1.2 Potential Indicators - Attack Type Flashcards

Threats, Attacks, and Vulnerabilities: Given a Scenario, Analyze Potential Indicators to determine the type of attack

1
Q

Malware - Virus

A
  • A malicious computer program that requires user intervention (ex: clicking it or copying it to a media or host) within the affected system
  • Most viruses self-replicate without the knowledge of the computer user.
  • Can be passed along from one system to another (via email, IM, downloads, removable media, network connections)
  • Probably the most common and prevalent type of system attack.
  • Often tedious to repair or clean up. Sometimes can be fatal to the entire computer system and company operations.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Boot Sector Virus

A
  • Infect the boot sector or partition table of a disk.
  • Boot sector is used by the computer to determine which OS are present on the system to boot.
  • Most common way a boot sector virus finds its way into a system is through an infect disk or removable media device that is inserted into the computer.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Boot Sector Virus

A
  • Doesn’t allow computer to boot, rendering computer useless.
  • Infect the boot sector or partition table of a disk.
  • Boot sector is used by the computer to determine which OS are present on the system to boot.
  • Most common way a boot sector virus finds its way into a system is through an infect disk or removable media device that is inserted into the computer.
  • Best way to remove - is to boot the system using an anti virus or similar emergency recovering media
  • This allows you to start up the computer with basic start - up files, bypassing the boot sector and then run the antivirus program on the recovery media.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Companion virus

A
  • Disguises itself as a legitimate program, using the name of a legit program but with a different extension.
  • Typically it will also execute the legitimate program after installing the virus code so that the system appears to be performing normally.
  • Some viruses replace the original file with their version that performs the same tasks but includes new malicious code to run with it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

File Infector Viruses

A
  • Generally infect files that have the extension .com or .exe
  • Can be extremely destructive b/c they try to replicate and spread further by infecting other executable programs.
  • Sometimes it destroys the original program by overwriting the original code.
  • Caution: If your computer is afflicted with a file infector virus, DO NOT attach it to a network b/c it could infect files on other workstations and file servers.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Macro Virus

A
  • A macro is an instruction that carries out program commands automatically within an application.
  • Typically used with Word and Excel.
  • Uses the internal workings of the application to perform malicious operations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan Horse

A
  • Software that pretends to be something else so it can conquer your computer
  • Doesn’t really care about replicating
  • Circumvents existing security
  • Designed to look non-threatening to users and anti-virus software
  • Some even disable Anti Virus
  • Can configure backdoors or configure additional malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PUP

A
  • Potentially Unwanted Program
  • Could be undesirable, may not be malicious, may cause performance issue
  • Might install a browswer toolbar that’s difficult to uninstall
  • or a backup utility that always shows or hijacks browswer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backdoors

A
  • Malware tends to open a backdoor on system
  • Malware creates a new way to access system
  • Sometimes the same backdoor is open other malware can potentially use it
  • Difficult to find vulnerabilities and get users to click on links.
  • Wants to find a way to easily access your system again (without having to make you click on something etc.)
  • Ex: Old version of linux included a backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

RAT

A
  • Remote Access Trojan (or Remote Administration Tool)
  • Ultimate backdoor
  • Administrative control of a device
  • Malware that is installed, might install the RAT
  • Ex: can collect log of key strokes, screen shots, copy files, embed more malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Protecting against Trojan + RATs

A
  • Similar to preventing other malware
  • Don’t run unknown software
  • Keep anti virus / malware up to date
  • Have latest signature installs for software
  • Have a backup so you can restore from known good backup
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Rootkit

A
  • Foundation in Unix/Linux, but they can be found on any OS
  • Common characteristic: instead of modifying files in OS, it modifies files in kernel (foundational building blocks of OS) everything that runs in OS runs on top of Kernel
  • B/c malware becomes part of OS itself, it becomes invisivble to anti virus / malware
  • Identifying and removing from rootkit is very difficult
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Zeus/ Zbot Malware

A
  • Example of malware that combines rootkit with malware
  • Very good at transferring money out of bank account and into theirs
  • Combined Zeus malware with Necurs rootkit, almost impossible to delete from system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Root kit removers

A
  • Some anti virus/ malware that can identify malware on rootkits
  • BIOs software example - Secure boot:
  • EX: UEFI has secure boot will examine if any part of root kit has been modified and then won’t let it boot.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A
  • More malicious than Adware, it is trying to gather information about you
  • Ex: where you visit on the internet or PII
  • Can be installed different ways, ex: Trojan horse, peer to peer or fake security software
  • Common spyware will examine sites visiting, and examine strokes your using to get user names/ password
  • Adware and spyware continue to be popular b/c users are very valuable
  • Prevention: Always make sure you have the latest signatures, don’t install unverified third party software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Adware

A
  • Adware is one big advertisement, can cause performance in OS and slowdown and increased network traffic
  • Sometimes it can be installed accidentally
  • If you try to remove adware, you can find removal software that is also malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Bot

A
  • Stands for robot
  • Describes automation that occurs behind the scenes when this type of malware takes control of your machine
  • Entry points: Trojan horse, through vulnerability in OS, or alongside a normal application installation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Botnet

A
  • When a group of bots on different machines is woking together and controlled with the C&C (Command and Control server)
  • When all these systems are being controlled by a bad actor it can cause a DDoS (Distributed Denial of Service)
  • Systems can act as proxies or relays for spam, network traffic and other types of tasks
  • Can be rented out to 3rd parties to “rent a DDoS”
  • map.lookingglass.cyber.com lists active botnets and live attacks and countries
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

C&C Server

A
  • Controls botnets
  • ## Issues commands to bot nets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How to stop a botnet

A
  • Ensure your OS is running the latest patches
  • Antivirus/malware and latestsignatures
  • Can perform an on-demand network scan and look for any unusual network patterns
  • Prevent C&C - If you know the patterns of the C&C can block it at the firewall or at the IPS / Firewall at the workstation level
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Logic Bomb

A
  • Waits for a predefined event to trigger something
  • Often left by someone with a grudge
  • Ex: a person places file in a particular location or turning on or off a particular computer
  • Difficult to detect logic bombs b/c they don’t follow any known signature, makes it difficult for anti virus/ malware
  • Many logic bombs will also delete themselves once executed so can be hard to repair as well
22
Q

Time Bomb

A
  • A specific type of Logic Bomb
  • Occurs when a particular date/time is reached
  • Ex: South Korea media / banks organizations targeted, installed trojan malwares. A day later the bomb went off and it started deleting master boot record and rebooting systems. Started looking for a OS and disabled a lot of ATMS.
    -Ex: Ukraine - focused on high voltage substations. Disabled electrical circuits
23
Q

SCADA Network

A
  • Supervisory Control and Data Acquisition Network
  • Supervisory Control and Data Acquisition (SCADA) is a system that aims to monitor and control field devices at your remote sites. … SCADA is a centralized system that monitors and controls the entire area. This supervisory system gathers data on the process and sends the commands control to the process.
24
Q

Preventing Logic Bomb

A
  • Have formal process and controls in place to monitor if any changes in environment that deviate from process and procedures
  • Automated processes that do this, host-based intrusion detection or tripwire.
  • Constant auditing of alert and computer systems and make sure all system administrator changes are authorized
25
Q

Plaintext/ unencrypted passwords

A
  • Some applications store passwords “in the clear”
  • No encryption, you can read stored passwords
  • This is relatively rate
  • Do not store any passwords as plaintext
  • Need to stop using this application or upgrade applications
26
Q

Best way to store passwords

A
  • Hash - represents the password as a string of text (aka message digest) or “fingerprint”
27
Q

Hash

A
  • Hash - represents the password as a string of text (aka message digest) or “fingerprint”
  • Different inputs will not have the same hash
  • It’s very secure b/c it’s a “one way trip”, once you create the hash of the password, you can’t restore the original password by using the hash
28
Q

Shah -256

A
  • A very common hashing algorithm used in many algorithms
29
Q

Spraying Attack

A
  • Tries using a few very common passwords and then moves on
  • Ex: Often an application has the user names and the hash for the password stored, instead of using a brute force attack, they’ll use spraying
  • Spraying attack avoids the lock out issue with too many incorrect guesses of a brute force attack
  • no alarms, no alerts b/c they move on quickly
30
Q

Brute Force

A
  • if a hacker wants to obtain every user name and account in a system
  • going to try every combination of letters, numbers, special characters for a given account
  • If you’re starting with a hash (a strong hash algorithm slows things down)
  • generate a password and compare the resulting hash then they know the password
  • (if you did this online it would be very slow, probably will lock out)
  • more common that the hacker has already downloaded the password file and run the brute force offline
31
Q

Dictionary Attack

A
  • Uses common words from the dictionary
  • Certain passwords are unique to a particular type of job
  • Can perform letter substitutions in these dictionary attacks
32
Q

GPU

A
  • Graphical Processing Unit
  • high speed cpu
  • Can be used in brute force attacks to speed things along
33
Q

Rainbow table

A
  • An optimized, pre-built set of hashes
  • Saves time and storage space
  • Doesn’t need to contain every hash
  • Contains pre-calculated hash chains
  • Very fast (bypasses the time it takes to create a hash)
  • Challenges with Rainbow tables for hackers, a different application may have a different hash algorithm so you’ll need different rainbow tables
34
Q

Salt

A
  • A little bit of extra random data added to the password before it is hashed
  • Ex: if 2 users are using the same password, their hash will be different
  • Can foil a Rainbow table
  • Doesn’t stop brute force, but slows things down b/c hacker has to know how the salt was implemented
35
Q

Physical attacks

A
  • Not all attacks occur over the network
  • Ex: malicious usb cable
  • Don’t plug in anything unknown
  • Free flash drive!
36
Q

HID

A
  • Human interface device (aka keyboard, mouse)
  • Could be on a malicious USB cable
  • When you plug it in, you can start typing, it can open files
37
Q

Malicious Flash drive

A
  • Ex: Malicious PDF, macros in spreadsheets
  • Can be configured as a boot device (which would infect the computer after a reboot)
  • It can be an ethernet adaptor if is configured as a wireless gateway
38
Q

Skimming

A
  • Stealing credit card information as we use the card for some other purpose
  • Ex: stealing from the magnetic strip or the card reader itself
  • Camera could also monitor ATM pad
  • check card reader before using, pull on it to make sure nothing pops out
39
Q

Card Cloning

A
  • Create an exact duplicate of credit card (including same CVC)
  • They clone the magnetic stripe (not the chips)
  • Ex: Gift cards are popular targets, they’ll clone the gift card, wait for it to be activated and then use it before legitimate person can
40
Q

Machine Learning

A
  • Find patterns in data
  • takes a lot of data to train computer system
  • Ex: a spam folder can catch more spam with more spam examples
  • All of the training data assumes that all the data is legitimate
  • But if it used fake training data that would corrupt the learning
  • Ex: Microsoft Ai chatterbot Tay (Thinking about you) - Added to twitter in 2016, didn’t add any type of anti-offensive behavior. Other uses realized they could poison Tay.
  • Ex: Attackers tricked ML into revealing the actual SSN used to train the algorithm
  • Ex: Once spammers know what the spam filter is trained on they can tweak their language
41
Q

Prevent issues with ML Training Data

A
  • Cross check and verify the training data
  • Constantly retrain with new data
  • More data / better data
  • Use same techniques attackers are using to help prevent your system from becoming vulnerable.
42
Q

Supply Chain

A
  • Raw materials, suppliers, manufactures, distributors, customers, consumers
  • Provides a lot of points of attack
  • Tend to trust our suppliers
  • Ex: Target Corp in 2013, started in HVAC company, there was a VPN connection the techs would use, there was an email with malware that stole VPN credentials
  • Attack vector was a surprise
43
Q

Supply chain access points

A
  • Can you trust your new: server, router, switch, firewall, software
  • Supply chain cyber security is a big concern
  • Many companies are narrowing vendor list to do more testing / auditing
  • Many companies are requiring that suppliers have strict controls in their own supplier network
44
Q

Cloud based vs on premise

A
  • 2 schools of thought: on site is more secure vs cloud is more secure
  • Cloud security, everything is centralized so costs tend to be lower (don’t have to worry about data center/ purchasing software/ IT services)
  • On site: have to have your own data center, but you know where all your data is can control what happens to data
45
Q

On Premise security

A
  • You can control everything in house
  • You can have your own IT team, what expertise, security controls are in place
  • There are additional costs for all of this
  • Can handle all the up time / availablity
  • Making security changes can take time (re-config can require new software etc.)
46
Q

Cloud based system

A
  • You can control how much security you have on your data
  • usually no physical access
  • concerning that there is a 3rd party access
  • Benefits: these cloud providers provide security to a lot of people and they have a lot of past experience
  • Challenge: want to make sure users are following best practices for access data
  • Tends to be more available (more redundance)
  • May also have additional options (ex: 3rd party firewall, might be less options with on premise)
47
Q

Cryptographic attacks

A
  • How do we know if data that’s been encrypted is really secure from start to delivery?
  • The attacker often doesn’t have the decryption key so they’ll try other things:
  • Ex: Hackers look for vulnerability. Often it’s not the cryptography that’s the problem but the way we’ve implemented the cryptography
48
Q

Birthday Attack

A
  • 23 ppl in a room, 50% chance of someone sharing a birthday
  • B/c you’re comparing every student to every other student (Hash collision)
49
Q

Hash collision

A
  • The same hash values for two different plaintexts
  • Should never happen
  • If you find one, attacker can find the other value that matches the hash
  • Prevention: increase the length of the hash
  • ## Hash should always be unique, however sometimes that doesn’t happen
50
Q

MD5

A
  • Message Digest Algorithm 5
  • Hash algorithm that had a hash collision
  • Hackers created a fake certificate authority
51
Q

Downgrade Attack

A
  • If you are securely communicating, two sides will have a conversations and both sides will determine what the best encryption algorithm will be
  • If you can sit in the middle and influence conversation you can have two sides downgrade their encryption to one that is easily to break
  • EX: TLS POODLE attack (Transport Layer Security) (Padding Oracle On Downgraded Legacy Encryption) successor to SSL, encryption used to communicate to webservers, in TLS they fell back to SSL 3.0.
  • Now ppl program to not allow downgrading to SSL 3.0
52
Q

Privilege Escalation

A
  • Gain higher level access to a system
  • Often attacker will use a normal user (non-admin) and then gain greater access by exploiting a bug / design flaw. Often enabling this normal user to behave as an admin
  • Sometimes it’s a horizontal escalation (gain access to resources of another user at the same level), doesn’t have to be a vertical escalation