Risk - Attackers and types of attacks Flashcards

1
Q

Bots

A

are a system with malware controlled by a botnet.
 The system is compromised by an attack or the user installing a remote access trojan (game or application with a hidden payload).
 They often use IRC, HTTP, or HTTPS.
 Some are dormant until activated.
 Others are actively sending data from the system (Credit card/bank information for instance).
 Active bots can also can be used to send spam emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Botnets

A

Botnets is a C&C (Command and Control) network, controlled by people (bot-herders).
 There can often be 1,000s or even 100,000s of bots in a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Phishing (Social engineering email attack):
 Click to win, Send information to get your inheritance …
 Sent to hundreds of thousands of people; if just 0.02% follow the instructions they have 200 victims.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spear Phishing:

A

Targeted phishing, not just random spam, but targeted at specific individuals.
Sent with knowledge about the target (person or company); familiarity increases success.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Whale Phishing (Whaling):

A

Spear phishing targeted at senior leadership of an organization.
 This could be: “Your company is being sued if you don’t fill out the attached documents (with trojan in them) and return them to us within 2 weeks”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Vishing (Voice Phishing):

A

Attacks over automated VOIP (Voice over IP) systems, bulk spam similar to phishing.
 These are: “Your taxes are due”, “Your account is locked” or “Enter your PII to prevent this” types of calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly