CompTIA Security+ Flashcards 2
study
Pass the Hash Attack
provides a captured authentication hash to try to act like an authorized user.
Internal vs. External
We most often think about the threat actors who exist outside our organizations: competitors, criminals, and the curious. However, some of the most dangerous threats come from within our own environments.
Level of Sophistication/Capability
range from the unsophisticated/unskilled attacker simply running code borrowed from others to the advanced persistent threat (APT) actor exploiting Vulnerabilities discovered in their own research labs and unknown to the security community.
Resources/Funding
Just as threat actors vary in their sophistication, they also vary in the resources available to them. Highly organized attackers sponsored by organized crime or national governments often have virtually limitless resources, whereas less organized attackers may simply be hobbyists working in their spare time.
Intent/Motivation
Attackers also vary in their motivation and intent. The unskilled attacker may be simply out for the thrill of the attack whereas competitors may be engaged in highly targeted corporate espionage.
Nation-states
seek to achieve political objectives; organized crime often focuses on direct financial gain.
OR
attackers hacking into either foreign governments or corporations.
Unskilled Attackers
the term script kiddie is a derogatory term for unskilled attackers who Use hacking techniques but have limited skills.
Hacktivists
Hacktivists Use hacking techniques to accomplish some activist goal.
Organized crime
appears in any case where there is money to be made, and cybercrime is no exception.
Advanced persistent threats (APTs)
describes a series of attacks that they first traced to sources connected to the Chinese military.
Zero-day attacks
Attacks that exploit these vulnerabilities. Zero-day attacks are particularly dangerous because they are unknown to product vendors, and therefore, no patches are available to correct them.
Insider attacks
occur when an employee, contractor, vendor, or other individual with authorized access to information and systems uses that access to wage an attack against the organization.
Shadow IT
individuals and groups seek out their own technology solutions
Attacker Motivations:
Data exfiltration
-Espionage
-Service disruption
-Blackmail
-Financial gain
-Philosophical/political belief
-Ethical attacks
-Revenge attacks
-disruption/chaos
-War
Data exfiltration
attacks are motivated by the desire to obtain sensitive or proprietary information, such as customer data or intellectual property.
Espionage
attacks are motivated by organizations seeking to steal secret information from other organizations. This may come in the form of nation-states attacking each other or corporate espionage.B35
Service disruption
attacks seek to take down or interrupt critical systems or networks, such as banking systems or health-care networks.
Blackmail
attacks seek to extort money or other concessions from victims by threatening to release sensitive information or launch further attacks.
Financial gain
attacks are motivated by the desire to make money through theft or fraud. Organized crime is generally motivated by financial gainas are other types of attackers.
Philosophical/political belief
attacks are motivated by ideological or political reasons such as promoting a particular cause or ideology. Hacktivists are generally motivated by philosophical or political beliefs.
Ethical attacks
or white-hat hacking are motivated by a desire to expose vulnerabilities and improve security. These attacks are often carried out by security researchers or ethical hackers with the permission of the organization being tested.
Revenge attacks
are motivated by a desire to get even with an individual or organization by embarrassing them or exacting some other form of retribution against them.
Disruption/chaos
attacks are motivated by a desire to cause chaos and disrupt normal operations.
War
may also be a motivation for cyberattacks. Military units and civilian groups may Use hacking in an attempt to disrupt Military operations and change the outcome of an armed conflict.
Threat actors
targeting an organization need some means to gain access to that organization’s information or systems.
Attack Surfaces
This is a system, application, or service that contains a vulnerability that they might exploit.
Threat vectors
are the means that threat actors Use to obtain access
Message-based
attacks may also be carried out through other communications mechanisms such as by sending text messages through Short Message Service (SMS) or instant messaging (IM) applications. Voice calls may also be used to conduct vishing (voice phishing) attacks.
Message-Based Threat Vectors Examples
Email is one of the most commonly exploited threat vectors. Phishing messages, spam messages, and other email-borne attacks are simple ways to gain access to an organization’s network. Social media may be used as a threat vector in similar ways
Wireless Networks
offer an even easier path onto an organization’s network.
Systems
individual systems may also serve as threat vectors depending on how they are configured and the software installed on them
Files and Images
Individual files, including images, may also be threat vectors. An attacker may create a file that contains embedded malicious code and then trick a user into opening that file, activating the malware infection. These malicious files may be sent by email, stored on a file server, or placed in any other location where an unsuspecting user might be tempted to open it.
Removable Devices
Attackers also commonly use removable media, such as USB drives, to spread malware and launch their attacks. An attacker might distribute inexpensive USB sticks in parking lots, airports, or other public areas, hoping that someone will find the device and plug it into their computer, curious to see what it contains. As soon as that happens, the device triggers a malware infection that silently compromises the finder’s computer and places it under the control of the attacker.
Cloud
Cloud services can also be used as an attack vector. Attackers routinely scan popular cloud services for files with improper access controls, systems that have security flaws, or accidentally published API keys and passwords.
Supply Chain
Sophisticated attackers may attempt to interfere with an organization’s IT supply chain, including hardware providers, software providers, and service providers. Attacking an organization’s vendors and suppliers provides an indirect mechanism to attack the organization itself.
Indicators of compromise (IOCs)
These are the telltale signs that an attack has taken place and may include file signatures, log patterns, and other evidence left behind by attackers. IoCs may also be found in file and code repositories that offer threat intelligence information.
Malware
describes a wide range of software that is intentionally designed to cause harm to systems and devices, networks, or users.
Ransomware
is malware that takes over a computer and then demands a ransom.
Indicators of compromise (IoCs) for ransomware include, but are not limited to:
-Command and control (C&C) traffic and/or contact to known malicious IP addresses
-Use of legitimate tools in abnormal ways to retain control of the compromised system
-Lateral movement processes that seek to attack or gain information about other systems or devices inside the same trust boundaries
-Encryption of files
-Notices to end users of the encryption process with demands for ransom
-Data exfiltration behaviors, including large file transfers
Trojan
or Trojan horses are a type of malware that is typically disguised as legitimate software
Bots
connect to command and control (C&C) systems, allowing them to be updated, controlled, and managed remotely.
Bots, Botnets, and Command and Control
Many types of malware use command and control (C&C) techniques and systems to allow attackers to tell them what to do. These groups of systems that are under central command are called botnets, and individual systems are called bots.
Worms & Examples
are malware that spread themselves on networks via vulnerable services, email, or file shares.
Examples:
-Known malicious files
-Downloads of additional components from remote systems
-Command and control contact to remote systems
-Malicious behaviors using system commands for injection and other activities, including use of cmd.exe, msiexec.exe, and others
-Hands-on-keyboard attacker activity
Spyware & Examples
is malware that is designed to obtain information about an individual, organizations, or systems
Examples:
-Remote-access and remote-control-related indicators
-Known software file fingerprints
-Malicious processes, often disguised as system processes
-Injection attacks against browsers
Bloatware
describe unwanted applications installed on systems by manufacturers.
Viruses & Examples
are malicious programs that self-copy and self-replicate once they are activated.
Examples:
Memory-resident viruses
Non-memory-resident viruses
Boot sector viruses
Macro viruses
Fileless virus
Memory-resident viruses
which remain in memory while the system of the device is running
Non-memory
which execute, spread, and then shut down
Boot sector viruses
which reside inside the boot sector of a drive or storage media
Macro viruses
which use macros or code inside word processing software or other tools to spread
Email viruses
that spread via email either as email attachments or as part of the email itself using flaws inside email clients
Fileless virus
They spread via methods like spam email and malicious websites and exploit flaws in browser plug-ins and web browsers themselves. Once they successfully find a way into a system, they inject themselves into memory and conduct further malicious activity, including adding the ability to reinfect the system via the same process at reboot through a Registry entry or other technique. At no point do they require local file storage, as they remain memory resident throughout their entire active life.