2.4 Given a scenario, analyze indicators of malicious activity Flashcards
Physical attacks
- Brute force
- Radio frequency identification
(RFID) cloning - Environmental
Brute Force Attacks in physical attack
● Forcible entry
● Tampering with security devices
● Confronting security personnel
● Ramming a barrier with a vehicle
What is Brute Force attack
Type of attack where access to a system is gained by simply trying all of the possibilities until you break through.
Access Badges
● Use of Radio Frequency Identification (RFID) or Near Field
Communication (NFC) for access
Some of the different methods used by attackers to bypass organization surveillance systems
- Visual Obstruction: blocking, spraying, placing sticker, positioning objects
- Blinding Sensors and Cameras : overwhelming the sensor or camera with a sudden burst of light
Interfering with Acoustics : Jamming or playing loud music to disrupt the microphone’s functionality
Interfering with Electromagnetic: (EMI) : involves jamming the signals that surveillance system relies on to
monitor the environment
Access Badge Cloning
Copying the data from an RFID or NFC card or badge onto another card or device
How does an attacker clone an access badge ?
■ Step 1: Scanning
● Scanning or reading the targeted individual’s access badge
■ Step 2: Data Extraction
● Attackers extract the relevant authentication credentials from the card,
such as a unique identifier or a set of encrypted data
■ Step 3: Writing to a new card or device
● Attacker will then transfers the extracted data onto a blank RFID or NFC
card or another compatible device
■ Step 4: Using the cloned access badge
● Attackers gain unauthorized access to buildings, computer systems, or
even make payments using a cloned NFC-enabled credit card
How can you stop access badge cloning?
■ Implement advanced encryption in your card-based authentication systems
■ Implement Multi-Factor Authentication (MFA)
■ Regularly update your security protocols
■ Educate your users
■ Implement the use of shielded wallets or sleeves with your RFID access badges
■ Monitor and audit your access logs
Malware
Malicious software designed to infiltrate computer systems and potentially
damage them without user consent
Threat Vector
Method used to infiltrate a victim’s machine
Attack Vector
Combines both method of gaining unauthorized access and infection process
Examples of Threat Vector
○ Unpatched software
○ USB drive installation
○ Phishing campaign
Types of Malware Attacks
■ Viruses
■ Worms
■ Trojans
■ Ransomware
■ Spyware
■ Rootkits
Viruses
Attach to clean files, spread, and corrupt host file
Worms
● Standalone programs replicating and spreading to other computers
Trojans
● Disguise as legitimate software, grant unauthorized access
Ransomware
● Encrypts user data, demands ransom for decryption
Zombies and Botnets
● Compromised computers remotely controlled in a network for malicious
purposes
Rootkits
Designed to gain administrative level control over a given computer system
without being detected
Backdoors and Logic Bombs
Backdoors allow unauthorized access, logic bombs execute malicious actions
Keyloggers
● Record keystrokes, capture passwords or sensitive information
■ Spyware and Bloatware
● Spyware monitors and gathers user/system information,
bloatware
consumes resources without value
Malware Techniques and Infection Vectors
■ Evolving from file-based tactics to modern fileless techniques
■ Multi-stage deployment, leveraging system tools, and obfuscation techniques
Fileless Malware is used to create a process in the system memory without
relying on the local file system of the infected host
Indications of Malware Attack
■ Recognizing signs like the following
● Account lockouts
● Concurrent session utilization
● Blocked content
● Impossible travel
● Resource consumption
● Inaccessibility
● Out-of-cycle logging
● Missing logs
● Documented attacks
10 Different Types of Viruses
Boot Sector
Macro
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armored
Hoax
Boot Sector Virus
● One that is stored in the first sector of a hard drive and is then loaded
into memory whenever the computer boots up
Macro Virus
● Form of code that allows a virus to be embedded inside another
document so that when that document is opened by the user, the virus is
executed
Program Virus
● Try to find executables or application files to infect with their malicious
code