Week 02

You might also like

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 24

Cyber Security

Week 02

By: Tahir Sabtain Syed


Social Engineering Attacks

• Social engineering is a means of eliciting information


(gathering data) by relying on the weaknesses of individuals
• It is also used as influence campaigns to sway attention and
sympathy in a particular direction
• These campaigns can be found exclusively on social media
or may be combined with other sources
• Attackers use a variety of techniques to gain trust:
• Provide a reason
• Project confidence
• Make them laugh
Social Engineering Attacks
• Social engineering psychological approaches often involve:
• Impersonation: is masquerading as a real or fictitious character and then
playing the role of that person with a victim
• Phishing: is sending an email message or displaying a web announcement
that falsely claims to be from a legitimate enterprise in an attempt to trick
the user into surrender private information or taking action
• Variations on phishing attacks:
• Spear phishing
• Whaling
• Vishing
• Smishing
Social Engineering Attacks
• Social engineering psychological approaches often involve (cont)
• Redirection: is when an attacker directs a user to a fake lookalike site
filled with ads for which the attacker receives money for traffic generated
to the site.
• Another redirection technique is pharming: where the attacker attempts
to exploit how a URL is converted into its corresponding IP address.
• Spam: is unsolicited email that is sent to a large number of recipients
• Text-based spam: messages can be filtered
• Image spam cannot be filtered
• Spim: is spam delivered through instant messaging (IM) instead of email
Social Engineering Attacks
• Social engineering psychological approaches often involve
(continued):
• Hoaxes: are false warnings, often contained in an email
message claiming to come from the IT department
• The hoax purports that there is a “deadly virus” circulating
through the Internet and the recipient should erase specific
files or change security configurations
Social Engineering Attacks
• Physical Procedures
• Physical attacks take advantage of user actions that can result
in compromised security
• Three of the most common physical procedures are dumpster
diving, tailgating, and shoulder surfing
• Dumpster Diving: involves digging through trash to find
information that can be useful in an attack
• An electronic variation of physical dumpster diving is to use the
Google search engine to look for documents and data posted
online that can be used in an attack (called Google dorking)
Social Engineering Attacks
• Physical Procedures
• Tailgating: occurs when an authorized person opens an
entry door, one or more individuals can follow behind and
also enter
• Shoulder Surfing: allows an attacker to casually observe
someone entering secret information, such as the security
codes on a door keypad.
Attacks Using Malware

• Malicious software (malware)


• Enters a computer system:
• Without the owner’s knowledge or consent
• Refers to a wide variety of damaging or annoying
software
• Primary objectives of malware
• Infecting systems
• Concealing its purpose
• Making profit
Malware That Spreads

• Viruses
• Malicious computer code that reproduces itself on the
same computer
• Virus infection methods
• Appender infection
• Virus appends itself to end of a file
• Moves first three bytes of original file to virus code
• Replaces them with a jump instruction pointing to the
virus code

9
Malware That Spreads (cont’d.)

• Virus infection methods (cont’d.)


• Swiss cheese infection
• Viruses inject themselves into executable code
• Original code transferred and stored inside virus code
• Host code executes properly after the infection
• Split infection
• Virus splits into several parts
• Parts placed at random positions in host program
• Head of virus code starts at beginning of file
• Gives control to next piece of virus code

10
Malware That Spreads (cont’d.)

• Types of computer viruses


• Program
• Infects executable files
• Macro
• Executes a script
• Boot virus
• Infects the Master Boot Record
• Loads before the OS starts
• Memory Resident
• Loads into RAM when the computer boots up
• Infects files opened by user or operating system

11
Malware That Spreads (cont’d.)

• Worm
• Malicious program
• Exploits application or operating system vulnerability
• Sends copies of itself to other network devices
• Worms may:
• Consume resources or
• Leave behind a payload to harm infected systems
• Examples of worm actions
• Deleting computer files
• Allowing remote control of a computer by an attacker

12
Malware That Spreads (cont’d.)

Table 2-1 Difference between viruses and worms

13
Malware That Conceals

• Trojans
• Program that does something other than advertised
• Typically executable programs
• Contain hidden code that launches an attack
• Sometimes made to appear as data file
• Example
• User downloads “free calendar program”
• Program scans system for credit card numbers and
passwords
• Transmits information to attacker through network

14
Malware That Conceals (cont’d.)

• Logic bomb
• Computer code that lies dormant
• Triggered by a specific logical event
• Then performs malicious activities
• Difficult to detect before it is triggered
• Backdoor
• Software code that circumvents normal security to give
program access
• Common practice by developers

15
Malware That Profits

• Types of malware designed to profit attackers


• Botnets
• Spyware
• Adware
• Keyloggers

16
Malware That Profits (cont’d.)

• Botnets
• Computer is infected with program that allows it to be
remotely controlled by attacker
• Infected computer called a zombie
• Groups of zombie computers together called botnet
• Early botnet attackers used Internet Relay Chat to remotely
control zombies
• HTTP is often used today

17
Malware That Profits (cont’d.)

• Botnets’ advantages for attackers


• Operate in the background:
• Often with no visible evidence of existence
• Provide means for concealing actions of attacker
• Can remain active for years
• Large percentage of zombies are accessible at a given time
• Due to growth of always-on Internet services

18
Malware That Profits (cont’d.)

• Spyware
• Software that gathers information without user consent
• Usually used for:
• Advertising
• Collecting personal information
• Changing computer configurations

19
Malware That Profits (cont’d.)

• Spyware’s negative effects


• Slows computer performance
• Causes system instability
• May install new browser menus or toolbars
• May place new shortcuts
• May hijack home page
• Causes increased pop-ups

20
Malware That Profits (cont’d.)

• Adware
• Program that delivers advertising content:
• In manner unexpected and unwanted by the user
• Typically displays advertising banners and pop-up ads
• May open new browser windows randomly
• Can also perform tracking of online activities

21
Malware That Profits (cont’d.)

• Downsides of adware for users


• May display objectionable content
• Frequent pop-up ads cause lost productivity
• Pop-up ads slow computer or cause crashes
• Unwanted ads can cause inconvenience

22
Malware That Profits (cont’d.)

• Keyloggers
• Program that captures user’s keystrokes
• Information later retrieved by attacker
• Attacker searches for useful information
• Passwords
• Credit card numbers
• Personal information

23
Malware That Profits (cont’d.)

• Keyloggers (cont’d.)
• Can be a small hardware device
• Inserted between computer keyboard and connector
• Unlikely to be detected
• Attacker physically removes device to collect information

24

You might also like