Chapter 2- Computer Threat
Chapter 2- Computer Threat
Chapter 2- Computer Threat
Introduction:
Threat in a computer system is a possible danger that might put your data security on stake. The
damage is at times irreparable.
Definition
As defined by the National Information Assurance Glossary −
“Any circumstance or event with the potential to adversely impact an IS through
unauthorized access, destruction, disclosure, modification of data, and/or denial of
service.
A computer threat can be "intentional" such as hacking or "accidental" such as
malfunctioning of or physical damage.
Types of Threat
Following are the most common types of computer threats −
Physical damage − It includes fire, water, pollution, etc.
Natural events − It includes climatic, earthquake, volcanic activity, etc.
Loss of services − It includes electrical power, air conditioning, telecommunication, etc.
Technical failures − It includes problems in equipment, software, capacity saturation,
etc.
Deliberate type − It includes spying, illegal processing of data, etc.
Some other threats include error in use, abuse of rights, denial of actions, eavesdropping, theft of
media, retrieval of discarded materials, etc.
Sources of Threat
The possible sources of a computer threat may be −
Internal − It includes employees, partners, contractors (and vendors).
External − It includes cyber-criminals (professional hackers), spies, non-professional
hackers, activists, malware (virus/worm/etc.), etc.
Malicious code is code inserted in a software system or web script intended to cause undesired
effects, security breaches, or damage to a system.
1
What is Malicious Code?
Malicious code is a self-executable computer program that assumes various forms. Malicious
code is designed to grant cybercriminals unlawful remote access to the targeted system, thus
creating an application backdoor. In doing so, hackers gain access to private data stored on the
network and can go as far as to steal, leak, encrypt, or completely wipe it.
2.1.1 Viruses
A computer virus is a type of malicious software, or malware, that spreads between computers
and causes damage to data and software.
Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss
and leakage. A key thing to know about computer viruses is that they are designed to spread
across programs and systems. Computer viruses typically attach to an executable host file, which
results in their viral codes executing when a file is opened. The code then spreads from the
document or software it is attached to via networks, drives, file-sharing programs, or infected
email attachments.
Speed of System: A computer system running slower than usual is one of the most common
signs that the device has a virus
Pop-up Windows: Unwanted pop-up windows appearing on a computer or in a web browser are
a telltale sign of a computer virus.
2
Accounts Being Logged Out: Some viruses are designed to affect specific applications, which
will either cause them to crash or force the user to automatically log out of the service.
Crashing of the Device: System crashes and the computer itself unexpectedly closing down are
common indicators of a virus.
Mass Emails Being Sent from Your Email Account: Computer viruses are commonly spread
via email. Hackers can use other people's email accounts to spread malware and carry out wider
cyber attacks. Therefore, if an email account has sent emails in the outbox that a user did not
send, then this could be a sign of a computer virus.
There are several ways to protect your computer from viruses, including:
Use a Trusted Antivirus Product: Trusted computer antivirus products are crucial to stop
malware attacks and prevent computers from being infected with viruses.
Avoid Clicking Pop-up Advertisements: Never click on pop-up advertisements because this
can lead to inadvertently downloading viruses onto a computer.
Scan Your Email Attachments: A popular way to protect your device from computer viruses is
to avoid suspicious email attachments, which are commonly used to spread malware. Computer
antivirus solutions can be used to scan email attachments for potential viruses.
Scan the Files That You Download Using File-sharing Programs: File-sharing programs,
particularly unofficial sites, are also popular resources for attackers to spread computer viruses.
Avoid downloading applications, games, or software from unofficial sites, and always scan files
that have been downloaded from any file-sharing program.
3
Never open a link or run a program shipped to you in an email from somebody you
dont have the foggiest idea about.
Ensure a Trojan antivirus is installed and running on your PC
2.1.3 Worms
A computer worm is a subset of the Trojan horse malware that can propagate or self-replicate
from one computer to another without human activation after breaching a system. Typically, a
worm spreads across a network through your Internet or LAN (Local Area Network) connection.
Phishing: Fraudulent emails that look authentic can carry worms in corrupt attachments.
Such emails may also invite users to click malicious links or visit websites designed to
infect users with worms.
Spear-Phishing: Targeted phishing attempts can carry dangerous malware like
ransomware and crypto worms.
Networks: Worms can self-replicate across networks via shared access.
Security holes: Some worm variants can infiltrate a system by exploiting software
vulnerabilities.
File sharing: P2P file networks can carry malware like worms.
Social networks: Social platforms like MySpace have been affected by certain types of
worms.
Instant messengers (IMs): All types of malware, including worms, can spread through
text messages and IM platforms such as Internet Relay Chat (IRC).
External devices: Worms can infect USB sticks and external hard drives.
Once a computer worm has breached your computers defenses it can perform several malicious
actions:
4
Deplete hard drive space
Over the years, there have been some particularly devastating worms. Some worms have caused
billions in damage. Here is a brief list of some infamous ones:
Morris Worm: Also known as the Internet worm, this was one of the first computer
worms to spread via the Internet and earn notoriety in the media.
Bagle: Also known as Beagle, Mitglieder, and Lodeight, this mass-mailing worm had
many variants.
Blaster: Also known as MSBlast, Lovesan, and Lovsan, this worm attacked computers
running Windows XP and Windows 2000.
Conficker: Also known as Downup, Downadup, and Kido, this worm exploited flaws in
Windows to infect millions of computers in over a hundred countries.
ILOVEYOU: The ILOVEYOU worm infected tens of millions of computers globally,
resulting in billions of dollars in damage.
Mydoom: This became the fastest-spreading email worm in 2004, sending junk email
across computers.
Ryuk: Although Ryuk wasn't always a worm, it's now worm-like ransomware.
SQL Slammer: The SQL Slammer worm gained infamy for slowing down Internet
traffic with denial-of-service attacks on some Internet hosts.
Storm Worm: This worm utilized social engineering with fake news of a disastrous
storm to drop botnets on compromised machines.
Stuxnet: This sophisticated worm was developed for years to launch a cyber attack.
Many of the symptoms of a computer worm are like that of a computer virus.
5
You may see alerts from your firewall about a breach.
Like other forms of malware computer worms can be stopped by enabling the followings
Update your essential software regularly to shield your computer from vulnerabilities like
the wormable Windows flaw and the like.
2.1.4 Spy-wares
Spyware is a type of malware that tracks your internet activity in order to gather sensitive
information such as credit card numbers or demographics. Most of the time, spyware works in
the background of a device, invisible to the unsuspecting. Some of the most common reasons
attackers use spyware include collecting data to sell to third-parties, to steal someone's identity,
or to spy on an individual's computer usage.
Spyware comes in the form of a broad range of programs that hide in the background of your
computer. There are several ways spyware can make its way onto your device including:
Spyware silently tracks cookies to map your internet usage, tracks your social media activity,
tracks the emails you send, and more. It is often used to gather personal information to sell to
third-parties such as advertisers. It's also used as a method to spy on others and exploit a victim's
actions for the hacker's own gain.
Examples
Keyloggers, or tools that record what you type or tools that take screenshots of your device.
A pop-up windows that tells you your computer clock's time is off, another claiming to be a
spyware alert, or even a file download box suddenly appearing that you weren't expecting. In
this example, it appears as a pop-up warning you about a computer virus.
6
How to Protect Yourself Against Spyware
Use anti-spyware software. Software is the front-line between you and an attacker. There are
various types of anti-virus software available to fit your budget and needs.
Update your system. Make sure you update your browser and device often. There may be a
bug that leaves your device open to spyware that only a current update may fix.
Pay attention to your downloads. Be careful when downloading content from file sharing
websites. Spyware and malware often hide inside these downloads.
Avoid pop-ups. As tantalizing as they might be, don't select pop-ups that appear on your
screen. You can also install a pop-up blocker and never deal with them.
Keep an eye on your email. Don't download documents from emails you don't recognize.
Better yet, don't open the emails at all. Delete them.
2.1.5 Phishing
Phishing is a type of social engineering attack often used to steal user data, including login
credentials and credit card numbers. It occurs when an attacker, masquerading as a trusted entity,
dupes a victim into opening an email, instant message, or text message. The recipient is then
tricked into clicking a malicious link, which can lead to the installation of malware, the freezing
of the system as part of a ransomware attack or the revealing of sensitive information.
An attack can have devastating results. For individuals, this includes unauthorized purchases, the
stealing of funds, or identify theft.
7
results in a reflected XSS attack, giving the perpetrator privileged access to the university
network.
For users, vigilance is key. A spoofed message often contains subtle mistakes that expose its
true identity. These can include spelling mistakes or changes to domain names, as seen in the
earlier URL example. Users should also stop and think about why theyre even receiving such
an email.
For enterprises, a number of steps can be taken to mitigate from phishing attacks:
Network attacks are unauthorized actions on the digital assets within an organizational network.
Malicious parties usually execute network attacks to alter, destroy, or steal private data.
Perpetrators in network attacks tend to target network perimeters to gain access to internal
systems.
2.2.1 Reconnaissance
8
security terms, reconnaissance derives from military language, where it refers to a mission with
the goal of obtaining information from enemy territory.
Port scanning: One of the most common techniques involved with reconnaissance is port
scanning, which sends data to various TCP and UDP (user datagram protocol) ports on a device
and evaluates the response.
Types of reconnaissance:
There are two main types of reconnaissance: Active and Passive reconnaissance.
Active reconnaissance:
With active reconnaissance, hackers interact directly with the computer system and
attempt to obtain information through techniques like automated scanning or manual
testing and tools like ping and netcat.
Active recon is generally faster and more accurate, but riskier because it creates more
noise within a system and has a higher chance of being detected.
Passive reconnaissance:
Gut directly interacting with systems, using tools such as Wireshark and Shodan and
methods such as OS fingerprinting to gain information.
How To Prevent Reconnaissance
Organizations can use penetration testing to determine what their network would reveal
in the event of a reconnaissance attack.
During testing, organizations can deploy port scanning tools (which scan large networks
and determine which hosts are up) and vulnerability scanners (which find known
vulnerabilities in the network).
2.2.2 Access
9
Access attacks are an attempt to access another user account or network device through
improper means. An access attack is just what it sounds like: an attempt to access another user
account or network device through improper means. If proper security measures are not in place,
the network may be left vulnerable to intrusion. A network administrator is responsible for
ensuring that only authorized users access the network.
Unauthorized attacks are attempted via four means, all of which try to bypass some facet of the
authentication process: password attacks, trust exploitation, port redirection, and man-in-the-
middle attacks.
10
denial-of-service to addition users. A DoS attack is characterized by using a single computer
to launch the attack.
Distributed denial-of-service (DDoS) attack is a type of DoS attack that comes from many
distributed sources, such as a botnet DDoS attack.
How does a DoS attack work?
The primary focus of a DoS attack is to oversaturate the capacity of a targeted machine, resulting
in denial-of-service to additional requests. The multiple attack vectors of DoS attacks can be
grouped by their similarities.
DoS attacks typically fall in 2 categories:
1.Buffer overflow attacks
An attack type in which a memory buffer overflow can cause a machine to consume all
available hard disk space, memory, or CPU time.
This form of exploit often results in sluggish behavior, system crashes, or other deleterious
server behaviors, resulting in denial-of-service.
2.Flood attacks
By saturating a targeted server with an overwhelming amount of packets, a malicious actor is
able to oversaturate server capacity, resulting in denial-of-service.
In order for most DoS flood attacks to be successful, the malicious actor must have more
available bandwidth than the target.
Examples:
A few common historic DoS attacks include:
Smurf attack - a DoS attack in which a malicious actor utilizes the broadcast address of
vulnerable network by sending spoofed packets, resulting in the flooding of a targeted IP
address.
Ping flood - this simple DoS attack is based on overwhelming a target with ICMP (ping)
packets. By flodding a target with more pings than it is able to respond to efficiently, denial-
of-service can occur. This attack can also be used as a DDoS attack.
Ping of Death - a ping of death attack involves sending a malformed packet to a targeted
machine, resulting in deleterious behavior such as system crashes.
How can you tell if a computer is experiencing a DoS attack?
Indicators of a DoS attack include:
Atypically slow network performance such as long load times for files or websites
The inability to load a particular website such as your web property
A sudden loss of connectivity across devices on the same network
12
Address space randomization (ASLR)— Randomly moves around the address space
locations of data regions. Typically, buffer overflow attacks need to know the locality of
executable code, and randomizing address spaces makes this virtually impossible.
Data execution preventionflags certain areas of memory as non-executable or
executable, which stops an attack from running code in a non-executable region.
Structured exception handler overwrite protection (SEHOP)helps stop malicious
code from attacking Structured Exception Handling (SEH), a built-in system for
managing hardware and software exceptions. It thus prevents an attacker from being able
to make use of the SEH overwrite exploitation technique.
2.3.2 Time-of-check to time-of-use flaws
What is a Time-of-Check-Time-of-Use?
Time-of-Check-Time-of-Use (TOCTOU) attacks fall under the category of a race condition
(which occurs when two or more operations that should be done in sequence are attempted
simultaneously). A hacker is able to access a file and make harmful changes between the time of
check (first time the program accesses the file) and the time of use (when the software uses the
file). The opportunity window is very short due to that near simultaneous overlap.
How to Recognize This Threat: Shared files that multiple users can access are susceptible to
TOCTOU issues. A file that has been corrupted could cause a system crash or corrupt data
related to the file.
How to Prevent This Threat: Ensure your network has processes in place to avoid race
conditions, such as prioritizing file access so that only one user can edit the file at a time.
For example, a security policy is a management control, but its security requirements are
implemented by people (operational controls) and systems (technical controls).
An organization may have an acceptable use policy that specifies the conduct of users, including
not visiting malicious websites. The security control to monitor and enforce could be in the form
of a web content filter, which can enforce the policy and log simultaneously.
15