Cisco Module 2: Attacks, Concepts, and Techniques

Ace your homework & exams now with Quizwiz!

Symptoms of Malware

-an increase in central processing unit (CPU) usage, which slows down your device your computer freezing or crashing often -a decrease in your web browsing speed -unexplainable problems with your network connections -modified or deleted files -the presence of unknown files, programs or desktop icons -unknown processes running -programs turning off or reconfiguring themselves -emails being sent without your knowledge or consent.

You think back to some of the suspicious activities that you've seen recently in the organization. Based on what you have learned in this topic, what type of attack could each of these scenarios be? 1. On your way into the office, a person whom you have never seen before asks you to hold the door — they forgot their access card 2. You have started getting an error message when accessing your computer: 'Your connection was interrupted. A network change was detected.' 3. You searched for @Apollo's website on Google, but when you clicked on the top result, you were redirected to a page advertising antivirus software

1. Social engineering 2. DoS 3.SEO poisoning

Match each of the descriptions to the correct malware type by selecting an answer 1.Malware designed to track your online activity and capture your data 2.Software that automatically delivers advertisements 3.Malware that holds a computer system captive until a payment is made to the attacker 4.Malicious code that attaches to legitimate programs and usually spreads by USB drives, optical media, network shares or email 5.Malicious code that replicates itself independently by exploiting vulnerabilities in networks

1. Spyware 2.Adware 3.Ransomware 4.Virus 5.Worms

Types of Malware Cybercriminals use many different types of malicious software, or malware, to carry out their activities. Malware is any code that can be used to steal data, bypass access controls, or cause harm to or compromise a system. Knowing what the different types are and how they spread is key to containing and removing them.

1. Spyware: Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. Spyware does this by modifying the security settings on your devices. It often bundles itself with legitimate software or Trojan horses. 2. Adware: Adware is often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It's hard to ignore when you're faced with constant pop-up ads on your screen. It is common for adware to come with spyware. 3.Backdoor: This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands. A backdoor works in the background and is difficult to detect. 4.Ransomeware: This malware is designed to hold a computer system or the data it contains captive until a payment is made. Ransomware usually works by encrypting your data so that you can't access it. Some versions of ransomware can take advantage of specific system vulnerabilities to lock it down. Ransomware is often spread through phishing emails that encourage you to download a malicious attachment or through a software vulnerability. 5.Scareware: This is a type of malware that uses 'scare' tactics to trick you into taking a specific action. Scareware mainly consists of operating system style windows that pop up to warn you that your system is at risk and needs to run a specific program for it to return to normal operation. 6.Rootkit:This malware is designed to modify the operating system to create a backdoor, which attackers can then use to access your computer remotely. Most rootkits take advantage of software vulnerabilities to gain access to resources that normally shouldn't be accessible (privilege escalation) and modify system files. Rootkits can also modify system forensics and monitoring tools, making them very hard to detect. In most cases, a computer infected by a rootkit has to be wiped and any required software reinstalled. 7.Virus: when executed, replicates and attaches itself to other executable files, such as a document, by inserting its own code. Most viruses require end-user interaction to initiate activation and can be written to act on a specific date or time. Viruses can also be programmed to mutate in order to avoid detection. Most viruses are spread by USB drives, optical disks, network shares or email. 8.Trojan Horse:This malware carries out malicious operations by masking its true intent. It might appear legitimate but is, in fact, very dangerous. Trojans exploit your user privileges and are most often found in image files, audio files or games. Unlike viruses, Trojans do not self-replicate but act as a decoy to sneak malicious software past unsuspecting users. 9.Worms: This is a type of malware that replicates itself in order to spread from one computer to another. Unlike a virus, which requires a host program to run, worms can run by themselves. Other than the initial infection of the host, they do not require user participation and can spread very quickly over the network. Worms share similar patterns: They exploit system vulnerabilities, they have a way to propagate themselves, and they all contain malicious code (payload) to cause damage to computer systems or networks.

Can you identify what category each of these vulnerabilities falls into? 1. On starting at @Apollo, your network password was emailed to you in plain text and you were not prompted to change it 2.Past employees still have access to @Apollo's customer database 3.New users can log into their @Apollo account, even if they have signed up with an incorrectly formatted email address

1. Weakness in security practice 2. Access control problem 3.Non-validated input

Botnet

A bot computer is typically infected by visiting an unsafe website or opening an infected email attachment or infected media file. A botnet is a group of bots, connected through the Internet, that can be controlled by a malicious individual or group. It can have tens of thousands, or even hundreds of thousands, of bots that are typically controlled through a command and control server. These bots can be activated to distribute malware, launch DDoS attacks, distribute spam email, or execute brute-force password attacks. Cybercriminals will often rent out botnets to third parties for nefarious purposes.

dictionary attack

A hacker systematically tries every word in a dictionary or a list of commonly used words as a password in an attempt to break into a password-protected account.

Maliciously formatted packets

A packet is a collection of data that flows between a source and a receiver computer or application over a network, such as the Internet. When a maliciously formatted packet is sent, the receiver will be unable to handle it. For example, if an attacker forwards packets containing errors or improperly formatted packets that cannot be identified by an application, this will cause the receiving device to run very slowly or crash.

exploit

A program written to take advantage of a known vulnerability A cybercriminal can use an exploit against a vulnerability to carry out an attack, the goal of which is to gain access to a system, the data it hosts or a specific resource.

Access control problem

Access control is the process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file. Many security vulnerabilities are created by the improper use of access controls. Nearly all access controls and security practices can be overcome if an attacker has physical access to target equipment. For example, no matter the permission settings on a file, a hacker can bypass the operating system and read the data directly off the disk. Therefore, to protect the machine and the data it contains, physical access must be restricted, and encryption techniques must be used to protect data from being stolen or corrupted.

Cryptojacking

An emerging threat that hides on a user's computer, mobile phone, tablet, laptop or server, using that machine's resources to 'mine' cryptocurrencies without the user's consent or knowledge.

Advanced Persistent Threats

Attackers also achieve infiltration through advanced persistent threats (APTs) — a multi-phase, long term, stealthy and advanced operation against a specific target. For these reasons, an individual attacker often lacks the skill set, resources or persistence to perform APTs. APT is usually well-funded and typically targets organizations or nations for business or political reasons. Its main purpose is to deploy customized malware on one or more of the target's systems and remain there undetected.

You're enjoying your lunch in the canteen when a colleague approaches you. They seem distressed. They explain that they can't seem to connect to the public Wi-Fi on their phone and ask if you have the private Wi-Fi password to hand so that they can check that their phone is working. How would you respond? A."Yes, of course. Give me your phone and I'll put it in for you." B."Mmm... I'm not sure we're allowed to use the private Wi-Fi network. Let me check with my manager first." C."Sure. It's Xgff76dB."

B

Buffer overflow (software vulnerability)

Buffers are memory areas allocated to an application. A vulnerability occurs when data is written beyond the limits of a buffer. By changing data beyond the boundaries of a buffer, the application can access memory allocated to other processes. This can lead to a system crash or data compromise, or provide escalation of privileges.

how cryptocurrency transactions work?

Cryptocurrency owners keep their money in encrypted, virtual 'wallets.' When a transaction takes place between the owners of two digital wallets, the details are recorded in a decentralized, electronic ledger or blockchain system. This means it is carried out with a degree of anonymity and is self-managed, with no interference from third parties such as central banks or government entities. Approximately every ten minutes, special computers collect data about the latest cryptocurrency transactions, turning them into mathematical puzzles to maintain confidentiality. These transactions are then verified through a technical and highly complex process known as 'mining.' This step typically involves an army of 'miners' working on high-end PCs to solve mathematical puzzles and authenticate transactions. Once verified, the ledger is updated and electronically copied and disseminated worldwide to anyone belonging to the blockchain network, effectively completing a transaction.

Cryptocurrency

Digital money that can be used to buy goods and services, using strong encryption techniques to secure online transactions. Banks, governments and even companies like Microsoft and AT&T are very aware of its importance and are jumping on the cryptocurrency bandwagon!

Password attacks

Entering a username and password is one of the most popular forms of authenticating to a web site. Therefore, uncovering your password is an easy way for cybercriminals to gain access to your most valuable information.

hardware vulnerabilities

Most often the result of hardware design flaws. For example, the type of memory called RAM basically consists of lots of capacitors (a component which can hold an electrical charge) installed very close to one another. However, it was soon discovered that, due to their close proximity, changes applied to one of these capacitors could influence neighbor capacitors. Based on this design flaw, an exploit called Rowhammer was created. By repeatedly accessing (hammering) a row of memory, the Rowhammer exploit triggers electrical interferences that eventually corrupt the data stored inside the RAM.

Rainbow Attack

Passwords in a computer system are not stored as plain text, but as hashed values (numerical values that uniquely identify data). A rainbow table is a large dictionary of precomputed hashes and the passwords from which they were calculated. Unlike a brute-force attack that has to calculate each hash, a rainbow attack compares the hash of a password with those stored in the rainbow table. When an attacker finds a match, they identify the password used to create the hash.

Traffic interception

Plain text or unencrypted passwords can be easily read by other humans and machines by intercepting communications. If you store a password in clear, readable text, anyone who has access to your account or device, whether authorized or unauthorized, can read it.

Non-validated input (software vulnerability)

Programs often require data input, but this incoming data could have malicious content, designed to force the program to behave in an unintended way. For example, consider a program that receives an image for processing. A malicious user could craft an image file with invalid image dimensions. The maliciously crafted dimensions could force the program to allocate buffers of incorrect and unexpected sizes.

weaknesses in security practices

Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.

Software updates

The goal of software updates is to stay current and avoid exploitation of vulnerabilities. Microsoft, Apple and other operating system producers release patches and updates almost every day and applications such as web browsers, mobile apps and web servers are often updated by the companies or organizations responsible for them

Social Enineering

The manipulation of people into performing actions or divulging confidential information. Social engineers often rely on people's willingness to be helpful, but they also prey on their weaknesses. For example, an attacker will call an authorized employee with an urgent problem that requires immediate network access and appeal to the employee's vanity or greed or invoke authority by using name-dropping techniques in order to gain this access.

brute-force attack

The simplest and most commonly used way of gaining access to a password-protected site, brute-force attacks see an attacker using all possible combinations of letters, numbers and symbols in the password space until they get it right.

Overwhelming quantity of traffic

This is when a network, host or application is sent an enormous amount of data at a rate which it cannot handle. This causes a slowdown in transmission or response, or the device or service to crash.

Pretexting

This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data. For example, pretending to need a person's personal or financial data in order to confirm their identity.

Password spraying

This technique attempts to gain access to a system by 'spraying' a few commonly used passwords across a large number of accounts. For example, a cybercriminal uses 'Password123' with many usernames before trying again with a second commonly-used password, such as 'qwerty.' This technique allows the perpetrator to remain undetected as they avoid frequent account lockouts.

race conditions

This vulnerability describes a situation where the output of an event depends on ordered or timed outputs. A race condition becomes a source of vulnerability when the required ordered or timed events do not occur in the correct order or at the proper time.

man-in-the-mobile (MitMO)

Used to take control over a user's mobile device. When infected, the mobile device is instructed to exfiltrate user-sensitive information and send it to the attackers. ZeuS is one example of a malware package with MitMo capabilities. It allows attackers to quietly capture two-step verification SMS messages that are sent to users.

SEO Poisoning

While many legitimate companies specialize in optimizing websites to better position them, attackers take advantage of popular search terms and use SEO to push malicious sites higher up the ranks of search results. This technique is called SEO poisoning. The most common goal of SEO poisoning is to increase traffic to malicious sites that may host malware or attempt social engineering.

Denial-of-Service

a type of network attack that is relatively simple to carry out, even by an unskilled attacker. A DoS attack results in some sort of interruption of network service to users, devices or applications. DoS attacks are considered a major risk because they can easily interrupt communication and cause significant loss of time and money.

Security vulnerabilities

any kind of software or hardware defect.

Tailgating

attacker quickly follows an authorized person into a secure, physical location.

Something for something (quid pro quo)

attacker requests personal information from a person in exchange for something, like a free gift.

On-path

attackers intercept or modify communications between two devices, such as a web browser and a web server, either to collect information from or to impersonate one of the devices. Known as man-in-the-middle or man-in-the-mobile attack.

Man-in-the-middle (MITM) attack

happens when a cybercriminal takes control of a device without the user's knowledge. With this level of access, an attacker can intercept and capture user information before it is sent to its intended destination. These types of attacks are often used to steal financial information. There are many types of malware that possess MitM attack capabilities.

software vulnerabilities

introduced by errors in the operating system or application code

Distributed DoS (DDoS)

similar to a DoS attack but originates from multiple, coordinated sources. For example: An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems. The zombie computers will constantly scan and infect more hosts, creating more and more zombies. When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.


Related study sets

Chapter 2, Module 3: Sections 2.05-2.07

View Set

Drivers ed (quizzes and crossword)

View Set

MKTG320 Chapter 9, Chapter 12, Chapter 11, Chapter 16, Chapter 14, Chapter 10

View Set

Chapter 31 EMT Orthopedic Injuries Q&A II

View Set

Unit 10 Study Guide - 𝕗𝕦𝕔𝕜 𝕓𝕚𝕥𝕔𝕙𝕖𝕤 𝕘𝕖𝕥 𝕞𝕠𝕟𝕖𝕪

View Set