0% found this document useful (0 votes)
41 views62 pages

Information Security 2

This document summarizes different types of malware and social engineering attacks. It describes viruses as self-replicating malware that spreads by infecting files, while worms replicate by exploiting vulnerabilities to spread across networks. Ransomware encrypts user files until a ransom is paid, while Trojans conceal malicious payloads by masquerading as legitimate programs. Social engineering involves manipulating users through psychological tricks or gaining physical access to systems. The document provides examples of common malware goals and techniques to infect, spread, and conceal their presence on systems.

Uploaded by

hamA lol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views62 pages

Information Security 2

This document summarizes different types of malware and social engineering attacks. It describes viruses as self-replicating malware that spreads by infecting files, while worms replicate by exploiting vulnerabilities to spread across networks. Ransomware encrypts user files until a ransom is paid, while Trojans conceal malicious payloads by masquerading as legitimate programs. Social engineering involves manipulating users through psychological tricks or gaining physical access to systems. The document provides examples of common malware goals and techniques to infect, spread, and conceal their presence on systems.

Uploaded by

hamA lol
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 62

Security+ Guide to Network Security

Fundamentals,
Fifth Edition

Chapter 2
Malware and Social Engineering Attacks
Objectives
• Describe the differences between a virus and a
worm
• List the types of malware that conceals its
appearance
• Identify different kinds of malware that is designed
for profit
• Describe the types of social engineering
psychological attacks
• Explain physical social engineering attacks

Security+ Guide to Network Security Fundamentals, Fifth Edition 2


Attacks Using Malware
• Malicious software (malware)
– Enters a computer system without the owner’s knowledge or
consent
– Uses a threat vector to deliver a malicious “payload” that
performs a harmful function once it is invoked
• Malware is a general term that refers to a wide variety of
damaging or annoying software
• Primary objectives of malware
– Infecting systems
– Concealing its purpose
– Making profit

Security+ Guide to Network Security Fundamentals, Fifth Edition 3


Attacks Using Malware
• Malware can be classified by the using the primary trait that
the malware possesses:
– Circulation - spreading rapidly to other systems in order to
impact a large number of users
– Infection - how it embeds itself into a system
– Concealment - avoid detection by concealing its presence
from scanners
– Payload capabilities - what actions the malware performs

Security+ Guide to Network Security Fundamentals, Fifth Edition 4


Circulation
• Two types of malware have the primary traits of
circulation:
– Viruses
– Worms

Security+ Guide to Network Security Fundamentals, Fifth Edition 5


Virus (1 of 12)
• Computer virus
– Malicious computer code that reproduces itself on the
same computer
• Types of computer viruses
– Program virus
• Infects an executable program file
– Macro
• A series of instructions that can be grouped together as a
single command
• Common data file virus is a macro virus that is written in a
script known as a macro
– Memory Resident
• Loads into RAM when the computer boots up
• Infects files opened by user or operating system

Security+ Guide to Network Security Fundamentals, Fifth Edition 6


Virus (2 of 12)

• Virus infection method:


• Appender infection
– virus appends itself to end of a file
– Moves first three bytes of original file to virus code
– Replaces them with a jump instruction pointing to the virus
code
– Easily detected by virus scanners

Security+ Guide to Network Security Fundamentals, Fifth Edition 7


Virus (3 of 12)

Security+ Guide to Network Security Fundamentals, Fifth Edition 8


Virus: Virus infection method (4 of 12)
• Most viruses today go to great lengths to avoid detection (called an armored
virus)
• Some armored virus infection techniques include:
– Swiss cheese infection
• viruses inject themselves into executable code
• Original code transferred and stored inside virus code
• Host code executes properly after the infection
• Virus code is “scrambled” to make it more difficult to detect
– Split infection
• Virus splits into several parts
• Parts placed at random positions in host program
• Head of virus code starts at beginning of file
• Gives control to next piece of virus code
• To make detection even more difficult these parts may contain
unnecessary “garbage” code to mask their true purpose.
9
Security+ Guide to Network Security Fundamentals, Fifth Edition
Virus: Virus infection method (5 of 12)
– Mutation
• some viruses can mutate or change
• Three types of mutating malware are
– An oligomorphic virus:
» changes its internal code to one of a set of number of predefined
mutations whenever executed
» because oligomorphic malware has only a limited number of
mutations, it will eventually change back into a previous version that
may then be detected by a scanner
– A polymorphic virus completely changes from its original form
when executed
» This is usually accomplished by the malware containing “scrambled”
code that, when the malware is activated, is “unscrambled” before it
is executed.
– A metamorphic virus can rewrite its own code and appear
different each time it is executed
» It does this by creating a logical equivalent of its code whenever it is
Security+ Guide torun.
Network Security Fundamentals, Fifth Edition 10
Swiss cheese infection (6 of 12)

Security+ Guide to Network Security Fundamentals, Fifth Edition 11


Split infection (7 of 12)

Security+ Guide to Network Security Fundamentals, Fifth Edition 12


Viruses: Malware That Spreads (8 of 12)
• Viruses perform two actions:
– Unloads a payload to perform a malicious action
– Reproduces itself by inserting its code into another file on the
same computer
• Examples of virus actions
– Cause a computer to repeatedly crash
– Erase files from or reformat hard drive
– Turn off computer’s security settings
• Viruses cannot automatically spread to another computer
– Relies on user action to spread
• Viruses are attached to files
• Viruses are spread by transferring infected files
Security+ Guide to Network Security Fundamentals, Fifth Edition 13
Viruses: Malware That Spreads (9 of
12)

Figure 2-4 Annoying virus message


© Cengage Learning 2012

Security+ Guide to Network Security Fundamentals, Fifth Edition 14


Viruses: Windows file types that can be infected (10
of 12)

Security+ Guide to Network Security Fundamentals, Fifth Edition 15


Viruses: Malware That Spreads (11 of 12)

• Virus cannot automatically spread to another


computer
– Relies on user action to spread
• Viruses are attached to files
• Viruses are spread by transferring infected files
• Virus must have two “carriers”:
– File to which it attaches
– Human to transport it to other computers.

Security+ Guide to Network Security Fundamentals, Fifth Edition 16


Viruses: Malware That Spreads (12 of 12)
• Types of computer viruses (cont’d.)
– Boot virus
• Infects the Master Boot Record
• Loads before the OS starts
– Companion virus or Companion Trojan
• Adds malicious copycat program to operating system
• Such as a fake CMD.EXE

Security+ Guide to Network Security Fundamentals, Fifth Edition 17


Malware That Spreads (cont’d.)
• Worm
– Malicious program
– Exploits application or operating system vulnerability
– Sends copies of itself to other network devices
• Worms may:
– Consume resources or
– Leave behind a payload to harm infected systems
• Examples of worm actions
– Deleting computer files
– Allowing remote control of a computer by an
attacker
Security+ Guide to Network Security Fundamentals, Fifth Edition 18
Malware That Spreads (cont’d.)

Table 2-1 Difference between viruses and worms

Security+ Guide to Network Security Fundamentals, Fifth Edition 19


Infection
• Three examples of malware that have the primary
trait of infection:
– Trojans
– Ransomware
– Crypto-malware

Security+ Guide to Network Security Fundamentals, Fifth Edition 20


Malware That Conceals
• Trojans
– Program that does something other than advertised
– Typically executable programs
• Contain hidden code that launches an attack
• Sometimes made to appear as data file
– Example
• User downloads “free calendar program”
• Program scans system for credit card numbers and passwords
• Transmits information to attacker through network
– Special type of Trojan:
• Remote access Trojan (RAT)
– gives the threat actor unauthorized remote access to the victim’s
computer by using specially configured communication protocols

Security+ Guide to Network Security Fundamentals, Fifth Edition 21


Ransomware (1 of 3)
• Ransomware
– prevents a user’s device from properly operating until a fee is paid
• Is highly profitable
– One type of ransomware locks up a user’s computer and then
displays a message that purports to come from a law
enforcement agency
– A variation of ransomware displays a fictitious warning that a
software license has expired or there is a problem and users must
purchase additional software online to fix the problem
– Figure 2-6 shows a ransomware message from the Symantec
website in its Security Response Center.

Security+ Guide to Network Security Fundamentals, Fifth Edition 22


Ransomware (2 of 3)

Security+ Guide to Network Security Fundamentals, Fifth Edition 23


Ransomware (3 of 3)

Security+ Guide to Network Security Fundamentals, Fifth Edition 24


Crypto-malware (1 of 2)
• Crypto-malware
• a more malicious form of ransomware where threat actors
encrypt all files on the device so that none of them could
be opened
• Once infected with crypto-malware:
– The software connects to the threat actor’s command and
control (C&C) server to receive instructed or updated data
– A locking key is generated for the encrypted files and that
key is encrypted with another key that has been
downloaded from the C&C
– Second key is sent to the victims once they pay the ransom

Security+ Guide to Network Security Fundamentals, Fifth Edition 25


Crypto-malware (2 of 2)

Security+ Guide to Network Security Fundamentals, Fifth Edition 26


Differences between viruses, worms,
and Trojans

Security+ Guide to Network Security Fundamentals, Fifth Edition 27


Concealment: Malware That Conceals (1 of 5)

• Rootkits
– Software tools used by an attacker to hide actions or
presence of other types of malicious software
– Hide or remove traces of log-in records, log entries
– May alter or replace operating system files with
modified versions:
• Specifically designed to ignore malicious activity
– Users can no longer trust their computer that
contains a rootkit
• The rootkit is in charge and hides what is occurring on
the computer

Security+ Guide to Network Security Fundamentals, Fifth Edition 28


Concealment: Malware That Conceals (2 of 5)

Security+ Guide to Network Security Fundamentals, Fifth Edition 29


Concealment: Malware That Conceals
(3 of 5)

Security+ Guide to Network Security Fundamentals, Fifth Edition 30


Concealment: Malware That Conceals
(4 of 5)
• Rootkits can be detected using programs that
compare file contents with original files
• Rootkits that operate at operating system’s lower
levels:
– May be difficult to detect
• Removal of a rootkit can be difficult
– Rootkit must be erased
– Original operating system files must be restored
– Reformat hard drive and reinstall operating system

Security+ Guide to Network Security Fundamentals, Fifth Edition 31


Payload Capabilities

• The destructive power of malware can be found in


its payload capabilities
• Primary payload capabilities are to:
– Collect data
– Delete data
– Modify system security settings
– Launch attacks

Security+ Guide to Network Security Fundamentals, Fifth Edition 32


Collect Data (1 of 5)
• Different types of malware are designed to collect
important data from the user’s computer and make
it available at the attacker
• This type of malware includes:
– Spyware
– Adware

Security+ Guide to Network Security Fundamentals, Fifth Edition 33


Collect Data (2 of 5)
• Spyware
– software that gathers information without user consent
– Uses the computer’s resources for the purposes of
collecting and distributing personal or sensitive information
• Keylogger
– captures and stores each keystroke that a user types on the
computer’s keyboard
– Attacker searches the captured text for any useful
information such as passwords, credit card numbers, or
personal information

Security+ Guide to Network Security Fundamentals, Fifth Edition 34


Table 2-4 Technologies used by spyware

Security+ Guide to Network Security Fundamentals, Fifth Edition 35


Collect Data (3 of 5)
• A keylogger can be a small hardware device or a software
program
– As a hardware device, it is inserted between the computer
keyboard connection and USB port
– Software keyloggers are programs installed on the computer
that silently capture information
• An advantage of software keyloggers is that they do not
require physical access to the user’s computer
– Often installed as a Trojan or virus, can send captured
information back to the attacker via Internet

Security+ Guide to Network Security Fundamentals, Fifth Edition 36


Collect Data (4 of 5)

Figure 2-6 Hardware keylogger


© Cengage Learning 2012
r
Security+ Guide to Network Security Fundamentals, Fifth Edition 37
Collect Data (5 of 5)
• Adware
– program that delivers advertising content in manner
unexpected and unwanted by the user
– Typically displays advertising banners and pop-up ads
– May open new browser windows randomly
• Users disapprove of adware because:
– Adware can display objectionable content
– Frequent popup ads can interfere with a user’s productivity
– Popup ads can slow a computer or even cause crashes and
the loss of data
– Unwanted advertisements can be a nuisance

Security+ Guide to Network Security Fundamentals, Fifth Edition 38


Delete Data (1 of 2)
• The payload of other types of malware deletes data
on the computer
• Logic bomb
– computer code that lies dormant until it is triggered
by a specific logical event
– Difficult to detect before it is triggered
– Often embedded in large computer programs that
are not routinely scanned

Security+ Guide to Network Security Fundamentals, Fifth Edition 39


Delete Data (2 of 2)

Table 2-2 Famous logic bombs

Security+ Guide to Network Security Fundamentals, Fifth Edition 40


Modify System Security
• Backdoor
– gives access to a computer, program, or service that
circumvents normal security to give program access
– When installed on a computer, they allow the
attacker to return at a later time and bypass security
settings

Security+ Guide to Network Security Fundamentals, Fifth Edition 41


Launch Attacks (1 of 3)
• Bot or zombie
– an infected computer that is under the remote control of an
attacker
– Groups of zombie computers are gathered into a logical
computer network called a botnet under the control of the
attacker (bot herder)
– Infected zombie computers wait for instructions through a
command and control (C&C) structure from bot herders
• A common C&C mechanism used today is HTTP, which is more
difficult to detect and block

Security+ Guide to Network Security Fundamentals, Fifth Edition 42


Launch Attacks (2 of 3)
• Botnets
– Computer is infected with program that allows it to be
remotely controlled by attacker
• Often payload of Trojans, worms, and viruses
– Infected computer called a zombie
– Groups of zombie computers together called botnet
• Early botnet attackers used Internet Relay Chat to
remotely control zombies
– HTTP is often used today

Security+ Guide to Network Security Fundamentals, Fifth Edition 43


Launch Attacks (3 of 3)

Security+ Guide to Network Security Fundamentals, Fifth Edition 44


Social Engineering Attacks

• Social engineering:

– a means of gathering information for an attack by


relying on the weaknesses of individuals
– Social engineering attacks can involve
psychological approaches as well as physical
procedures

Security+ Guide to Network Security Fundamentals, Fifth Edition 45


Psychological Approaches
• Psychological approaches goal:
– to persuade the victim to provide information or take action
– Attackers use a variety of techniques to gain trust without
moving quickly:
• Provide a reason
• Project confidence
• Use evasion and diversion
• Make them laugh
– Psychological approaches often involve:
• Impersonation, phishing, spam, hoaxes, and watering hole
attacks

Security+ Guide to Network Security Fundamentals, Fifth Edition 46


Social Engineering Attacks
(Impersonation)
• Impersonation: attacker pretends to be someone else:
– Help desk support technician
– Repairperson
– IT support
– Manager
– Trusted third party
– Fellow employee
• Attacker will often impersonate a person with authority
because victims generally resist saying “no” to anyone in
power

Security+ Guide to Network Security Fundamentals, Fifth Edition 47


Social Engineering Attacks (Phishing (1 of 5) )

• Phishing
– Sending an email or displaying a web announcement that
claiming to be from legitimate source
• May contain legitimate logos and wording
– Tries to trick user into giving private information
– The emails and fake websites are difficult to distinguish
from those that are legitimate

Security+ Guide to Network Security Fundamentals, Fifth Edition 48


Social Engineering Attacks (Phishing (2 of 5) )
• Variations on phishing attacks:
– Pharming
– Spear phishing: targets specific users
– Whaling – targets the “big fish”
– Vishing – instead of using email, uses a telephone call
• Pharming
• Automatically redirects user to fraudulent Web site
• Spear phishing
• Email messages target specific users

Security+ Guide to Network Security Fundamentals, Fifth Edition 49


Social Engineering Attacks (Phishing (3 of 5) )

• Variations of phishing (cont’d.)


– Whaling
• One type of spear phishing
• Going after the “big fish”
• Targeting wealthy individuals
– Vishing (voice phishing)
• Attacker calls victim with recorded “bank” message with
callback number
• Victim calls attacker’s number and enters private information
• A new variation on vishing now uses short message service
(SMS) text messages in conjunction with callback recorded
phone messages.

Security+ Guide to Network Security Fundamentals, Fifth Edition 50


Figure 2-8 Phishing message
51
Security+ Guide to Network Security Fundamentals, Fifth Edition
Social Engineering Attacks (Phishing (4 of 5) )

• Ways to recognize phishing messages


– Deceptive Web links
• @ sign in middle of address
– Variations of legitimate addresses
– Presence of vendor logos that look legitimate
– Fake sender’s address
– Urgent request

Security+ Guide to Network Security Fundamentals, Fifth Edition 52


Social Engineering Attacks (Phishing (5 of 5) )

• Phishing continues to be a primary weapon used by threat


actors.
• About 97 percent of all attacks start with phishing, and
with 5000 new phishing sites appearing daily, the number
of phishing incidents exceeds 58 million annually.
• Approximately 30 percent of all phishing emails are
opened by unsuspecting users.
• About 84 percent of all enterprises reported that they
have been the victims of a successful spear phishing
attack, and the average cost of a successful spear
phishing campaign against an enterprise is $1.6 million.

Security+ Guide to Network Security Fundamentals, Fifth Edition 53


Social Engineering Attacks (Spam (1 of 3))
• Spam
– Unsolicited e-mail
– Primary vehicles for distribution of malware
– Sending spam is a lucrative business
• Cost spammers very little to send millions of spam messages
– Almost all spam is sent from botnets
• Image spam
– Uses graphical images of text
– Circumvents text-based filters: cannot be filtered based on the
textual content of the message because it appears as an image
instead of text.
– Often contains nonsense text: an email with no text can prompt the
spam filter to block it
• Spim: targets instant messaging users
Security+ Guide to Network Security Fundamentals, Fifth Edition 54
Social Engineering Attacks (Spam (2 of 3))

Security+ Guide to Network Security Fundamentals, Fifth Edition 55


Social Engineering Attacks (Spam (3 of 3))

• spam can be a security vulnerability.


– This is because spam can be used to distribute
malware.
– Spam sent with attachments that contain malware is
one of the most common means by which threat
actors distribute their malware today.

Security+ Guide to Network Security Fundamentals, Fifth Edition 56


Social Engineering Attacks (Hoaxes)

• Hoaxes
– False warning or claim
– May be first step in an attack
– often contained in an email message claiming to come from
the IT department.
– The hoax purports that there is a “deadly virus” circulating
through the Internet and that the recipient should erase
specific files or change security configurations, and then
forward the message to other users.
– Attackers may also provide a telephone number for the
victim to call for help, which will put them in direct contact
with the attacker

Security+ Guide to Network Security Fundamentals, Fifth Edition 57


Social Engineering Attacks (Watering Hole Attack)

• Watering hole attack :- a malicious attack that is directed


toward a small group of specific individuals who visit the
same website
• Example:
– Major executives working for a manufacturing company may
visit a common website, such as a parts supplier to the
manufacturer
– A recent watering hole attack resulted in Mac computers
located on Apple’s main campus becoming infected.
– Several Apple employees visited the same website for Apple
software developers that was infected.

Security+ Guide to Network Security Fundamentals, Fifth Edition 58


Physical Procedures
• Physical procedures: Two of the most common physical
procedures are:
– Dumpster diving and Tailgating
• Dumpster diving
• Digging through trash to find useful information
• An electronic variation of physical dumpster diving is to use
Google’s search engine to look for documents and data posted
online that can be used in an attack.
• This is called Google dorking and it uses advanced Google search
techniques to look for information that unsuspecting victims have
carelessly posted on the web.
• Tailgating
• Following behind an authorized individual through an access door

Security+ Guide to Network Security Fundamentals, Fifth Edition 59


Social Engineering Attacks (cont’d.)
• Methods of tailgating
– Tailgater calls “please hold the door”
– Waits outside door and enters when authorized employee
leaves
– An employee could conspire with an unauthorized person
to allow him to walk in with him (called piggybacking)
– Watching an authorized user enter a security code on a
keypad is known as shoulder surfing

Security+ Guide to Network Security Fundamentals, Fifth Edition 60


Chapter Summary (1 of 2)
• Malware is malicious software that enters a computer system
without the owner’s knowledge or consent
• Malware that spreads include computer viruses and worms
• Ransomware prevents a user’s device from properly and fully
functioning until a fee is paid
• A rootkit can hide its presence or the presence of other
malware on the computer by accessing lower layers of the OS
• Different types of malware are designed to collect data from
the user’s computer and make it available to the attacker
• Spyware, keylogger, and adware

Security+ Guide to Network Security Fundamentals, Fifth Edition 61


Chapter Summary (2 of 2)
• A logic bomb is computer code that is typically added to a
legitimate program but lies dormant until triggered by a
specific logical event
• A backdoor gives access to a computer, program, or service
that circumvents any normal security protections
• A popular payload of malware is software that will allow the
infected computer to be placed under the remote control of an
attacker (known as a bot)
– Multiple bot computers can be used to created a botnet
• Social engineering is a means of gathering information for an
attack from individuals
• Types of social engineering approaches include phishing,
dumpster diving, and tailgating

Security+ Guide to Network Security Fundamentals, Fifth Edition 62

You might also like