Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

1.1.1.5 Lab - Cybersecurity Case Studies

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3
At a glance
Powered by AI
The document discusses four major cyber attacks: the Home Depot security breach, Target credit card breach, Stuxnet virus, and Sony Pictures Entertainment hack. It provides details on who the victims were, what technologies were used, when the attacks occurred, what systems were targeted, and the motivations and outcomes of the attackers.

The major cyber attacks discussed are the Home Depot security breach (2014), Target credit card breach (2013), Stuxnet virus (2010), and Sony Pictures Entertainment hack (2014).

Home Depot: POS systems; Target: POS terminals and stolen card/personal data; Stuxnet: Iranian uranium centrifuges' PLC systems; Sony: servers

Lab - Cybersecurity Case Studies

Objectives
Research and analyze cyber security incidents

Background / Scenario
Governments, businesses, and individual users are increasingly the targets of cyberattacks and experts
predict that these attacks are likely to increase in the future. Cybersecurity education is a top international
priority as high-profile cyber-security related incidents raise the fear that attacks could threaten the global
economy. The Center for Strategic and International Studies estimates that the cost of cybercrime to the
global economy is more than $400 billion annually and in the United State alone as many as 3000 companies
had their systems compromised in 2013. In this lab you will study four high profile cyberattacks and be
prepared to discuss the who, what, why and how of each attack.

Required Resources
● PC or mobile device with Internet access

Step 1: Conduct search of high profile cyberattacks.


a. Using your favorite search engine conduct a search for each of the cyberattacks listed below. Your search
will likely turn up multiple results ranging from news articles to technical articles.
Home Depot Security Breach
Target Credit Card Breach
The Stuxnet Virus
Sony Pictures Entertainment Hack
Note: You can use the web browser in virtual machine installed in a previous lab to research the hack. By
using the virtual machine, you may prevent malware from being installed on your computer.
b. Read the articles found from your search in step 1a and be prepared to discuss and share your research
on the who, what, when, where, and why of each attack.

Step 2: Write an analysis of a cyberattack.


Select one of the high-profile cyberattacks from step 1a and write an analysis of the attack that includes
answers to the questions below.
a. Who were the victims of the attacks?
Home Depot Security Breach :
home depot and also it’s customer
Target Credit Card Breach :
40 million credit and debit card numbers and 70 million records of personal information were stolen
The Stuxnet Virus :
Its purpose was not just to infect PCs but to cause real-world physical effects. The victim is Iranian
uranium centrifuges.

© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 3 www.netacad.com
Lab – Cybersecurity Case Studies

Sony Pictures Entertainment Hack :


Sony Pcitures Entertaimen and state officials

b. What technologies and tools were used in the attack?


Home Depot Security Breach : custom built malware
Target Credit Card Breach :
The Stuxnet Virus :
When it infects a computer, it checks to see if that computer is connected to specific models of
programmable logic controllers (PLCs) manufactured by Siemens. PLCs are how computers interact with
and control industrial machinery like uranium centrifuges. The worm then alters the PLCs' programming,
resulting in the centrifuges being spun too quickly and for too long, damaging or destroying the delicate
equipment in the process. While this is happening, the PLCs tell the controller computer that everything is
working fine, making it difficult to detect or diagnose what's going wrong until it's too late.
Sony Pictures Entertainment Hack : Malware

c. When did the attack happen within the network?


Home Depot Security Breach :april to September 2014
Target Credit Card Breach : November 27 and December 18, 2013,
The Stuxnet Virus :
2010
Sony Pictures Entertainment Hack : 24 November 2014

d. What systems were targeted?


Home Depot Security Breach : POS (Point Of Sale) terminal
Target Credit Card Breach : PoS terminals and stolen card and person data
The Stuxnet Virus :
Worm ini awalnya menyebar secara membabi buta, tetapi memuat muatan perangkat perusak yang
sangat khusus yang dirancang hanya mengincar sistem Kontrol Pengawas Dan Akuisisi Data Siemens
(SCADA, Siemens Supervisory Control And Data Acquisition) yang diatur untuk mengendalikan dan
memantau proses industri tertentu. Stuxnet menginfeksi PLC dengan mengubah aplikasi perangkat lunak
Step-7 yang digunakan untuk memprogram ulang perangkat tersebut.
Sony Pictures Entertainment Hack : Server Sony Picture Entertaiment
e. What was the motivation of the attackers in this case? What did they hope to achieve?
Home Depot Security Breach :To get information customer email address so they can do phising
Target Credit Card Breach : These two serious mistakes hindered the detection of the leakage of
millions of credit card information. For large corporations, processing a large number of security alerts
produced by protection systems is challenging, if possible at all.
The Stuxnet Virus :

© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 2 of 3 www.netacad.com
Lab – Cybersecurity Case Studies

The U.S. and Israeli governments intended Stuxnet as a tool to derail, or at least delay, the Iranian
program to develop nuclear weapons. The Bush and Obama administrations believed that if Iran were on
the verge of developing atomic weapons, Israel would launch airstrikes against Iranian nuclear facilities in
a move that could have set off a regional war. Operation Olympic Games was seen as a nonviolent
alternative. Although it wasn't clear that such a cyberattack on physical infrastructure was even possible,
there was a dramatic meeting in the White House Situation Room late in the Bush presidency during
which pieces of a destroyed test centrifuge were spread out on a conference table. It was at that point
that the U.S. gave the go-head to unleash the malware.
Sony Pictures Entertainment Hack :
The motivation in this attack was that the hackers did not accept the screening of the film "The Interview"
which Sony planned to release during the long Christmas holiday period. tells the story of a TV journalist
who was commissioned by the CIA (US secret service) to kill the North Korean leader, Kim Jong-un.
Although the film has the theme of action comedy. Their hopes demanded that Sony immediately stop the
screening of terrorist films that could break the peace of a region and be the cause of the war.
f. What was the outcome of the attack? (stolen data, ransom, system damage, etc.)
Home Depot Security Breach :payment card data and 53 milion customer email addresses .
Target Credit Card Breach : Collecting card information from PoS,Aggregating stolen card and person
data and Phishing attack against Fazio Mechanical Service
The Stuxnet Virus :
Stuxnet was first identified by the infosec community in 2010, but development on it probably began in
2005. Despite its unparalleled ability to spread and its widespread infection rate, Stuxnet does little or no
harm to computers not involved in uranium enrichment. When it infects a computer, it checks to see if that
computer is connected to specific models of programmable logic controllers (PLCs) manufactured by
Siemens. PLCs are how computers interact with and control industrial machinery like uranium centrifuges.
The worm then alters the PLCs' programming, resulting in the centrifuges being spun too quickly and for
too long, damaging or destroying the delicate equipment in the process. While this is happening, the
PLCs tell the controller computer that everything is working fine, making it difficult to detect or diagnose
what's going wrong until it's too late.
Sony Pictures Entertainment Hack :
Recorded, as many as five Sony Pictures films that have not been released have been stolen and
distributed on the internet.Payroll list of 6,000 employees and Sony officials also circulated. Personal data
from film actors and practitioners who have collaborated with Sony also spread widely in cyberspace.

© Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 3 www.netacad.com

You might also like