Week 3 Computer Fraud and Abuse Techniques
Week 3 Computer Fraud and Abuse Techniques
Hijacking – Gaining control of someone else’s computer to carry out illicit activities, such as sending spam
without the computer’s users’ knowledge.
A botnet – short for robot network, is a powerful network of hijacked computers called zombies, that are
used to attack systems or spread malware.
o Bot herders install software that responds to the hacker’s electronic instructions on unwitting PCs.
o Botnets send out over 90 billion unsolicited emails per day.
Bot herder – The person who creates a botnet by installing software on PCs that responds to the bot
herder’s electronic instructions.
o Bot software is delivered in a variety of ways, including Trojans, e-mails, instant messages,
Tweets, or an infected website.
o Bot herders use the combined power of the hijacked computers to mount a variety of internet
attacks.
Denial-of-service (DoS) attack – A computer attack in which the attacker sends so many e-mail bombs or
web page requests, often from randomly generated false addresses, that the internet service provider’s e-
mail server or the web server is overloaded and shuts down.
o Botnets are used to perform denial-of-service (DoS) attacks, which is designed to make a
resource unavailable to its users.
Spamming – Simultaneously sending the same unsolicited message to many people, often in an attempt to
sell them something.
o An estimated 250 billion e-mails are sent every day; 80% are spam and viruses.
o The federal trade commission estimate that 80% of spam is sent from botnets.
o In retaliation, some spammers are spammed in return with thousands of messages, causing their e-
mail service to fail.
o Spams are annoying and costly, and 10 to 15% offer products or services that are fraudulent.
o Spammers scan the internet for addresses posted online, hack into company databases, and steal or
buy mailing lists.
Dictionary attack – using special software to guess company e-mail addresses and send them blank email
messages. Unreturned messages are usually valid e-mail addresses that can be added to spammer e-mail
lists.
2. Social Engineering
Social engineering refers to techniques or psychological tricks used to get people to comply with the
perpetrator’s wishes in order to gain physical or logical access to a building, computer, server, or network
– usually to get information needed to access a system and obtain confidential data.
Often, the perpetrator has a conversation with someone to trick, lie to, or otherwise deceive the victim.
Often, the perpetrator has information, knowledge, authority, or confidence that makes it appear that he
or she belongs or knows what they are doing.
Fraudsters take advantage of the following seven human traits in order to entice a person to reveal information
or take a specific action.
1. Compassion – The desire to help others who present themselves as really needing your help.
2. Greed – People who more likely to cooperate if they get something free or think they are getting a
once in-a-lifetime deal.
3. Sex Appeal – people are more likely to cooperate with someone who is flirtatious or viewed as “hot.”
4. Sloth – Few people want to do things the hard way, waste time, or do something unpleasant; fraudsters
take advantage of our lazy habits and tendencies.
5. Trust – People are more likely to cooperate with people who gain their trust.
6. Urgency – A sense of urgency or immediate need that must be met leads people to be more
cooperative and accommodating.
7. Vanity – People are more likely to cooperate if you appeal to their vanity by telling them they are
going to be more successful.
Establishing the following policies and procedures – and training people to follow them can help to minimize
social engineering.
3. Malware
Malware – Any software that is used to do harm.