Module 6 - Tools and Targets Flashcards

1
Q

Cyber Attack Outcome

A

tools and targets vary

  • Function as an effective “first strike”
  • Deny access to communication and information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Tools / Methods (Name 6)

A
  • Spam and Phishing Attacks
  • DDoS
  • Botnets
  • Fast Flux
  • Domain Generation Algorithm
  • Disclosing Information (method?)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spam and Phishing Attacks

A
  • Avg. click-through rate on these e-mails is approx. 10% ( 2010-2011)
  • Individuals not real targets. (Unless spear phishing or whaling campaign.)
  • For targeted, e-mails aren’t broadcasted to everyone. Particular domain accounts, e.g., usernames@osd.mil. Customers of a particular organization, e.g., a broad, sweeping e-mail labeled as Bank of America.
  • Modern attacks route resulting info through victim so 1 IP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DDoS

A
  • commoditized through tools such as LOIC.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnets

A

Hlux / Kelihos botnet - most in US (reliable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Modified Botnets

A
  • move away from single C2 server (centralized) to hybrid P2P (servant bots and client bots)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Botnets (Name 6)

A
  • Zeus (3,600,000)
  • BredoLab (30,000,000)
  • Conficker (10,500,000)
  • Mariposa (12,000,000)
  • Coreflood (2,300,000)
  • Cutwail (1,500,000)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Zeus

A

3,600,000 infections in US

  • 10/2010 FBI arrested > 100 bank fraud and money laundering
  • stole $70
  • May 2011 source code made public
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

BredoLab

A
  • 30,000,000 infections

- November 2011 Dutch seized 143 C2 servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Conficker

A

10,500,000 infections

- July 2010 - suspected creator of “Butterfly bot” arrested.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Coreflood

A
  • April 2011 - FBI had court-order issued for server shutdowns
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Botnets for Hire

A
  • Target: US Banking
  • Weapon: Botnet zombie, HTTP and UDP requests
  • Source: Infected UK website, Izz ad-Din al-Qassam Cyber Fighters (Iran?)
  • Motive: film trailer mocking prophet Muhammad on YouTube (failure to remove)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Fast Flux (define)

A

Numerous IP addresses associated with a single, fully qualified domain name
IP addresses are swapped in and out with extremely high frequency, through changing DNS records

single & double

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Single-flux vs double-flux

A

Single: Multiple individual nodes within the network registering and de-registering their addresses as part of the DNS A (address) record list for a single DNS name.
Round-robin with short TTL

Double: Multiple nodes within the network registering and de-registering their addresses as part of the DNS Name Server record list for the DNS zone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Generation Algorithm

A
  • used to periodically generate a large # of domain names to be used as rendezvous points with botnet controllers.
  • makes it difficult to track and effectively shut down botnets as infected computers will attempt to contact some of these domain names every day to receive updates or commands.
    Use of public key cryptography makes it impossible to mimic commands from the malware controllers
    Examples:
    Conficker, Murofet, BankPatch, Baboons
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Domain Generation Algoritm (4 examples)

A

Conficker,
Murofet,
BankPatch,
Baboons

17
Q

Disclosing Information

A

Purpose of Sharing;

  • Cause embarrassment
  • Inform fellow activists without direct communication
  • Hope that someone – anyone – else will follow-up
18
Q

Doxing

A

Act of publishing private information about individuals or organizations on the Internet

19
Q

Traditional Targets (Name 4 with goal)

A
- Government websites 
      Show the security as being weak
      Publish its own message
      Obtain news coverage
- Defense systems – military advantage
- Financial systems
- Corporations with trade secrets
20
Q

Banks as Targets - Changing Trends

A
Attacks on banks are not limited to DDoS
Percentage of attacks on U.S. banks, which resulted in funds transfers:
2009: 70%
2011: 12%
Q1 & Q2 2012: 9%
Tools: Trojans & Phishing attacks
Corporate customers targeted:
2.1/1000 in Q1 & Q2 2012
3.4/1000 in 2011
21
Q

Non-Traditional Targets (2)

A
  • SCADA

- power

22
Q

SCADA

A

Supervisory Control and Data Acquisition systems
Used to control and monitor system processes
Industrial
Infrastructure
Facilities

23
Q

Power industries (3)

A

Electrical
Atomic
Petrochemical (oil and gas)

24
Q

Large Scale Assault Option

A

New missile emits microwaves to overload computers and electrical systems
Cost: $38 million