Module 6 - Tools and Targets Flashcards
Cyber Attack Outcome
tools and targets vary
- Function as an effective “first strike”
- Deny access to communication and information
Tools / Methods (Name 6)
- Spam and Phishing Attacks
- DDoS
- Botnets
- Fast Flux
- Domain Generation Algorithm
- Disclosing Information (method?)
Spam and Phishing Attacks
- Avg. click-through rate on these e-mails is approx. 10% ( 2010-2011)
- Individuals not real targets. (Unless spear phishing or whaling campaign.)
- For targeted, e-mails aren’t broadcasted to everyone. Particular domain accounts, e.g., usernames@osd.mil. Customers of a particular organization, e.g., a broad, sweeping e-mail labeled as Bank of America.
- Modern attacks route resulting info through victim so 1 IP
DDoS
- commoditized through tools such as LOIC.
Botnets
Hlux / Kelihos botnet - most in US (reliable)
Modified Botnets
- move away from single C2 server (centralized) to hybrid P2P (servant bots and client bots)
Botnets (Name 6)
- Zeus (3,600,000)
- BredoLab (30,000,000)
- Conficker (10,500,000)
- Mariposa (12,000,000)
- Coreflood (2,300,000)
- Cutwail (1,500,000)
Zeus
3,600,000 infections in US
- 10/2010 FBI arrested > 100 bank fraud and money laundering
- stole $70
- May 2011 source code made public
BredoLab
- 30,000,000 infections
- November 2011 Dutch seized 143 C2 servers
Conficker
10,500,000 infections
- July 2010 - suspected creator of “Butterfly bot” arrested.
Coreflood
- April 2011 - FBI had court-order issued for server shutdowns
Botnets for Hire
- Target: US Banking
- Weapon: Botnet zombie, HTTP and UDP requests
- Source: Infected UK website, Izz ad-Din al-Qassam Cyber Fighters (Iran?)
- Motive: film trailer mocking prophet Muhammad on YouTube (failure to remove)
Fast Flux (define)
Numerous IP addresses associated with a single, fully qualified domain name
IP addresses are swapped in and out with extremely high frequency, through changing DNS records
single & double
Single-flux vs double-flux
Single: Multiple individual nodes within the network registering and de-registering their addresses as part of the DNS A (address) record list for a single DNS name.
Round-robin with short TTL
Double: Multiple nodes within the network registering and de-registering their addresses as part of the DNS Name Server record list for the DNS zone
Domain Generation Algorithm
- used to periodically generate a large # of domain names to be used as rendezvous points with botnet controllers.
- makes it difficult to track and effectively shut down botnets as infected computers will attempt to contact some of these domain names every day to receive updates or commands.
Use of public key cryptography makes it impossible to mimic commands from the malware controllers
Examples:
Conficker, Murofet, BankPatch, Baboons