitimate websites and place either their malware and\/or link to their malware at these sites. This is called \u201cwatering hole\u201d based attack, where the end users don\u2019t suspect that the legitimate sites will install malware on their systems. The legitimate sites that had fallen for this type of malware distribution and they still do. CNN and Facebook are probably the most commonly used websites that had fallen to this malware distribution. Protecting against watering hole based malware is covered in \u201c2.3.\u201d below.<\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline;\"><strong>2.3 Keep the operating system and applications updated<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\">Most, if not all malware takes a hold of your computer by exploiting known software vulnerability. Software companies do release updates to remove this vulnerability and you should install it as soon as they become available, be that for the Windows operating system and\/or applications installed on your computer. Nowadays, most software has an automatic update feature that will download and install the updates automatically. You should not disable the automatic updates, let them update in timely manner, as they should, to prevent known vulnerabilities of the software to be used against your computer.<\/p>\n<p style=\"padding-left: 30px;\">Don\u2019t just trust the automatic update that it\u2019ll do its job, sometimes they don\u2019t. Since the majority of the malware reaches your computer through the browser, you should periodically test the security of the browser and its plugins at this link, a plugin installation required:<\/p>\n<p style=\"padding-left: 30px;\"><a title=\"Qualys\" href=\"https:\/\/browsercheck.qualys.com\/\" target=\"_blank\">https:\/\/browsercheck.qualys.com\/<\/a><\/p>\n<p style=\"padding-left: 30px;\">The Qualys plugin will scan your system for missing patches that includes browser, operating system and applications. The results displayed in your browser with links to the updates. Here&#8217;s the results for my system:<\/p>\n<p>Browser:<br \/>\n<a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/browser.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-medium wp-image-895\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/browser-900x733.png\" alt=\"browser\" width=\"900\" height=\"733\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/browser-900x733.png 900w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/browser-368x300.png 368w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/browser.png 1406w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p>System:<br \/>\n<a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/system.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-medium wp-image-896\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/system-900x560.png\" alt=\"Operating system result\" width=\"900\" height=\"560\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/system-900x560.png 900w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/system-481x300.png 481w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/system.png 1438w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p>Applications:<br \/>\n<a href=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/applications.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-medium wp-image-897\" src=\"http:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/applications-900x747.png\" alt=\"Application results\" width=\"900\" height=\"747\" srcset=\"https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/applications-900x747.png 900w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/applications-361x300.png 361w, https:\/\/blogs.secure-bits.com\/wp-content\/uploads\/2014\/06\/applications.png 1440w\" sizes=\"(max-width: 900px) 100vw, 900px\" \/><\/a><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"color: #008000;\"><em>The computer missing updates is vulnerable to exploits, be that Windows PC or in this case an Apple computer. The latter one may not have as many malware as the former one, but nonetheless, it can be exploited just as well as Windows PCs if and when it&#8217;s missing updates.<\/em><\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline;\"><strong>2.4 Purchase and install antivirus product (approximated $50-80), update definition files frequently<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\">This does not require much explanation, I hope. As long as you don\u2019t use an administrative account for everyday tasks, it\u2019s a worthwhile investment. You could also forgo purchasing an antivirus software and use Windows Defender, if you have Windows Vista or later version. The Defender is free with the operating system and provides protection against malware.\u00a0The Defender\u00a0and other antivirus effectiveness is greatly increased, if you follow the security recommendation in this blog.<\/p>\n<p style=\"padding-left: 30px;\"><span style=\"text-decoration: underline;\"><strong>2.5 Removable storage media<\/strong><\/span><\/p>\n<p style=\"padding-left: 30px;\">Generally speaking, most of the malware on removable media is rather old. An up to date antivirus will stop older malware from infecting your computers. Nonetheless, you should:<\/p>\n<p style=\"padding-left: 60px;\">a. <span style=\"text-decoration: underline;\">Disable &#8220;AutoPlay&#8221; for removable storage media:<\/span><\/p>\n<p style=\"padding-left: 90px;\">In the &#8220;Control Panel&#8221; select &#8220;Hardware and Sounds&#8221;,\u00a0click on &#8220;AutoPlay&#8221; icon, and select &#8220;Take no action&#8221; for software and games at the minimum.<\/p>\n<p style=\"padding-left: 60px;\">b. <span style=\"text-decoration: underline;\">Scan the removable media:<\/span><\/p>\n<p style=\"padding-left: 90px;\">Your antivirus software by default will ask you, if you want to scan the removable storage media, just say yes&#8230;<\/p>\n<p>Following these recommendations will protect you against most known vulnerabilities, about 95% and so far, it costs you about 175 bucks, some time to install, and configure the components.<\/p>\n<p>So, what about the remaining 5%, how does one protect the system against that?<\/p>\n<p>There are other options that can increase protection of the system with additional software. Knowing that sophisticated malware, among other malware, utilizes buffer overflow technics; you need a solution that will protect against this technology. One such software is <a title=\"EMET\" href=\"http:\/\/technet.microsoft.com\/en-us\/security\/jj653751\" target=\"_blank\">Microsoft Enhanced Mitigation Experience Toolkit<\/a>, or EMET for short. This protection is free from Microsoft and easy to configure and just by selecting the default option during installation, it will protect your system against most of the malware relying on buffer overflow technics.<\/p>\n<p>You can also download and install <a title=\"Winpatrol\" href=\"http:\/\/www.winpatrol.com\/download.html\" target=\"_blank\">Winpatrol \u2013 Scotty<\/a> for free, which will monitor changes to Windows startup environment. All malware will change this environment and Winpatrol will alert you, if and when the startup environment is about to change. You\u2019ll have the option to deny or allow the change.<\/p>\n<p>With the additional protection installed, your system is protected against 99.9% of malware, provided that you have done and remain committed to following the steps in this blog post. That\u2019s not bad for 175 bucks and some of your time invested. This is pretty much the best that someone, who is not an IT professional can do in today\u2019s environment. Corporations spend millions of dollars, thousands of hours on installation and training, yet they are struggling to get to this level of protection.<\/p>\n<p>If you have gotten this far, that&#8217;s great. You&#8217;re on your way to have a home\/small business system, that will resist most, if not all malware trying to exploit your systems.<\/p>\n<p>This seems complicated, but if you break it down and do one step at the time, apply some patience, it can be done by most computer users. If you run into trouble you can always re-read part of my blog, or contact me for help.<\/p>\n<p>Alternatively, if you are short on time, you should hire <a title=\"BITS\" href=\"http:\/\/www.secure-bits.com\/\" target=\"_blank\">BITS<\/a> to do it for you. Contact\u00a0Otto via <a href=\"mailto:ottoo@secure-bits.com\">email<\/a>, or call the office at 203.569.7610. Based on your business needs dictated operational requirements, we can tailor a security protection for you.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware is any software\u00a0that disrupts computer operation, gathers sensitive information, or gains unauthorized access to private computer system. Once it gets a hold of your system, it will cause: Loss of productivity Embarrassment with customers Lost sales Lost data Substantial &hellip; <a href=\"https:\/\/blogs.secure-bits.com\/?p=833\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[25,24,32],"tags":[],"_links":{"self":[{"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/posts\/833"}],"collection":[{"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=833"}],"version-history":[{"count":57,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions"}],"predecessor-version":[{"id":1009,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=\/wp\/v2\/posts\/833\/revisions\/1009"}],"wp:attachment":[{"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.secure-bits.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}