Cyber Security Unit-2
Cyber Security Unit-2
known as Web Jacking. In web jacking attack method hackers compromises with
the domain name system (DNS) that resolves website URL to IP address but the actual
website is never touched. Web jacking attack method is another type of social
engineering phishing attack where an attacker create a fake web page of victim
website and send it to the victim and when a victim click on that link, a message
display on the browser “the site abc.com has move on another address, click here to
go to the new location” and if a victim does click on the link, he/she will redirect on
the fake website page where an attacker can ask for any sensitive data such as credit
card number, username, password etc. Web jacking attack method is one kind of trap
which is spread by the attacker to steal the sensitive data of any people, and those
people got trapped who are not aware about cyber security.
Online fraud: - Online fraud, also known as internet fraud or cyber fraud refers to
fraudulent activities conducted over the internet with the intent to deceive, steal, or
exploit individuals, organizations, or systems. It encompasses a wide range of
malicious activities, and the perpetrators often use various online tools and techniques
to achieve their objectives. Here's a brief overview of online fraud:
4. Legal Consequences: Online fraud is illegal in most jurisdictions and can lead to
criminal charges, fines, and imprisonment for those who engage in fraudulent
activities.
Online fraud poses a significant threat to individuals, businesses, and society as a
whole. As technology evolves, so do the techniques used by fraudsters, making it
essential to stay informed about the latest threats and take measures to protect
oneself and one's digital assets.
Identity theft:-Identity Theft also called Identity Fraud is a crime that is being
committed by a huge number nowadays. Identity theft happens when someone steals
your personal information to commit fraud. This theft is committed in many ways by
gathering personal information such as transactional information of another person to
make transactions.
End-User Piracy: This is one of the most common forms of software piracy. It occurs
when individuals or organizations use software without proper licensing, typically by
installing and using more copies of the software than they have licenses for.
Internet Piracy: The internet has made it easier for individuals and groups to share or
download unlicensed software. Websites, peer-to-peer networks, torrents, and online
forums facilitate the illegal distribution of software, making pirated copies readily
available.
Reduced Software Quality: Users of unlicensed software miss out on the benefits of
customer support, software updates, and security patches. This can expose their systems
to vulnerabilities and compatibility issues.
Legal Consequences: Software piracy is illegal in most countries and can lead to severe
legal repercussions, including fines and even imprisonment for individuals and
organizations involved in piracy.
Negative Industry Impact: Widespread piracy can undermine the overall health of the
software industry, potentially leading to increased prices for legitimate software to
compensate for losses.
Security Risks: Pirated software often contains malware, viruses, or other malicious code.
Using such software poses significant security risks to the user's system and data.
Legal Action: Copyright holders and software companies may take legal action against
those involved in software piracy, including distributors and users of unlicensed
software.
Malware: Intruders often use malicious software, such as viruses, worms, Trojans, or
ransom ware, to gain access to a network or compromise its security. Malware can be
introduced through email attachments, malicious websites, or infected software
downloads.
Phishing: Phishing attacks involve tricking users into revealing sensitive information,
such as login credentials or financial data, by posing as a trustworthy entity. Phishing
emails and websites are common vectors for network intrusion.
Brute Force Attacks: Attackers attempt to gain access to a network by trying various
combinations of usernames and passwords until they discover the correct credentials.
This method is time-consuming but can be effective if strong security measures are not
in place.
Insider Threats: Network intrusions can also come from within an organization.
Disgruntled employees or insiders with access to sensitive information may misuse their
privileges to compromise network security.
Data Breaches: Intruders may gain unauthorized access to sensitive data, including
personal, financial, or proprietary information. Data breaches can result in the exposure
of confidential data, causing reputational damage and legal consequences.
Financial Loss: Network intrusions can lead to financial losses through theft, fraud, or the
cost of restoring and securing the compromised network.
Malware Propagation: Once inside a network, intruders may use it as a platform for
launching further attacks, spreading malware, or attacking other networks.
Regular Software Updates: Keep software, operating systems, and network devices up to
date to patch known vulnerabilities.
User Education: Train employees to recognize phishing attempts and practice good
security hygiene.
Access Control: Implement strict access controls and user privileges to limit the scope of
potential breaches.
Packet Capture: An attacker uses various methods to capture these data packets. This is
often done by monitoring network traffic using specialized software or hardware, or by
exploiting vulnerabilities in network configurations.
Analysis: Once the packets are captured, the attacker analyzes the data to identify login
credentials. This may involve searching for specific patterns or keywords that indicate
username and password fields.
Exfiltration: After obtaining the login credentials, the attacker can use them to gain
unauthorized access to the target accounts or systems. This can lead to data theft,
identity theft, financial fraud, or other malicious activities.
Protocol Analysis: Some attackers use tools that can capture and analyze network
packets to extract login credentials. This method works by examining the data
exchanged between a user's device and a server during the login process.
ARP Spoofing: Address Resolution Protocol (ARP) spoofing involves manipulating the
ARP tables of devices on a network to redirect traffic through the attacker's system. This
allows the attacker to capture packets containing login credentials.
Wireless Sniffing: In the case of unsecured or poorly secured Wi-Fi networks, attackers
can capture network traffic over the airwaves using wireless sniffing tools.
Use Encryption: Employ secure and encrypted connections, such as HTTPS for web
traffic, to protect login credentials during transmission. Encryption ensures that
intercepted packets are unreadable to attackers.
Strong Passwords: Encourage users to create strong, unique passwords for their
accounts. Strong passwords are less susceptible to being cracked even if captured.
Two-Factor Authentication (2FA): Implement 2FA or multi-factor authentication (MFA) to
add an additional layer of security. Even if login credentials are compromised, 2FA can
prevent unauthorized access.
Regular Software Updates: Keep network devices and software up to date to patch
vulnerabilities that could be exploited by attackers.
Password sniffing is a serious security threat, and organizations and individuals should
take measures to protect themselves against it. By implementing security best practices
and encryption, the risk of password sniffing can be significantly reduced.
Virtual crime: -"Virtual crime" typically refers to criminal activities conducted in the
virtual world, which encompasses the internet, online platforms, and digital
environments. These activities often involve the use of technology and can lead to real-
world consequences. Virtual crime is a complex and rapidly evolving area of law
enforcement and cyber security. Here's a description of virtual crime:
Cybercrime: This broad category includes various criminal activities conducted online,
such as hacking, malware distribution, identity theft, and online fraud. Cybercriminals
often exploit vulnerabilities in computer systems and networks to gain unauthorized
access, steal data, or disrupt services.
Online Fraud: Criminals may engage in activities like phishing, credit card fraud, Ponzi
schemes, and online scams to defraud individuals and organizations. These fraudulent
schemes are conducted via email, websites, and social media.
Harassment and Cyber bullying: Virtual crime can involve online harassment, cyber
bullying, and stalking. Perpetrators use social media, messaging apps, or email to
intimidate or harm their victims.
Data Breaches: Breaching the security of databases or systems to steal or leak sensitive
information is a common form of virtual crime. This can result in significant data privacy
and security concerns.
Online Intellectual Property Theft: Virtual criminals may illegally copy, distribute, or sell
copyrighted material, including software, movies, music, and other intellectual property.
Financial Loss: Virtual crime can lead to substantial financial losses for individuals and
organizations. Cyber attacks, online fraud, and data breaches can result in theft of
money, intellectual property, and reputation damage.
Emotional and Psychological Impact: Cyber bullying, harassment, and online threats can
cause severe emotional distress, anxiety, and even mental health issues for victims.
Data Privacy Violations: Data breaches and unauthorized access to personal information
can result in identity theft, privacy violations, and long-lasting consequences for affected
individuals.
Reputation Damage: Online extortion and revenge porn can tarnish a person's
reputation, affecting their personal and professional life.
Strong Cyber security Practices: Individuals and organizations should implement robust
cyber security measures, including regular software updates, strong passwords, and
encryption to protect against virtual crime.
User Education: Educating users about online risks, safe internet practices, and
recognizing common online threats like phishing is crucial.
Legal and Regulatory Frameworks: Many countries have laws and regulations in place to
address and penalize virtual crime. These laws provide a legal framework for prosecuting
cybercriminals.
Cyber security Tools: Employing security software firewalls, and intrusion detection
systems can help detect and prevent virtual crime.
User Session Establishment: When a user logs into a website or application, a session is
established. A session typically involves the creation of a session token, which is a
unique identifier that associates the user with their active session.
Session Token Handling: The session token is typically stored as a cookie in the user's
browser or as part of the URL. It serves as a key to access the user's session data on the
server.
Session Tracking: To keep track of the user's activities and maintain the session, the
session token is included in each subsequent request sent to the server during the user's
interaction with the website or application.
Session Hijacking: A session hijacker intercepts the session token or gains access to it
through various means. This can occur through methods like eavesdropping on network
traffic, stealing cookies, or exploiting vulnerabilities in the user's browser or the website.
Impersonation: Once in possession of a valid session token, the attacker can use it to
impersonate the victim. They may access the victim's account, perform actions on their
behalf, or gain unauthorized access to sensitive information.
Session Fixation: In a session fixation attack, the attacker provides the victim with a
session token, often by tricking the victim into clicking on a link. When the victim logs in,
the attacker can then use the token to hijack the session.
Cross-Site Scripting (XSS): XSS vulnerabilities allow attackers to inject malicious scripts
into web pages viewed by other users. These scripts can steal session cookies or tokens
from other users' browsers.
Secure Connections: Use HTTPS to encrypt the data transmitted between the user's
browser and the website's server to prevent eavesdropping.
Secure Cookies: Implement secure and Http Only flags for cookies to make them less
vulnerable to theft via XSS attacks.
Regularly Rotate Session Tokens: Periodically changing session tokens can make them
more difficult to predict or exploit.
User Authentication: Requiring users to re-enter their credentials for sensitive actions
can provide an additional layer of security.
Security Patching: Keep web applications and browsers up to date to fix vulnerabilities
that could be exploited for session hijacking.
Use of Technology: Cyberterrorists utilize various cyber tools and techniques to launch
attacks. These may include malware, hacking, distributed denial of service (DDoS)
attacks, and more.
Targets: Potential targets for cyberterrorism include critical infrastructure (such as power
grids, water supply systems, and transportation networks), government agencies,
military systems, financial institutions, and communication networks.
Anonymity: Cyberterrorists often work anonymously or use digital disguises to hide their
identities, making attribution and apprehension challenging.
Propaganda and Fear: Cyberterrorists may use online platforms to spread propaganda,
incite fear, or rally support for their cause.
Examples of Cyberterrorism:
Stuxnet: The Stuxnet worm, discovered in 2010, was designed to target Iran's nuclear
facilities. It was a highly sophisticated and targeted malware used to sabotage critical
industrial control systems.
Cyber Caliphate: In 2015, a group claiming association with ISIS conducted cyberattacks
on various social media accounts, defacing websites and spreading propaganda.
Ukraine Power Grid Attack: In 2015 and 2016, Ukraine's power grid was targeted in
cyberattacks that resulted in widespread power outages. These attacks were attributed
to Russian state-sponsored hackers.
Legislation and Regulation: Governments can enact laws and regulations to combat
cyberterrorism and prosecute cyberterrorists.
Public Awareness: Promoting cybersecurity awareness and educating the public about
the risks and best practices can help reduce vulnerabilities.
Response and Recovery Plans: Develop and regularly update incident response and
recovery plans to mitigate the impact of cyberterrorist attacks.