Threat Events: Software Attacks (cont.)



Similar documents
Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 2 Systems Threats and Risks

Ethical Hacking Course Layout

Own your LAN with Arp Poison Routing

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

Network Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Threats and Attacks. Modifications by Prof. Dong Xuan and Adam C. Champion. Principles of Information Security, 5th Edition 1

How to stay safe online

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

BE SAFE ONLINE: Lesson Plan

Cain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Chapter 11 Manage Computing Securely, Safely and Ethically. Discovering Computers Your Interactive Guide to the Digital World

Detailed Description about course module wise:

Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May TrustInAds.org. Keeping people safe from bad online ads

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS

Stopping zombies, botnets and other - and web-borne threats

Operation Liberpy : Keyloggers and information theft in Latin America

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Course Content: Session 1. Ethics & Hacking

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Module 5: Analytical Writing

White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks

Skoot Secure File Transfer

When you listen to the news, you hear about many different forms of computer infection(s). The most common are:

Network Security: Introduction

Countermeasures against Bots

The Key to Secure Online Financial Transactions

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Overview of computer and communications security

CYBERTRON NETWORK SOLUTIONS

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Security A to Z the most important terms

Malware & Botnets. Botnets

User Guide for the Identity Shield

COSC 472 Network Security

WEB ATTACKS AND COUNTERMEASURES

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

BOTNETS. Douwe Leguit, Manager Knowledge Center GOVCERT.NL

Spyware. Summary. Overview of Spyware. Who Is Spying?

isheriff CLOUD SECURITY

Network Security and the Small Business

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

CS5008: Internet Computing

Basic Security Considerations for and Web Browsing

User Manual. HitmanPro.Kickstart User Manual Page 1

HE WAR AGAINST BEING AN INTERMEDIARY FOR ANOTHER ATTACK

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Information Security Threat Trends

Online Security Awareness - UAE Exchange - Foreign Exchange Send Money UAE Exchange

E-BUSINESS THREATS AND SOLUTIONS

Cyber Security. Maintaining Your Identity on the Net

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Network attack and defense

WEB SECURITY. Oriana Kondakciu Software Engineering 4C03 Project

Understanding & Preventing DDoS Attacks (Distributed Denial of Service) A Report For Small Business

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Current Threat Scenario and Recent Attack Trends

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Acceptable Use Policy. This Acceptable Use Policy sets out the prohibited actions by a Registrant or User of every registered.bayern Domain Name.

Security Evaluation CLX.Sentinel

5 DNS Security Risks That Keep You Up At Night (And How To Get Back To Sleep)

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

Topics in Network Security

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

The Hidden Dangers of Public WiFi

'Namgis First Nation. 1.0 Overview. 2.0 Purpose. 3.0 Scope. 4.0 Policy

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

WHITE PAPER. Understanding How File Size Affects Malware Detection

Alexander Nikov. 9. Information Assurance and Security, Protecting Information Resources. Learning Objectives. You re on Facebook? Watch Out!

Spam, Spyware, Malware and You! Don't give up just yet! Presented by: Mervin Istace Provincial Library Saskatchewan Learning

The Trivial Cisco IP Phones Compromise

Lesson 13: DNS Security. Javier Osuna GMV Head of Security and Process Consulting Division

Penetration Testing Report. Client: xxxxxx Date: 19 th April 2014

Protecting your Identity, Computer and Property

Common Cyber Threats. Common cyber threats include:

5 Steps to Advanced Threat Protection

COB 302 Management Information System (Lesson 8)

Remote Deposit Quick Start Guide

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Transcription:

ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to damage computer directly or to spread, but to hide the presence and/or control the function of other (malicious) software since rootkits change the OS, the only safe and foolproof way to handle a rootkit infection is to reformat the hard drive and reinstall the OS Example: Sony story rootkit In 2005, Sony included a rootkit program Extended Copy Protection (XCP) on many of its music CDs in an attempt to limit the user s ability to access the CD and prevent illegal copying. The software was automatically installed on Windows desktop computers (in a hidden directory + modified the OS) when customers tried to play the CD.

XCP (Extended Copy Protection) and MediaMax - software for copy protection and digital rights management used by Sony https://www.eff.org/cases/sony-bmg-litigation-info

https://www.aldeid.com/wiki/category:digital-forensics/rootkits/user-mode-rootkits

http://www.codeproject.com/articles/10272/keyboard-spyimplementation-and-counter-measures Threat Events: Software Attacks (cont.) INFORMATION malware that steals information such as: STEALER passwords, financial credentials, intellectual property, etc. subcategories of information stealers, based on their implementation, include: 1) Keyloggers capture keystrokes in a compromised system

Example: Hardware Keylogger Not classical malware does not require any software or drivers to be installed on the victim machine. Logger is plugged in between USB keyboard and USB port. All keyboard activity is logged to its internal memory. No physical trace stays on the victim machine => challenge for forensics analysis!

INFORMATION cont. STEALER 2) Memory Scraper steals data when processed in memory best place to steal data - everything is decrypted

INFORMATION cont. STEALER 3) Desktop Recorders takes screenshots of the desktop (e.g.) when mouse clicked or keyboard pressed disadvantage: amount of that that needs to be stored / transmitted

RANSOMWARE holds data or access to systems containing data until the victim pays a ransom subcategories of ransomware based on implementation 1) CryptoLockers encrypts victim s data or entire hard-drive get encrypted 2) ScreenLockers user is locked out and denied login to the system

SCAREWARE malicious programs that aim to scare users into installing a program and sometimes even paying for it program is supposed to solve a problem that does not exist!

SPYWARE software that spies on users by gathering information without their consent, thus violating their privacy example: Zango transmits detailed information to advertisers about Web sites you visit legal spyware parental monitoring of Internet usage by children ADWARE software that delivers advertising content in a manner that is unexpected and unwanted by the user

b) Password Cracking can be on-line and off-line off-line crackers attempt to reverse-calculate a password requires that a copy of Security Account Manager (SAM) - a registry data file - be obtained SAM file (c:\windows\system32\config\sam) contains the hashed representation of the user s password LM or NTLM hash algorithms are used cracking procedure: hash any random password using the same algorithm, and then compare to the SAM file s entries SAM file is locked when Windows is running: cannot be opened, copied or removed (unless pwdump is run by the administrator) off-line copy of SAM s content can be obtained (e.g.) by booting the machine on an alternate OS such as NTFSDOS or Linux

types of password cracking attacks brute force every possible combination/password is tried guessing the attacker uses his/her knowledge of the user s personal information and tries to guess the password dictionary a list of commonly used passwords (the dictionary) is used

c) Denial of Service (DoS) attacker sends a large number of requests to a target target gets overloaded and cannot respond to legitimate requests distributed DoS = DDoS - a coordinated stream of requests is launched from many locations (zombies) simultaneously zombie/bot a compromised machine that can be commanded remotely by the master machine botnet network of bots + master machine

DDoS as a service http://securityaffairs.co/wordpress/33916 /cyber-crime/verisign-ddos-attacks-as-aservice.html

Example: Mafiaboy story - DDoS In 2000, a number of major firms were subjected to devastatingly effective distributed denial-of-service (DDoS) attack that blocked each of their e-commerce systems for hours at a time. Victims of this series of attacks included: CNN.com, ebay, Yahoo.com, Amazon.com, Dell.com, ZDNet, and other firms. The Yankee Group estimated that these attacks cost $1.2 billion in 48 hours: $100 million from lost revenue $100 million from the need to create tighter security $1 billion in combined market capitalization loss. At first, the attack was thought to be the work of an elite hacker, but it turned to be orchestrated by a 15-year-old hacker in Canada. He was sentenced to eight months detention plus one year probation and $250 fine. http://journal.fibreculture.org/issue9/issue9_genosko.html

d) Spoofing insertion of forged (but trusted) identification data in order to gain an illegitimate advantage types of spoofing IP Spoofing creation of IP packets with a forged source IP address, e.g. for the purpose of passing through a firewall

types of spoofing (cont.) Email Address Spoofing creation of email messages with a forged sender address, e.g. for the purposes of social engineering and data phishing

types of spoofing (cont.) Referrer Spoofing creation of HTTP requests with a forged referrer URL, e.g. in order to gain access to a protected web-site * some sites allow access to their material only from certain approved (login) pages

e) Sniffing use of a program or device that can monitor data traveling over a network unauthorized sniffers can be very dangerous they cannot be detected, yet they can sniff/extract critical information from the packets traveling over the network wireless sniffing is particularly simple, due to the open nature of the wireless medium popular sniffers: Wireshark wired medium Cain & Abel wireless medium

f) Man-in-the-Middle Attacks gives an illusion that two computers are communicating with each other, when actually they are sending and receiving data with a computer between them spoofing and/or sniffing can be involved examples: passive attacker records, alters and resends data at a later time active attacker intercepts, alters and sends data before the original arrives to the recipient

Example: ARP Poisoning (active Man-in-the-Middle attack) http://www.aiotestking.com/ec-council/2012/04/how-do-you-defend-against-arp-poisoning-attack/

Example: DNS Poisoning (active Man-in-the-Middle attack) http://hackingplayground.blogspot.ca/2012/01/hacking-facebookgmailhotmail-using-set.html

Social Engineering process of using social skills to manipulate people into revealing vulnerable information either by believing that an email came from a legitimate person or believing that a web-site is the real web-site, or both! g) Phishing attempt to gain sensitive personal information by posing as a legitimate entity SIMPLE PHISHING: an email is sent to the victim informing them of a problem (e.g. with their email or banking account) and asking them to provide their username, password, etc.; From email address is spoofed to look legitimate, Reply To email address is an account controlled by the attacker

Example: Simple Phishing http://www.itknowingness.com/page/2/

SOPHISTICATED PHISHING: an email is sent to the victim containing a link to a bogus website that looks legitimate Example: Phishing using URL Links Embedded in HTML-based Emails

Example: Phishing using URL Links Embedded in HTML-based Emails (cont.)

http://www.informacija.rs/clanci/phishing-obmanjivanje-korisnika.html

Threat Events: Software Attacks (cont.) In the past, malicious content has traditionally been hosted on servers in places like Europe. But, now the bad guys are shifting their infrastructures to sites that are hosted in countries that traditionally have had better reputations. http://community.websense.com/blogs/securitylabs/archive/2012/05/10/canada-s-cybercrime-reportcard-better-or-worse-in-2012.aspx

http://www.itmatrix.com/fraudmanagement/antipharming.html Threat Events: Software Attacks (cont.) i) Pharming phishing is accomplished by getting users to type in or click on a bogus URL pharming redirects users to false website without them even knowing it typed in or clicked on URL looks OK performed through DNS poisoning user s local DNS Cache or DNS server are poisoned by a virus

http://www.informationweek.com/pharming-attack-slams-65-financial-targe/197008230 Threat Events: Software Attacks (cont.) Example: Elaborate Pharming Attack on 65 Banks in February 2007 Storyline: 1. Targeted victims, from US and Australia, were lured to a bogus website appearing to be a link to a news story from The Australian. 2. When the victim arrived at the website, if the victim's Windows OS wasn't patched, a malware was automatically downloaded into their computer. 3. When a user then went to visit any one of the 65 targeted banks (PayPal, ebay, Discover Card, American Express, Bank of Scotland, ) their computer was redirected to a false website, even though they typed in the correct URL for the bank. 4. The user then entered in their identity information through the false website which then logged in as the user on the real website. 5. The user then was able to do their banking. However, the criminals were now logged on as the user and could withdraw funds after the user thought they had logged off.