Course 5 - Week 4 - Common threats Flashcards
What is Social Engineering?
It is a manipulation technique in which a threat actor tries to trick someone into disclosing sensitive information.
Examples are phishing, Social media phishing, USB baiting etc
What are the stages of a Social engineering attack?
It has 4 stages -
- Preparation - In this stage, the attacker prepares for his attack.
- Establishing trust - in this stage, the attacker opens the line of communication with his target.
- Use of persuasion tactics -
- Disconnecting from the target / breaking the contact with target -
Give me some examples of Social Engineering attacks.
- Baiting
- Physical Social engineering
- Phishing
- Watering Hole attack
- Qid Pro Quo
What is Qid Pro Quo attack?
It is a type of baiting used to trick some into believing that they will be rewarded in return for sharing access, information, or money.
Give me an example of some measures/controls that we can implement to prevent Social engineering attacks.
Firewall rules, MFA, Email filtering, and block lists are examples of a few layers that we can add to our defenses.
What is a phishing kit and what it includes?
It is a toolkit for attackers who run phishing campaigns.
It entails the following tools :
- Malicious attachments
- Malicious/fraudulent web links
- Fake Data collection forms
What is Angler phishing?
It is a phishing technique in which attackers impersonate customer service representatives on Social Media.
What is Malware?
It stands for Malicious Software. It is malicious software or program that is designed to harm computer or to interfere with its normal functions.
There are different kind of Malwares like Virus, Worms etc
What is a Virus?
It is a type of Malware that infects an endpoint when some executable infected with this malware is actioned by some user.
It modifies the existing files on a system or fully replaces them with the malware code.
For example - opening an infected Word file.
What is a Worm?
It is a type of malware that will self-replicate itself onto other devices on the network once it is installed on one device on a network.
What is an Adware?
It is a type of PUA - Potentially unwanted application.
It is run when some legitimate application/ program is run by the user. It might display ads, crash systems or install other unwanted software.
What is Trojan?
It is a type of Malware that is hidden in some legitimate Software. It might give unauthorized access to an attacker or it might also provide a backdoor to an attacker.
One way of deploying this malware is through phishing email links or attachments.
What is Spyware?
It is a type of malware that collects and sells information without consent. It is also considered a PUA.
What is Scareware?
It is another kind of PUA in which attackers scare users into infecting their own devices.
Emails and pop-ups are a couple of ways scareware is spread.
What is Fileless Malware?
Fileless malware does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer. This type of infection resides in memory where malware never touches the hard drive. This is unlike other types of malware stored within a file on disk. Instead, these stealthy infections get into the operating system or hide within trusted applications.
Fileless malware is detected by performing memory analysis requiring operating system experience.
In a nutshell, fileless malware does not leave any footprints. It might not have its one file stored on the hard drive. It might only exist in memory so restarting the system might remove this fileless malware.
It might also exist as changed registry files and can avoid detection.
What are rootkits?
It is malware that provides remote administrative access to a computer. Most attackers use rootkits to open a backdoor to a system.
Rootkits might impersonate themselves as legit drivers and can also hide them in the BIOS.
What is botnet
it is the collection of computers infected with a bot malware that can be controlled from the command and control server by a bot herder.
Viruses, worms, Trojans are often used to spread the initial infection and them them into a bot.
What is a Ransomware attack?
It is an attack in which a threat actor encrypts the organization’s data and then asks for money to decrypt it.
What is cryptojacking?
It is a form of malware that installs software to illegally mine cryptocurrencies.
Normally cryptojacking malware is used to gain unauthorized control of personal computers to mine cryptocurrency.
What are the common signs of Cryptojacking?
System slowdown
Increased CPU usage
Sudden System crashes
Fast draining batteries
Unusually high electricity bill
What are the common measures that we can take to defend against malware?
Using web browser extensions that block malware
ad-block extension
Disabling Java-script
Staying up to date with security trends
What is a web-based exploit?
It is an exploit on the web server in which malicious code is executed on the server using some vulnerability.