Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Comptia Security+ Guide To Network Security Fundamentals, Sixth Edition

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 61

CompTIA Security+ Guide to Network

Security Fundamentals, Sixth Edition


Chapter 2
Malware and Social Engineering Attacks

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use
as permitted in a license distributed with a certain product or service or otherwise on a password-protected website for
classroom use. 1
Objectives
2.1 Define malware
2.2 List the different types of malware
2.3 Identify payloads of malware
2.4 Describe the types of psychological social
engineering attacks
2.5 Explain physical social engineering attacks

© 2018 Cengage. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license distributed with a certain
product or service or otherwise on a password-protected website for classroom use.
Jobs - Who Needs to Understand Malware

• Malware analysts
 Analyze malware
• Incident responders
 Detect security events, mitigate damage, document
• Forensic analysts
 Investigate security events (for possible legal action)
• Threat intelligence analysts
 Determine threats to an organization
• All infosec professionals

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 3
Jobs - Who Needs to Understand Social
Engineering Attacks


System administrators

A favorite target of attackers

Executives, senior leaders

Also favorite targets

All employees

Incident responders

Detect security events, mitigate damage, document

Threat intelligence analysts

Determine threats to an organization

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 4
Brian Krebs – “Scrap Value of a Hacked PC”

https://krebsonsecurity.com/2012/10/the-scrap-value-of-a-hacked-pc-revisited/ 
© Cengage Learning 2015 5
Insecurity of Systems

• “A system is secure if it behaves precisely


in the manner intended—and does
nothing more”
- Ivan Arce, vulnerability hunter

© Cengage Learning 2015 6


Attacks Using Malware (1 of 2)

• Malicious software—malware, AKA “viruses”


• Enters a computer system without the owner’s knowledge or consent
• Uses a threat vector to deliver a malicious “payload” that performs a
harmful function once it is invoked
• Malware is a general term that refers to a wide variety of damaging or
annoying software

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 7
Attacks Using Malware (2 of 2)

• Malware can be classified by the using the primary attributes that the
malware possesses:
• Circulation - spreading rapidly to other systems in order to impact a
large number of users
• Infection - how it embeds itself into a system
• Concealment - avoid detection by concealing its presence from
scanners
• Payload capabilities - what actions the malware performs

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 8
Malware Types
• Differentiated and classified by behavior
– Not by any genetic traits, unlike biological
viruses
• Many pieces of malware exhibit multiple traits
• Hijacker, Trojan, Downloader, Dropper, Rootkit,
Backdoor, Spammer, Stealer, Botnet, Scareware,
Malware Construction Kit, Virus, Worm
– Peter Szor, The Art of Computer Virus Research
and Defense


© Cengage Learning 2015 9
Virus (1 of 6)

• Computer virus - malicious computer code that reproduces itself on


the same computer
• Program virus - infects an executable program file
• Macro - a series of instructions that can be grouped together as a
single command
• Common data file virus is a macro virus that is written in a script
known as a macro
• Virus infection method:
• Appender infection - virus appends itself to end of a file
- Easily detected by virus scanners

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 10
Virus (2 of 6)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 11
Virus (3 of 6)

• Most viruses today go to great lengths to avoid detection (called an armored virus)
• Some armored virus infection techniques include:
• Swiss cheese infection - viruses inject themselves into executable code
- Virus code is “scrambled” to make it more difficult to detect
• Split infection - virus splits into several parts
- Parts placed at random positions in host program
- The parts may contain unnecessary “garbage” doe to mask their true purpose
• Mutation – some viruses can mutate or change
- An oligomorphic virus changes its internal code to one of a set of number of
predefined mutations whenever executed
- A polymorphic virus completely changes from its original form when executed
- A metamorphic virus can rewrite its own code and appear different each time it
is executed

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 12
Virus (4 of 6)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 13
Virus (5 of 6)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 14

© Cengage Learning 2015
Virus (6 of 6)

• Viruses perform two actions:


• Unloads a payload to perform a malicious action
• Reproduces itself by inserting its code into another file on the same
computer
• Examples of virus actions
• Cause a computer to repeatedly crash
• Erase files from or reformat hard drive
• Turn off computer’s security settings
• Viruses cannot automatically spread to another computer
• Relies on user action to spread
• Viruses are attached to files
• Viruses are spread by transferring infected files
© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 16
Worm (1 of 2)

• Worm - malicious program that uses a computer network to replicate


• Sends copies of itself to other network devices
• Worms may:
• Consume resources or
• Leave behind a payload to harm infected systems
• Examples of worm actions
• Deleting computer files
• Allowing remote control of a computer by an attacker

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 17
Worm (2 of 2)

Action Virus Worm


What does it do? Inserts malicious code into Exploits a vulnerability in an
a program or data file application or operating
system
How does it spread User transfers infected files Uses a network to travel from
to other computers? to other devices one computer to another
Does it infect a file? Yes No
Does there need to Yes No
be user action for it
to spread?

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 18

© Cengage Learning 2015
Trojans

• Trojan - an executable program that does something other than


advertised
• Contain hidden code that launches an attack
• Sometimes made to appear as data file
• Special type of Trojan:
• Remote access Trojan (RAT) – gives the threat actor unauthorized
remote access to the victim’s computer by using specially configured
communication protocols

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 20
Ransomware (1 of 3)

• Ransomware - prevents a user’s device from properly operating until


a fee is paid
• Is highly profitable
• A variation of ransomware displays a fictitious warning that a software
license has expired or there is a problem and users must purchase
additional software online to fix the problem

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 21
Ransomware (2 of 3)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 22
Ransomware (3 of 3)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 23
Crypto-malware (1 of 2)

• Crypto-malware – a more malicious form of ransomware where threat


actors encrypt all files on the device so that none of them could be opened
• Once infected with crypto-malware:
• The software connects to the threat actor’s command and control (C&C)
server to receive instructed or updated data
• A locking key is generated for the encrypted files and that key is
encrypted with another key that has been downloaded from the C&C
• Second key is sent to the victims once they pay the ransom

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 24
Crypto-malware (2 of 2)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 25
Concealment (1 of 2)

• Rootkits - software tools used by an attacker to hide actions or presence


of other types of malicious software
• Hide or remove traces of log-in records, log entries
• May alter or replace operating system files with modified versions that
are specifically designed to ignore malicious activity
• Users can no longer trust their computer that contains a rootkit
• The rootkit is in charge and hides what is occurring on the computer

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 26
Concealment (2 of 2)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 27
Payload Capabilities

• The destructive power of malware can be found in its payload


capabilities
• Primary payload capabilities are to:
• Collect data
• Delete data
• Modify system security settings
• Launch attacks

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 28
Collect Data (1 of 6)

• Different types of malware are designed to collect important data


from the user’s computer and make it available at the attacker
• This type of malware includes:
• Spyware
• Adware

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 29
Collect Data (2 of 6)

• Spyware - software that gathers information without user consent


• Uses the computer’s resources for the purposes of collecting and
distributing personal or sensitive information
• Keylogger - captures and stores each keystroke that a user types on the
computer’s keyboard
• Attacker searches the captured text for any useful information such as
passwords, credit card numbers, or personal information

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 30
Collect Data (3 of 6)

• A keylogger can be a small hardware device or a software program


• As a hardware device, it is inserted between the computer keyboard
connection and USB port
• Software keyloggers are programs installed on the computer that
silently capture information
• An advantage of software keyloggers is that they do not require physical
access to the user’s computer
• Often installed as a Trojan or virus, can send captured information
back to the attacker via Internet

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 31
Collect Data (4 of 6)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 32
Collect Data (5 of 6)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 33
Collect Data (6 of 6)

• Adware - program that delivers advertising content in manner


unexpected and unwanted by the user
• Typically displays advertising banners and pop-up ads
• May open new browser windows randomly
• Users disapprove of adware because:
• Adware can display objectionable content
• Frequent popup ads can interfere with a user’s productivity
• Popup ads can slow a computer or even cause crashes and the
loss of data
• Unwanted advertisements can be a nuisance

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 34
Collect Data
• PUP – Potentially Unwanted Program
– Technically legal
– Often installed along with another program
• E.g. SourceForge DevShare bundling program
– Sometimes installed at the PC/tablet/smartphone
factory
• Economics thereof
– PUPs often monetize through adware-like
behavior


© Cengage Learning 2015 35
Delete Data

• The payload of other types of malware deletes data on the computer


• Logic bomb - computer code that lies dormant until it is triggered by a
specific logical event
• Difficult to detect before it is triggered
• Often embedded in large computer programs that are not routinely
scanned

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 36
Modify System Security

• Backdoor - gives access to a computer, program, or service that


circumvents normal security to give program access
• When installed on a computer, they allow the attacker to return
at a later time and bypass security settings

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 37
Launch Attacks (1 of 2)

• Bot or zombie - an infected computer that is under the remote control of


an attacker
• Groups of zombie computers are gathered into a logical computer
network called a botnet under the control of the attacker (bot herder)
• Infected zombie computers wait for instructions through a command
and control (C&C) structure from bot herders
• A common C&C mechanism used today is HTTP, which is more
difficult to detect and block

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 38
Launch Attacks (2 of 2)

Type of attack Description


Spamming Botnets are widely recognized as the
primary source of spam email. A botnet
consisting of thousands of bots enables an
attacker to send massive amounts of spam.
Spreading Botnets can be used to spread malware and
malware create new bots and botnets. Bots can
download and execute a file sent by the
attacker.
Manipulating Because each bot has a unique Internet
online polls Protocol (IP) address, each “vote” by a bot
will have the same credibility as a vote cast
by a real person.
Denying services Botnets can flood a web server with
thousands of requests and overwhelm it to
the point that it cannot respond to legitimate
requests.

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 39
Zero-Day Vulnerabilities
• A previously unknown vulnerability
• The software vendor has no patch (because the
vendor is unaware of the vulnerability)
• The most powerful and valuable attack available
– No defense exists
– Often undetectable
• Often very valuable, highly prized
– Bounty programs
– Zerodium, Hacking Team


© Cengage Learning 2015 40
Social Engineering Attacks

• Social engineering - a means of gathering information for an attack by


relying on the weaknesses of individuals
• Social engineering attacks can involve psychological approaches as well
as physical procedures

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 41
Psychological Approaches

• Psychological approaches goal: to persuade the victim to provide


information or take action
• Attackers use a variety of techniques to gain trust without moving
quickly:
• Provide a reason
• Project confidence
• Use evasion and diversion
• Make them laugh
• Psychological approaches often involve:
• Impersonation, phishing, spam, hoaxes, and watering hole attacks

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 42
Impersonation

• Impersonation - attacker pretends to be someone else:


• Help desk support technician
• Repairperson
• IT support
• Manager
• Trusted third party
• Fellow employee
• Attacker will often impersonate a person with authority because victims
generally resist saying “no” to anyone in power

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 43
Phishing (1 of 2)

• Phishing - sending an email claiming to be from legitimate source


• Tries to trick user into giving private information
• The emails and fake websites are difficult to distinguish from those
that are legitimate
• Variations on phishing attacks:
• Spear phishing – targets specific users
• Whaling – targets the “big fish”
• Vishing – instead of using email, uses a telephone call instead
• About 97% of all attacks start with phishing

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 44
Phishing (2 of 2)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 45
Vishing (Voice Phishing)

• Professional social engineer in action:


• https://www.youtube.com/watch?v=lc7scxvKQOo
• This is why two-factor authentication with a phone
number isn’t bulletproof
• Recent cases of vishing against public figures in
cryptocurrency (bitcoin) world


© Cengage Learning 2015 46
Spam (1 of 2)

• Spam - unsolicited e-mail


• Primary vehicles for distribution of malware
• Sending spam is a lucrative business
- Cost spammers very little to send millions of spam messages
• Filters look for specific words and block the email
• Image spam - uses graphical images of text in order to circumvent
text-based filters
• Often contains nonsense text so it appears legitimate

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 47
Spam (2 of 2)

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 48
Kaspersk y: Percentage of spam in global email traffic
2016 Q4 to 2017 Q1


© Cengage Learning 2015
Spam -
How Successful Is It?
• RX Limited and Paul LeRoux
– 2003 – 2012
– Network of American doctors and pharmacies
– Estimated at least $200 Million in prescription
sales
– 1,000 employees at 10 call centers in Israel and
the Philippines
– Domain registrar ABSystems

– https://magazine.atavist.com/the-mastermind

© Cengage Learning 2015 50
Hoaxes

• Hoaxes - a false warning, usually claiming to come from the IT


department
• Attackers try to get victims to change configuration settings on
their computers that would allow the attacker to compromise the
system
• Attackers may also provide a telephone number for the victim to
call for help, which will put them in direct contact with the attacker

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 51
Watering Hole Attack
• Watering hole attack - a malicious attack that is
directed toward a small group of specific individuals
who visit the same website
• Examples:
– 2014 – CrowdStrike alleges Russian gov’t campaign
against Western oil and gas companies, energy
investment firms
– 2012 – Council on Foreign Relations website –
Adobe Flash, IE 6-8 zero day
– Political dissident websites


© Cengage Learning 2015 52

© Cengage Learning 2015
Physical Procedures

• Two of the most common physical procedures are:


• Dumpster diving
• Tailgating

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 54
Dumpster Diving (1 of 2)

• Dumpster diving
• Digging through trash to find useful information

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 55
Dumpster Diving (2 of 2)

Item retrieved Why useful


Calendars A calendar can reveal which employees are out
of town at a particular time
Inexpensive computer hardware, Often improperly disposed of and might contain
such as USB flash drives or portal valuable information
hard drives
Memos Seemingly unimportant memos can often
provide small bits of useful information for an
attacker who is building an impersonation
Organizational charts These identify individuals within the organization
who are in positions of authority
Phone directories Can provide the names and telephone numbers
of individuals in the organization to target or
impersonate
Policy manuals These may reveal the true level of security
within the organization
System manuals Can tell an attacker the type of computer
system that is being used so that other research
can be conducted to pinpoint vulnerabilities

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 56
Tailgating

• Tailgating
• Following behind an authorized individual through an access door
• An employee could conspire with an unauthorized person to allow him
to walk in with him (called piggybacking)
• Watching an authorized user enter a security code on a keypad is
known as shoulder surfing

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 57
Development of Exploits

“Today's top-secret National Security Agency attack


techniques become tomorrow's PhD theses and
the next day's hacker tools.”
- Bruce Schneier


© Cengage Learning 2015 58
Learn More

CNIT 126 – Practical Malware Analysis, taught
by Sam Bowne


Virus Bulletin newsletter:

https://www.virusbulletin.com/newsletter/


Kaspersky Lab SecureList

https://securelist.com/


© Cengage Learning 2015 59
Chapter Summary (1 of 2)

• Malware is malicious software that enters a computer system without the


owner’s knowledge or consent
• Malware that spreads include computer viruses and worms
• Ransomware prevents a user’s device from properly and fully functioning
until a fee is paid
• A rootkit can hide its presence or the presence of other malware on the
computer by accessing lower layers of the OS
• Different types of malware are designed to collect data from the user’s
computer and make it available to the attacker
• Spyware, keylogger, and adware

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 60
Chapter Summary (2 of 2)

• A logic bomb is computer code that is typically added to a legitimate


program but lies dormant until triggered by a specific logical event
• A backdoor gives access to a computer, program, or service that
circumvents any normal security protections
• A popular payload of malware is software that will allow the infected
computer to be placed under the remote control of an attacker (known
as a bot)
• Multiple bot computers can be used to created a botnet
• Social engineering is a means of gathering information for an attack
from individuals
• Types of social engineering approaches include phishing, dumpster
diving, and tailgating

© 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license
distributed with a certain product or service or otherwise on a password-protected website for classroom use. 61

You might also like