Skip to content
This repository has been archived by the owner on Nov 2, 2024. It is now read-only.

Latest commit

 

History

History
executable file
·
319 lines (218 loc) · 10.5 KB

017-Cyber-Threats-and-Attacks.md

File metadata and controls

executable file
·
319 lines (218 loc) · 10.5 KB

Threats

Threat Actors

A Threat Actor is defined as an individual or a group posing a threat (according to NIST SP 800-150 under Threat Actor).

To learn more, please see Threat Actors.

Attacker

An Attacker is always an individual, but a Threat Actor can be either a group or an entity. The three most common goals of cybersecurity attackers are DAD:

  • Disclosure
  • Alteration
  • Denial

To learn more about common attacks, please see Attacks.

Hackers

There are five types of hackers:

  • White Hats
  • Black Hats
  • Gray Hats
  • Blue Hats
  • Elite

Types of Hackers

White Hats

Non-malicious hackers who attempt to break into a company’s systems at their request.

  • Normally contracted and paid by the company.
  • Ethical hackers and penetration testers

Black Hats

Malicious hackers who break into computer systems and networks without authorization or permission.

Gray Hats

Hackers without any affiliation to a company who attempt to break into a company’s network but risk the law by doing so.

Difference with Black Hat: Gray hats doesn't have any malicious intent.

Blue Hats

Hackers who attempt to hack into a network with permission of the company but are not employed by the company.

  • Freelance ethical hacker/penetration tester
  • Bug bounty programs

Elite

Hackers who find and exploit vulnerabilities before anyone else does. 1 in 10,000 are elite.

  • Create their own tools, which everyone ends up using.

Script kiddies

Script kiddies have limited skill and only run other people’s exploits and tools.

  • Other end of spectrum, normally babies of the bunch.
  • Little to no skill
  • Most people start as script kiddies

Types of Threats

There are many types of cyber threats to organizations. Below are several of the most common types:

Malware

Malicious software designed to harm or exploit systems.

  • Examples are viruses, worms, trojans.
  • More details about malwares can be found here: Malware

Virus

A virus requires user interaction, such as opening an infected file or running a malicious program, to spread.

Types of viruses:

  • Boot Sector

    • Stored in the first sector of a hard drive and is then loaded into memory during boot up.
    • Infects the master boot record; spreads when the system boots from an infected disk.
    • Difficult to detect because they're installed before OS boots up.
    • Mitigation:
      • Use an antivirus that specifically looks for boot sector viruses.
      • These AVs are usually ran from a network AV scanning engine.
  • Macro

    • A form of code that allows virus to be embedded inside documents.
    • Infects macros within documents or spreadsheet applications.
    • They spread when these files are opened.
    • By default, they aren't maliciousl; they're used to add functions to documents
  • Program

    • Attaches itself to executable files and spreads when the infected program is run.
    • Target program/apps because they can infect the system anytime the user opens the compromised application.
  • Multipartite

    • Combines boot sector and file viruses, spreading in multiple ways.
    • Gets loaded up every time the computer boots up.
    • It can then install itself within a program, when run, will infect every time.
    • This ensures that the virus persists in your machine.
  • Encrypted

    • Encrypted, to evade detection by antivirus software, decrypting itself when executed.
    • Malicious code is scrambled into cipher text, unreadable to user and AV software.
  • Polymorphic

    • Advance version of encrypted virus, but it also alter the decryption module.
    • This changes its code each time it infects a new system to avoid detection.
    • Ensures it can evade detection.
  • Metamorphic

    • Advance version of a polymorphic virus.
    • Rewrites its own code to appear different each time it infects.
    • Changes entirely before it attempts to infect a given file.
    • This maakes it hard to detect.
  • Stealth

    • More of a technique used to prevent the virus from being detected.
    • Hides its presence by intercepting and modifying system calls and antivirus queries.
  • Armor

    • Have a layer of protection to confuse a program or a person trying to analyse it.
    • Uses complex code to shield itself from detection and removal by security tools.
  • Hoax

    • Not a virus, but a form of social engineering technique.
    • Often used to trick users into spreading misinformation or buying unnecessary software.

Worm

A worm can replicate and spread automatically without user intervention.

  • Takes advantage of vulnerabilities in systems and applications.
  • Dangerous, can infect computers and computing assets.
  • Cause disruptions because they constantly try to replicate and spread.
  • Consumes network, compute resources, power when it spread, slowing down the system.

Trojan

Trojans can also create backdoors but are only active while a specific application is running.

  • Malware disguised as a piece of harmless or desirable software.
  • Not as effective as a rootkit, which maintain root-level access while concealing malicious activity.

RAT (Remote Access Trojan)

  • Widely used because it provides the attacker with remote control of the machine.
  • Earliest version is a testris game which infected with the trojan.
  • The game is installed into floppy disks and share between friends.

Mitigation:

  • Use an AV or Anti-malware prior to opening or installing any program.
  • Ensure your system is patched against any vulnerabilities.

Ransomware

Malware that encrypts files, demanding payment for their release.

  • Blocks access to computer or its data until the ransom is paid.
  • Example: WannaCry, CryptoLocker

Mitigation:

  • Conduct regular backups.
  • Install regular software updates.
  • Provide security awareness training.
  • Implementing MFA for the systems.

Zombies and Botnets

A botnet is a network of compromised computers, known as zombies or bots , which are remotely controlled by malicious actors.

  • Created using other types of malwares to gain access to a system and victimize it.
  • Zombies are used to perform tasks using remote commands.

Command and Control Node (C2 Node)

  • Used for managing and coordinating the activities of the zombies.
  • Can use zombies as pivot points to gain access to new victims.
  • Can use a zombie to make it look like the infected computer is performing the attach.
  • It can also store illegal media on the infected machines inside of the botnet.
  • Commonly used to perform a DDoS attack.

Rootkits

A rootkit tries to maintain root-level access while concealing malicious activity.

  • Typically creates a backdoor and attempts to remain undetected by anti-malware software.
  • A rootkit remains active while the system is running.
  • Digs into the OS deeply, making it difficult for AV systems to detect it.

DLL Injection

  • Run arbitrary code within the address space of another process.
  • This forces it to load a dynamic-link library
  • DLLs are often provided by default inside of the Windows OS.
  • DLLs are designed to load everytime the Windows machine is loaded, using a shim.

Shim

  • Software code that is placed between two components
  • Intercepts call between the two components and redirect those calls

Mitigation:

  • Conduct an external system scan.
  • Continuous vigilance and security measures.

Backdoors and Logic Bombs

Backdoors

  • Covert method to bypass normal security and authentication functions of the systems.
  • Backdoors are originally created to do maintenance and repairs.
  • An example is the Remote Access Trojan (RAT)

Easter Eggs

  • Insecure coding practice used to provide a joke or gag gift to users.
  • Closely related to logic bombs.
  • Example: Type "barrel roll" in the Google search bar.

Logic Bombs

  • Malicious code intentionally inserted into a software system.
  • Triggers a negative function when certain conditions are met.
  • Typically not installed by logic bombs, instead planted by people with inside access.
  • Mitigation:
    • Restrict system access to authorized personnel.
    • Regularly review code for malicious inserts.
    • Monitor for unusual system behavior.
    • Educate on cybersecurity best practices.

Key Logger

A piece of a software or hardware that records every single keystroke made on the device.

  • Originally created by system administrators to help in troubleshooting.
  • Recorded key strokes are sent back to the threat actor without the user's consent.
  • Can lead to identity theft, financial fraud, and corporate espionage

Mitigation:

  • Perform regular updates and patches.
  • Use quality AV and Anti-malware solutions.
  • Conduct Phishing awareness training for end users.
  • Implement MFA.
  • Encrypt keystrokes being sent to the systems.
  • Perform physical checks on desktops, laptops, and servers.

Spyware and Bloatware

Spyware

  • Gather and send information about a user or organization
  • Can be installed as a bundle with other software, or through a malicious website.
  • Invades privacy; can also slow down the system
  • Mitigation:
    • Use reputable AV and anti-spyware that are regularly updated.
    • Only use software from trusted sources.
    • Always read the End-User License Agreement (EULA).
    • Ensure your OS is up-to-date and patched.

Bloatware

  • Any software that comes pre-installed on a new computer or smartphone.
  • Users did not request or need this software, but are bundled with the main software.
  • Not dangerous, but takes up resources such as RAM.
  • Mitigation:
    • Manually remove them.
    • Use bloatware removal tools.
    • Perform a clean OS installation.

Back to main page