Page 1467 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1467

absolutely sure it comes from a trusted source. In fact, many

               companies strictly prohibit the installation of any software not
               prescreened by the IT department. These policies serve to minimize
               the risk that an organization’s network will be compromised by a
               Trojan horse—a software program that appears benevolent but carries
               a malicious, behind-the-scenes payload that has the potential to wreak
               havoc on a system or network.

               Trojans differ very widely in functionality. Some will destroy all the

               data stored on a system in an attempt to cause a large amount of
               damage in as short a time frame as possible. Some are fairly
               innocuous. For example, a series of Trojans appeared on the internet
               in mid-2002 that claimed to provide PC users with the ability to run
               games designed for the Microsoft Xbox gaming system on their
               computers. When users ran the program, it simply didn’t work.
               However, it also inserted a value into the Windows Registry that
               caused a specific web page to open each time the computer booted.

               The Trojan creators hoped to cash in on the advertising revenue
               generated by the large number of page views their website received
               from the Xbox Trojan horses. Unfortunately for them, antivirus
               experts quickly discovered their true intentions, and the website was
               shut down.

               One category of Trojan that has recently made a significant impact on

               the security community is rogue antivirus software. This software
               tricks the user into installing it by claiming to be an antivirus package,
               often under the guise of a pop-up ad that mimics the look and feel of a
               security warning. Once the user installs the software, it either steals
               personal information or prompts the user for payment to “update” the
               rogue antivirus. The “update” simply disables the Trojan!

               Another variant, ransomware, is particularly insidious. Ransomware

               infects a target machine and then uses encryption technology to
               encrypt documents, spreadsheets, and other files stored on the system
               with a key known only to the malware creator. The user is then unable
               to access their files and receives an ominous pop-up message warning
               that the files will be permanently deleted unless a ransom is paid
               within a short period of time. The user then often pays this ransom to

               regain access to their files. One of the most famous ransomware
   1462   1463   1464   1465   1466   1467   1468   1469   1470   1471   1472