Chapter 3
Chapter 3
If you do not have a security plan in place then your networks and data are vulnerable to any of
the following types of attacks because without security controls and measure in place, your data
might be subjected to an attack. Attacks will be passive or active, passive meaning information is
monitored and others are active meaning the information is altered with intent to corrupt or destroy
some data or the network itself.
Page 1 of 25
Types of active attacks are as following:
Masquerade –
Masquerade attack takes place when one entity pretends to be different entity. A
Masquerade attack involves one of the other form of active attacks.
Page 2 of 25
Modification of messages
It means that some portion of a message is altered or that message is delayed or reordered to
produce an unauthorized effect. For example, a message meaning “Allow JOHN to read
confidential file X” is modified as “Allow Smith to read confidential file X”.
Repudiation –
This attack is done by either sender or receiver. The sender or receiver can deny later that he/she
has send or receive a message. For example, customer ask his Bank “To transfer an amount to
someone” and later on the sender (customer) deny that he had made such a request. This is
repudiation.
Replay –
It involves the passive capture of a message and its subsequent the transmission to
produce an authorized effect.
Denial of Service
It prevents normal use of communication facilities. This attack may have a specific target. For
example, an entity may suppress all messages directed to a particular destination. Another form of
service denial is the disruption of an entire network wither by disabling the network or by
overloading it by messages so as to degrade performance.
Page 3 of 25
Passive attacks: A Passive attack attempts to learn or make use of information from the system
but does not affect system resources. Passive Attacks are in the nature of eavesdropping on or
monitoring of transmission. The goal of the opponent is to obtain information is being
transmitted.
Page 4 of 25
Types of Passive attacks are as following:
Telephonic conversation, an electronic mail message or a transferred file may contain sensitive or
confidential information. We would like to prevent an opponent from learning the contents of these
transmissions.
It is very difficult to detect a passive attack because there is no type of data alteration. Typically,
in passive the message traffic is not sent and received in an apparently normal fashion and the
sender and receiver is not aware that a third party has read the messages or observed the traffic
pattern used by transmission media.
However, it is possible to prevent the success of these type of attacks, usually by using encryption.
Thus the emphasis in dealing with passive attacks is on prevention rather than detection.
Page 5 of 25
Table 1 the Difference between Active Attack and Passive Attack
Page 6 of 25
Table 2 General groups of threat events
Threat Example
Act of human error or failure Accidents, Employee Mistakes
Compromises to intellectual properties Privacy , copy right infringement
Deliberate act as espionage or trespass Unauthorized access and or data collection
Deliberate act as information extortion Black mail for information disclosure
Deliberate acts as sabotage or vandalism Destruction of systems or information
Deliberate act of theft Illegal confiscation of information or
equipment
Deliberate software attacks Viruses, worms , and denial of services
Deviations in quality of service by service Power and WAN quality of service issues from
provides service providers
Forces of nature Fire, flood, earthquake, and lightening
Technical hardware failures or errors Equipment failure
Technical software failures or errors Bugs , code problems
Technical obsolescence Antiquated or outdated technologies
Page 7 of 25
Hardware and Software Failures and Errors
cannot be controlled or prevented by the organization
Best defense: keep up-to-date latest hardware and software vulnerabilities.
Forces of nature
Fire, flood, earthquake, dust contamination
organization must implement controls to limit damage as well as develop incident
response plans and business continuity plans
Act of Human Error or Failure
Organization of its own employees are the greatest threats
Examples:
entry of erroneous data
accidental deletion or modification of data
failure to protect data
storing data in unprotected areas
Much of human error or failure can be prevented
preventative measures
training and ongoing awareness activities
enhanced control techniques
o require users to type a critical command twice
o ask for verification of commands by a second party
Compromises to intellectual properties (IP)
o IP= ideas or tangible or virtual representations of these ideas
o Any unauthorized use of IP constitutes a security threat
Defense measures
Use of digital watermarks and embedded code
Page 8 of 25
Deliberate act as information extortion
hacker or trusted insider steals information and demands compensation for its return
Examples:
theft of data files containing customer credit card information
Deliberate Act of Sabotage or Vandalism
acts aimed to destroy an information asset and, ultimately, damage the image of an
organization
examples:
hackers accessing a system and damaging or destroying critical data
Deliberate Act of Trespass
Unauthorized access to info. that an organization is trying to protect
low-tech: shoulder surfing
high-tech: hacking
Deviations in Quality of Service
In organizations that relies on the Internet and Web,
irregularities in available bandwidth or server’s CPU can dramatically affect their
operation.
E.g. employees or customers cannot contact the system
Deliberate Software Attacks
A deliberate action aimed to violate / compromise a system’s security through the use of
software
Examples:
o use of malware
o Password cracking
o DOS and DDOS
o Spoofing
o Sniffing
o Man In the middle attack
o Phishing
o Pharming
Page 9 of 25
A. Use of Malware
Assumes the use of specialized software(malware) to damage or destroy information, or
to deny access to the target system
Types of malware(virus, worms, Trojan Horse, Logic Bomb, Rootkit, Spyware, Adware)
Virus
malware that needs a ‘carrier’ to survive
in fact, 2 carriers needed: document/program and user
Virus secretly attaches itself to a document and then executes its malicious payload when
that document is opened and respective program launched.
most viruses rely on actions of users to spread, e.g.:
o send/activate an infected file by email
o download/activate an infected file from the Interne
o download/activate an infected file from a USB drive
Viruses can cause the following damage:
o cause a computer to crash repeatedly
o erase files from a hard drive, reformat a hard drive
o reduce the security settings and allow intruders to remotely access the computer
WORM
Malware that uses computer networks and security holes in application or Os’ to replicate
itself.
Once it exploits vulnerability on one system, worm deposits its payload and searches for
another computer
Differences between worms and viruses
o Viruses need a carrier document or program (“must attach itself to something to
propagate”) are typically delivered by email and require user action.
o Worms do not need a carrier (“can move on their own”) are typically spread through the
internet or web and not rely on a user action.
Examples: Stuxnet (2010): a highly sophisticated worm that used a variety of advanced
techniques to spread, including:
Page 10 of 25
By the use of shared infected USB drives (spread even between computers that are not
connected to the internet)
By connecting to systems using database default password
By searching for Unrotective administrative shares of systems on the LAN
Trojan horse
A malware that looks legitimate and is advertised as performing on activity but actually
does something else; it does not replicate itself.
Can achieve various attacks on the host: irritate the use with pop ups or changing
desktops.
Example: AOL4 Free: advertised free access to AOL internet services; would delete hard
drive
Logic Bomb
Malware typically installed by an authorized user; lies dormant until triggered by specific
logical event; once triggered it can perform any malicious activities.
Trigger events 1) a certain date reached on the colander; check for organization payroll
data: event 2) a person was fired
Rootkit
A software tools used to break into a computer, modify the operation of the operating
system in some fashion in order to facilitate nonstandard or unauthorized functions.
Unlike viruses, Rootkit goal is not to damage computer directly or spread, but to hide the
presence and or control the function of other (malicious software)
Since rootkits change the operating system, the only safe and foolproof way to handle a
rootkit injection is to reformat the hard drive and reinstall the operating system.
Spyware
A software that spies on users by gathering information without their consent, thus
violating their privacy.
Example: Zango: transmits details information to advertisers about websites you visit
Adware
Software that delivers advertising content in a manner that is unexpected and unwanted by
the user
Page 11 of 25
B. Password Cracking
Attempt to reverse calculate password
Requires that a copy of security account manager(SAM) a registry data file obtained
SAM file (c:windows\system32\config\SAM contained the hashed representations of
the user password (LM(local manager hash, NLTM()
Cracking procedure: hash any random password using same algorithm and compare
with to the SAM’s file entries.
Types of password cracking attacks
o Brute force: every possible combination/password is tried
o Guessing: the attacker uses her or his knowledge of users personal information
and tries to guess the password
o Dictionary: a list of commonly used password(dictionary)
C. Denial Of service(DOS)
Attacker sends a large number of requests to a target
o Target gets overloaded and cannot respond to legitimate requests
In case of distributed DOS-DDOS, a coordinated stream of requests is launched from
many locations (zombies) at the same time.
o Zombie: a compromised machine that can be commanded remotely by the master
machine.
Organization must ensure that minimum service level as defined by service level
agreement with the ISP will satisfy its needs
Alternate solution: Backup ISP
Page 12 of 25
Figure 2 DDOS Attack
D. Spoofing
Insertion of forged (but trusted) IP addresses into IP packets in order to gain access
to networks/computers
New routers and firewalls can offer protection against IP spoofing
o Ingress filtering: upstream ISP discards any packet coming into a network if the
source address is no valid i.e. IP does not belong to any of the networks connected
to the ISP
o Egress filtering: organization firewalls discards any outgoing packets with a source
address that does not belong to that organization.
Page 13 of 25
Figure 3 Spoofing
E. Sniffing
Use of program or device that can monitor data traveling over a network.
o Unauthorized sniffers can be very dangerous – they cannot be detected yet they
can sniff or extract critical information from the packets traveling over the
network.
o Wireless sniffing is a particularly simple due to the open nature of wireless
medium
F. Man in the Middle Attack
Gives illusion that two computers are communication with each other when actually
they are sending and receiving data with computer between them.
o Spoofing and or sniffing can be involved
Page 14 of 25
Examples:
o Passive: attackers record, alters and resends data at a latter time,
o Active: attackers intercepts, alters, and sends data before the original arrives to
the recipient.
Social Engineering
An information systems vulnerability is a cybersecurity term that refers to a defect in a system that
can leave it open to attack. This vulnerability could also refer to any type of weakness present in a
computer itself, in a set of procedures, or in anything that allows information security to be exposed
to a threat. It is possible for network personnel and computer users to protect computers from
vulnerabilities by regularly updating software security patches. These patches are capable of
solving flaws or security holes found in the initial release. Network personnel and computer users
should also stay informed about current vulnerabilities in the software they use and look out for
ways to protect against them.
Bugs
Weak passwords
OS command injection
SQL injection
Buffer overflow
Missing authorization
Path traversal
Page 16 of 25
3.3. Malicious Security Threats
The term malware or malicious software is used for any type of software that can affect your
computer equipment’s performance and functionality, either locally or remotely. Computer
viruses, Trojan horses and worms are all considered malware.
3.3.1. Viruses
Viruses are self-replicating programs that infect and propagate through files. Usually they will
attach themselves to a file, which will cause them to be run when the file is opened. Viruses often
have additional properties, beyond being an infector or macro virus.
A virus may also be multi-partite, stealth, encrypted or polymorphic. Multipartite viruses are
hybrid viruses that infect files and system and/or boot-records. This means multi-partite viruses
have the potential to be more damaging, and resistant. A stealth virus is one that attempts to hide
its presence. This may involve attaching itself to files that are not usually seen by the user.
Viruses can use encryption to hide their payload. A virus using encryption will know how to
decrypt itself to run. As the bulk of the virus is encrypted, it is harder to detect and analyses. Some
viruses have the ability to change themselves as time goes by, or when they replicate themselves.
Such viruses are called polymorphic viruses. Polymorphic viruses’ can usually avoid being
eradicated longer than other types of viruses as their signature changes. Macro viruses are simply
macros for popular programs, such as Microsoft Word, that are malicious. For example, they may
delete information from a document or insert phrases into it. Propagation is usually through the
infected files. If a user opens a document that is infected, the virus may install itself so that any
subsequent documents are also infected. Some macro viruses propagate via email, such as the
Melissa virus covered in the next section. Often the macro virus will be attached as an apparently
benign file to fool the user into infecting themselves.
3.3.2. Worms
A worm is a self-replicating program that propagates over a network in some way. Unlike viruses,
worms do not require an infected file to propagate. There are two main types of worms, mass-
Page 17 of 25
mailing worms and network-aware worms. Mass-mailing worms are an interesting category as
many attacks in this category could quite easily be classified as a worm, virus or both. A mass-
mailing worm is a worm that spreads through email. Once the email has reached its target it may
have a payload in the form of a virus or Trojan. Email, although it may become a file on its journey,
is more abstract than a file.
Therefore, while some attacks may use email attachments to send viruses, the attack vector is still
email. An attack such as Melissa should be classified first as a mass-mailing worm. Network-aware
worms are a major problem for the Internet. Worms such as SQL Slammer have shown that the
Internet can be degraded by a well written worm. Network-aware worms generally follow a four
stage propagation model. Although this is a generalization, most network-aware worms will fit
into this model. The first step is target selection. The compromised host targets a host.
The compromised host then attempts to gain access to the target host by exploitation. For example,
the SQL Slammer worm exploited a known vulnerability in Microsoft SQL Server 2000 and
Microsoft Desktop Engine. Once the worm has access to the target host, it can infect it. Infection
may include loading Trojans onto the target host, creating back doors or modifying files. Once
infection is complete, the target host is now compromised and can be used by the worm to continue
propagation.
3.3.3. Trojan horses
A Trojan horse or Trojan infiltrates your computer through a file that you download and open.
Unlike viruses, most Trojans stay on your computer only. They cause damage, but they do not
spread to other computers. A Trojan is a piece of malware that stays in one place rather than
spreading.
3.3.4. Spyware
Spyware is software that is installed on a computing device without the end user's knowledge. Any
software can be classified as spyware if it is downloaded without the user's authorization. Spyware
is controversial because even when it is installed for relatively innocuous reasons, it can violate
the end user's privacy and has the potential to be abused. It collects your personal information and
passes it on to interested third parties without your knowledge or consent.
Page 18 of 25
Spyware is also a type of malware (malicious software) that collects and shares information about
a computer or network without the user’s consent. It can be installed as a hidden component of
genuine software packages or via traditional malware vectors such as deceptive ads, websites,
email, instant messages, as well as direct file-sharing connections. Unlike other types of malware,
spyware is heavily used not only by criminal organizations, but also by unscrupulous advertisers
and companies who use spyware to collect market data from users without their consent.
Regardless of its source, spyware runs hidden from the user and is often difficult to detect, but can
lead to symptoms such as degraded system performance and a high frequency of unwanted
behavior (pop-ups, rerouted browser homepage, search results, etc.).
As a tool for advertising, spyware is used to collect and sell user information to interested
advertisers or other interested parties. Spyware can collect almost any type of data including web
browsing habits and download activity. Perhaps the greatest concern related to spyware is that
regardless of whether its presence detectable or not the user has neither any idea of what
information is being captured, sent away, or used, nor any mechanism or technology for finding
out. Spyware can be prevented through a combination of endpoint and network security controls.
Antispyware features are often integrated into modern antivirus software products that provide
protection at the endpoint.
3.4. Categories of Security controls
Preventive
When you decide to use a preventive countermeasure, you want to prevent a malicious action from
occurring by blocking or stopping someone or something from doing or causing so.
Firewalls.
Security Guards.
Using Encryption.
Page 19 of 25
Strong Authentication.
Locks.
Antivirus Software.
Detective:
Detective countermeasures are implemented to help detect any malicious activities.
A detective controls doesn’t stop or mitigate intrusion attempts; it only identifies and reports them.
Alarms.
Lights.
Motion Detectors.
Security Guards.
Video Surveillance.
Corrective:
These type of controls attempt to get the system back to normal.
Examples for this type are:
Installing a fix.
Page 20 of 25
3.5. Social Engineering
Social engineering is the term used for a broad range of malicious activities accomplished through
human interactions. It uses psychological manipulation to trick users into making security mistakes
or giving away sensitive information. Social engineering is the practice of using psychological
manipulation as well as social norms to deceive individuals into revealing sensitive and
confidential information including providing access to computer or systems that may have access
to those types of information.
Page 21 of 25
use social engineering tactics as a first step in a larger campaign to infiltrate a system or
network and steal sensitive data or disperse malware.
Let’s see in detail which are most common social engineering attacks used to targets users.
Phishing
Phishing attacks are the most common type of attacks leveraging social engineering techniques.
Attackers use emails, social media and instant messaging, and SMS to trick victims into providing
sensitive information or visiting malicious URL in the attempt to compromise their systems.
Phishing attacks are the most common attacks conducted by social engineers. They aim at
fraudulently acquiring private and confidential information from intended targets via phone calls
or emails. Attackers mislead victims to obtain sensitive and confidential information. They involve
fake websites, emails, ads, anti-virus, scareware, PayPal websites, awards, and free offers. For
instance, the attack can be a call or an email from a fake department of lottery about winning a
prize of a sum of money and requesting private information or clicking on a link attached to the
emails.
Messages are composed to attract the user’s attention, in many cases to stimulate his
curiosity providing a few information on a specific topic and suggesting that the victims
visit a specific website to gain further data.
Phishing messages aimed to gather user’s information presents a sense of urgency in the
attempt to trick the victim into disclosing sensitive data to resolve a situation that could get
worse without the victim’s interaction.
Attackers leverage shortened URL or embedded links to redirect victims to a malicious
domain that could host exploit codes, or that could be a clone of legitimate websites with
URLs that appear legitimate. In many cases the actual link and the visual link in the email
are different, for example, the hyperlink in the email does not point to the same location as
the apparent hyperlink displayed to the users.
Phishing email messages have a deceptive subject line to entice the recipient to believe that
the email has come from a trusted source, attackers use a forged sender’s address or the
Page 22 of 25
spoofed identity of the organization. They usually copy contents such as texts, logos,
images, and styles used on the legitimate website to make it look genuine.
Watering hole
A watering hole” attack consists of injecting malicious code into the public Web pages of a site
that the targets used to visit. The method of injection is not new, and it is commonly used by cyber
criminals and hackers. The attackers compromise websites within a specific sector that are
ordinary visited by specific individuals of interest for the attacks.
Whaling attack
Whaling is another evolution of phishing attacks that uses sophisticated social engineering
techniques to steal confidential information, personal data, access credentials to restricted
services/resources, and specifically information with relevant value from an economic and
commercial perspective.
What distinguishes this category of phishing from others is the choice of targets: relevant
executives of private business and government agencies. The word whaling is used, indicating that
the target is a big fish to capture.
Pretexting
The term pretexting indicates the practice of presenting oneself as someone else to obtain private
information. Usually, attackers create a fake identity and use it to manipulate the receipt of
information. Attackers leveraging this specific social engineering technique use adopt several
identities they have created during their carrier. This bad habit could expose their operations to the
investigations conducted by security experts and law enforcement.
The success of the pretexting attack heavily pretends on the ability’s attacker in building trust most
advanced forms of pretexting attacks try to manipulate the victims into performing an action that
enables an attacker to discover and exploit a point of failure inside an organization. An attacker
can impersonate an external IT services operator to ask internal staff for information that could
allow accessing system within the organization.
Page 23 of 25
Tailgating
The tailgating attack, also known as “piggybacking,” involves an attacker seeking entry to a
restricted area which lacks the proper authentication-
The attacker can simply walk in behind a person who is authorized to access the area. In a typical
attack scenario, a person impersonates a delivery driver or a caretaker who is packed with parcels
and waits when an employee opens their door. The attacker asks that the employee hold the door,
bypassing the security measures in place (i.e. electronic access control).
Once a victim visits the page on the compromised website a backdoor trojan is installed on his
computer, Watering Hole method of attacks is very common for cyber espionage operation or
state-sponsored attacks.
Social engineers manipulate human feelings, such as curiosity or fear, to carry out schemes and
draw victims into their traps. Therefore, be wary whenever you feel alarmed by an email, attracted
to an offer displayed on a website, or when you come across stray digital media lying about. Being
alert can help you protect yourself against most social engineering attacks taking place in the
digital realm.
Moreover, the following tips can help improve your vigilance in relation to social engineering
hacks.
Don’t open emails and attachments from suspicious sources: If you don’t know the
sender in question, you don’t need to answer an email. Even if you do know them and are
suspicious about their message, cross-check and confirm the news from other sources, such
as via telephone or directly from a service provider’s site. Remember that email addresses
are spoofed all of the time; even an email purportedly coming from a trusted source may
have actually been initiated by an attacker.
Page 24 of 25
Use multifactor authentication: One of the most valuable pieces of information attackers
seek are user credentials. Using multifactor authentication helps ensure your account’s
protection in the event of system compromise.
Be wary of tempting offers: If an offer sounds too enticing, think twice before accepting
it as fact. Googling the topic can help you quickly determine whether you’re dealing with
a legitimate offer or a trap.
Keep your antivirus/antimalware software updated: Make sure automatic updates are
engaged, or make it a habit to download the latest signatures first thing each day.
Periodically check to make sure that the updates have been applied, and scan your system
for possible infections.
Page 25 of 25