Unit 3
Unit 3
3.1 INTRODUCTION
Cybercrime encompasses unlawful activities in which a computer plays the central role, either as the primary target or as a
tool facilitating the offense like hacking, phishing, spamming, and so on. Cybercriminals employ computer technology to
gain unauthorized access to personal information, and confidential business data, or engage in malicious and exploitative
online activities. Furthermore, criminals utilize computers for communication and storage of documents and data. These
individuals are commonly known as hackers and cybercrime is also referred to as computer crime.
Tools and methods used in cybercrime encompass a wide range of software, hardware, techniques, and tactics used by
individuals or groups with malicious intent to engage in illegal activities within the digital realm. These tools and methods
are used to exploit vulnerabilities, gain unauthorized access to computer systems, steal sensitive data, or disrupt digital
services.
The basic stages of an attack are described under the following section to understand how an attacker can
compromise a network.
1. Initial uncovering: Two steps are involved here. In the first step called as reconnaissance, the attacker gathers
information, as much as possible, about the target by legitimate means-searching the information about the target
on the Internet by Googling social networking websites and people finder websites. In the second step, the attacker
uncovers as much information as possible on the company's internal network, such as, Internet domain, machine
names and the company's Internet Protocol (IP) address ranges.
2. Network probe: At the network probe stage, the attacker uses more invasive techniques to scan the information.
Usually, a ‘ping sweep’ of the network IP addresses is performed to check which devices are on the network, and
then a 'port scanning' tool is used to discover exactly which services are running on the target system. At this point,
the attacker has still not done anything that would be considered as an abnormal activity on the network or anything
that can be classified as an intrusion.
3. Crossing the line towards electronic crime (E-crime): The attacker does this by exploiting possible holes on the
target system. The attacker usually goes through several stages of exploits to gain access to the system. Once the
attackers are able to access a user account without many privileges, they will attempt further exploits to get an
administrator or 'root' access. Root access is a Unix term and is associated with the system privileges required to
run all services and access all files on the system
4. Capturing the network: At this stage, the attacker attempts to "own" the network. The attacker gains a foothold
in the internal network quickly and easily, by compromising low-priority target systems. The next step is to remove
any evidence of the attack. The attacker will usually install a set of tools that replace existing files and services with
Trojan files and services that have a backdoor password.
5. Grab the data: Now that the attacker has "captured the network," he/she takes advantage of his/her position to
steal confidential data, customer credit card information, deface web pages, alter processes and even launch attacks
at other sites from your network, causing a potentially expensive and embarrassing situation for an individual and/or
for an organisation.
6. Covering tracks: This is the last step in any cyber attack, which refers to the activities undertaken by the attacker
to extend misuse of the system without being detected. The attacker can remind or use this phase either to start a
fresh reconnaissance to a related target system of resources, removing evidence of hacking, avoiding legal action,
etc.
3.1.1 Tools used to Cover Attacks
1. EL Save: It is a tool to save and/or clear an NT event log. EL Save is written by Jesper Lauritsen. The executable
is available on the web link, but source code is not available.
2. Win Zapper: This tool enables to erase event records selectively from the security log in Windows NT 4.0 and
Windows 2000
3. Evidence eliminator: It is simple and one of the top-quality professional PC cleaning programs that can defeat all
known investigative
4. Traceless: It is a privacy cleaner for Internet explorer that can delete common Internet tracks, including history,
cache, typed URLs, cookies, etc.
5. Tracks Eraser Pro: It deletes following history data:
Delete address bar history of IE, Netscape, AOL and Opera.
Delete cookies of IE, Netscape, AOL and Opera.
Delete Internet cache (temporary Internet files),
Delete Internet history files.
The proxy server accepts the request from the client and produces a response based on the following conditions:
1. If the requested data or page already exists in the local cache, the proxy server itself provides the required retrieval to
the client.
2. If the requested data or page does not exist in the local cache, the proxy server forwards that request to the destination
server.
3. The proxy servers transfer the replies to the client and being cached to them.
Therefore, it can be said that the proxy server acts as a client as well as the server.
4. Anonymous Proxy
This is the type of proxy server that does not make an original IP address. Although these servers are detectable still provides
rational anonymity to the client device.
5. High Anonymity Proxy
This proxy server does not allow the original IP address to be detected, and no one can detect it as a proxy server.
6. Transparent Proxy
This type of proxy server never provides any anonymity to the client; instead, an original IP address can be easily detected
using this proxy. Still, it is being used to act as a cache for the websites. A transparent proxy combined with gateway results
in a proxy server where the client IP's connection requests are redirected. This redirection occurs without the client IP
address configuration. This redirection can be easily detected by the HTTP headers present on the server-side. These are
also known as intercepting proxies, inline proxy, and forged proxy.
Working: It intercepts the communication at the network level without the need for any configuration. It also works
as a gateway or router that authenticates the communication without making any changes to the requests or
responses passing through the server.
Uses: These types of proxies are most used at the business level to enforce the policy over communication. It also
tries to prevent any attack on TCP servers' example - denial-of-service attack.
7. CGI Proxy
This type of proxies was developed to make the websites more accessible.
Working: It accepts the requests to target URLs using a web form, processes it and returns the result to the web
browser. It is less popular due to VPNs and other privacy policies, but it still receives many requests these days. Its
usage reduces because of excessive traffic that can be caused to the website after passing the local filtration, leading
to collateral damage to the organisation.
8. Suffix Proxy
This type of proxy server appends the proxy's name to the URL to the content that has been requested to the proxy. This
type of proxy does not preserve a higher level of anonymity.
Uses: It is used for bypassing the web filters. This proxy is easy to use and can be easily implemented but is used
less due to more or more web filters.
9. Distorting Proxy
Proxy servers can generate an incorrect original IP address of clients once being detected as a proxy server. It uses HTTP
headers to maintain the confidentiality of the Client IP address.
3.3 ANONYMISER
An anonymiser is a proxy server that makes Internet activity untraceable. An anonymiser protects personally
identifying information by hiding private information on the user's behalf. An anonymiser is referred to as an anonymous
proxy or privacy service, is a tool or service that allows users to browse the internet while keeping their identities and online
activities anonymous. Anonymisers work by masking the user's IP address and encrypting their internet traffic, enhancing
privacy and security.
An anonymiser refers to a proxy server designed to minimise the data a user discloses while browsing the internet.
However, contrary to its name, it does not grant complete anonymity online. Rather, it conceals the device's IP address from
the website being accessed and substitutes it with a different one, creating the illusion that the user is browsing from an
alternate location.
How an anonymiser operates?
1. IP Address Masking: Anonymisers act as an intermediary between the user's device and the internet. When a user
sends a request to access a website or online resource, the request is sent through the anonymiser, which substitutes
the user's IP address with its own. This prevents the target website from identifying the user's actual IP address.
2. Encryption of Traffic: Anonymisers often encrypt the user's internet traffic, providing an additional layer of
security. This encryption helps protect the user's data from being intercepted or monitored by third parties.
3. Anonymity Layer: An anonymiser adds a layer of anonymity by obscuring the user's original IP address and other
identifying information associated with the request.
4. Access to Blocked Content: Anonymisers allow users to bypass internet restrictions and access blocked websites
or services, particularly in regions where certain content is restricted or censored.
5. Privacy Enhancement: By hiding the user's IP address and encrypting their traffic, anonymisers significantly
enhance privacy and make it difficult for websites, ISPs, or other entities to track and trace their online activities.
6. Secure Connection: Anonymisers ensure that the user's internet connection is secure and private, making it safer
to browse the web, especially on public or unsecured networks.
3.4 PHISHING
Phishing in cybersecurity is a malicious technique used by cybercriminals to trick individuals into revealing sensitive
information, such as passwords, credit card numbers, social security numbers, and other personal or financial data.
They do this by pretending to be a trustworthy company or website. They send messages that look real, with a link that
takes you to a fake website where they ask for your personal details. This could include things like your credit card number.
Once they have this information, they can steal your identity or make unauthorized charges on your credit card.
Phishing gets its name from the idea of "phish," like fishing with bait. In this case, cyber attackers set a trap to lure in
unsuspecting people. They use deceptive methods to make fake websites look real, tricking victims into thinking they are
dealing with a legitimate source. The most common way they do this is by sending fake emails that seem real, aiming to
get your sensitive information.
These attackers use the stolen information to impersonate you and cause more problems. Most phishing attacks happen
through email, where victims are fooled into sharing private information. While the email may look real, checking the web
address can reveal if it's authentic or a fake attempt to trick you.
Let us understand this concept with the help of an example:
In this example, most people believe its amazon login page, thinking of amazon as a secure platform, the users' signs with
his e-mail and password. But if we look carefully, we can see the URL is www.amazonn.com and not www.amazon.com.
How Does Phishing Occur?
Below mentioned are the ways through which Phishing generally occurs. Upon using any of the techniques mentioned
below, the user can lead to Phishing Attacks.
Clicking on an unknown file or attachment: Here, the attacker deliberately sends a mysterious file to the victim,
as the victim opens the file, either malware is injected into his system or it prompts the user to enter confidential
data.
Using an open or free Wi-Fi hotspot: This is a very simple way to get confidential information from the user by
luring him by giving him free Wi-Fi. The Wi-Fi owner can control the user's data without the user knowing it.
Responding to social media requests: This commonly includes social engineering. Accepting unknown friend
requests and then, by mistake, leaking secret data are the most common mistake made by naive users.
Clicking on unauthenticated links or ads: Unauthenticated links have been deliberately crafted that lead to a
phished website that tricks the user into typing confidential data.
3.4.1 Types of Phishing Attacks
There are several types of Phishing Attacks, some of them are mentioned below. Below mentioned attacks are very common
and mostly used by the attackers.
E-mail Phishing: The most common type where users are tricked into clicking unverified spam e-mails and leaking
secret data. Hackers impersonate a legitimate identity and send e-mails to mass victims. Generally, the goal of the
attacker is to get personal details like bank details, credit card numbers, user IDs, and passwords of any online
shopping website, installing malware, etc. After getting the personal information, they use this information to steal
money from the user's account or harm the target system, etc.
Spear Phishing: In spear phishing of phishing attack, a particular user(organization or individual) is targeted. In
this method, the attacker first gets the full information of the target and then sends malicious e-mails to his/ her
inbox to trap him into typing confidential data. For example, the attacker targets someone (let's assume an employee
from the finance department of some organization). Then the attacker pretends to be like the manager of that
employee and then requests personal information or transfers a large sum of money. It is the most successful attack.
Whaling: Whaling is just like spear-phishing but the main target is the head of the company, like the CEO, CFO,
etc. a pressurized e-mail is sent to such executives so that they don't have much time to think, therefore falling prey
to phishing.
Smishing: In this type of phishing attack, the medium of phishing attack is SMS. Smishing works similarly to e-
mail phishing. SMS texts are sent to victims containing links to phished websites or invite the victims to call a
phone number or to contact the sender using the given e-mail. The victim is then invited to enter their personal
information like bank details, credit card information, user id/password, etc. Then using this information the
attacker harms the victim.
Vishing: Vishing is also known as voice phishing. In this method, the attacker calls the victim using modern caller
id spoofing to convince the victim that the call is from a trusted source. Attackers also use IVR to make it difficult
for legal authorities to trace the attacker. It is generally used to steal credit card numbers or confidential data from
the victim.
Clone Phishing: Clone Phishing this type of phishing attack, the attacker copies the e-mail messages that were sent
from a trusted source and then alters the information by adding a link that redirects the victim to a malicious or fake
website. Now the attacker sends this mail to a larger number of users and then waits to watch who clicks on the
attachment that was sent in the e-mail. It spreads through the contacts of the user who has clicked on the attachment.
Impact of Phishing
Each person has their own impact after getting into Phishing Attacks, but these are some of the common impacts that happen
to the majority of people.
Financial Loss: Phishing attacks often target financial information, such as credit card numbers and bank account
login credentials. This information can be used to steal money or make unauthorised purchases, leading to
significant financial losses.
Identity Theft: Phishing attacks can also steal personal information, such as Social Security numbers and date of
birth, which can be used to steal an individual's identity and cause long-term harm.
Damage to Reputation: Organisations that fall victim to phishing attacks can suffer damage to their reputation, as
customers and clients may lose trust in the company's ability to protect their information.
Disruption to Business Operations: Phishing attacks can also cause significant disruption to business operations,
as employees may have their e-mail accounts or computers compromised, leading to lost productivity and data.
Spread of Malware: Phishing attacks often use attachments or links to deliver malware, which can infect a victim's
computer or network and cause further harm.
Signs of Phishing
It is very much important to be able to identify the signs of a phishing attack in order to protect against its harmful effects.
These signs help the user to protect user data and information from hackers. Here are some signs to look out for include:
Suspicious e-mail addresses: Phishing e-mails often use fake e-mail addresses that appear to be from a trusted
source, but are actually controlled by the attacker. Check the e-mail address carefully and look for slight variations
or misspellings that may indicate a fake address.
Urgent requests for personal information: Phishing attacks often try to create a sense of urgency in order to trick
victims into providing personal information quickly. Be cautious of e-mails or messages that ask for personal
information and make sure to verify the authenticity of the request before providing any information.
Poor grammar and spelling: Phishing attacks are often created quickly and carelessly, and may contain poor
grammar and spelling errors. These mistakes can indicate that the e-mail or message is not legitimate.
Requests for sensitive information: Phishing attacks often try to steal sensitive information, such as login
credentials and financial information. Be cautious of e-mails or messages that ask for sensitive information and
verify the authenticity of the request before providing any information.
Unusual links or attachments: Phishing attacks often use links or attachments to deliver malware or redirect
victims to fake websites. Be cautious of links or attachments in e-mails or messages, especially from unknown or
untrusted sources.
Strange URLs: Phishing attacks often use fake websites that look similar to the real ones, but have slightly different
URLs. Look for strange URLs or slight variations in the URL that may indicate a fake website.
Anti-Phishing Tools
The use of Anti-Phishing tools is essential for the detection of phishing attacks. Here are some of the widely recognized
and highly effective options in this category:
Anti-Phishing Domain Advisor (APDA): A browser extension that warns users when they visit a phishing website.
It uses a database of known phishing sites and provides real-time protection against new threats.
Phish Tank: A community-driven website that collects and verifies reports of phishing attacks. Users can submit
phishing reports and check the status of suspicious websites.
Webroot Anti-Phishing: A browser extension that uses machine learning algorithms to identify and block phishing
websites. It provides real-time protection and integrates with other security tools.
Malwarebytes Anti-Phishing: A security tool that protects against phishing attacks by detecting and blocking
suspicious websites. It uses a combination of machine learning and signature-based detection to provide real-time
protection.
Kaspersky Anti-Phishing: A browser extension that provides real-time protection against phishing attacks. It uses
a database of known phishing sites and integrates with other security tools to provide comprehensive protection.
These anti-phishing tools can provide an additional layer of protection against phishing attacks, but it is important to
remember that they are not a complete solution. Users should also be cautious of suspicious e-mails and messages and
practice safe browsing habits to minimize their risk of falling victim to phishing attacks.
3.5 PASSWORD CRACKING
Password cracking involves the act of deciphering a password. Passwords are typically stored or transmitted in an
encrypted format, represented as a string of bits that is generated through a cryptographic hash function. This hash function
takes the password as input and produces an encrypted version of it as output.
Password cracking is a critical aspect within the realm of hacking. It involves the process of retrieving passwords
from data that is stored or transmitted by a computer or mainframe. The purpose of password cracking varies, including
aiding a user in recovering a forgotten password, preventive measures by system administrators to identify weak passwords,
or even unauthorised system access by malicious attackers.
2. Dictionary Attacks
Dictionary attacks are an automated technique utilizing a list of passwords against a valid account to reveal the password.
The list itself is a dictionary of words. Basic password crackers use lists of common single words like "baseball" to crack a
password, hack an account, and reveal the complete credential.
If the threat actor knows the password length and complexity requirements of the target account, the dictionary is
customized to the target. Advanced password crackers often use a dictionary and mix in numbers and symbols to mimic a
real-world password with complexity requirements.
An effective dictionary attack tool lets a threat actor:
Set complexity requirements for length, character requirements, and character set
Manually add words and combinations of words/names
Target common misspellings of frequently used words
Operate in multiple languages
A weakness of dictionary attacks is that they rely on real words and derivations supplied by the user of the default dictionary.
If the real password is fictitious, uses multiple languages, or uses more than one word or phrase, it should thwart a dictionary
attack. The most common method to mitigate the threat of a dictionary attack is account lockout attempts. After "n" times
of wrong attempts, a user's account is automatically locked for a period of time. It must be manually unlocked by an
authority, like the help desk or via an automated password reset solution.
3. Brute Force
Brute force password attacks utilize a programmatic method to try all possible combinations for a password. This method
is efficient for passwords that are short in string (character) length and complexity. This can become infeasible, even for the
fastest modern systems, with a password of eight characters or more. If a password only has alphabetical characters,
including capital letters or lowercase, odds are it would take 8,031,810,176 guesses to crack. This assumes the threat attacker
knows the password length and complexity requirements. Other factors include numbers, case sensitivity, and special
characters in the localized language.
With the proper parameters dialed in, a brute force attack will always find the password, eventually. The computing power
required and length of time it takes often renders brute force tests a moot by the time it has completed. The time it takes to
perform attacks is determined by the time it takes to generate all possible password permutations.Brute force password
attacks tend to be the least efficient method for hacking a password. Thus, threat actors use them as a last resort.
4. Credential Stuffing
Credential stuffing is an automated hacking technique that utilizes stolen credentials. These credentials are comprised of
lists of usernames, e-mail addresses, and passwords. The technique generally leverages automation to submit login requests
directed against an application and to capture successful login attempts for future exploitation.
Credential stuffing attacks do not attempt to brute force or guess any passwords. The threat actor automates authentication
based on previously discovered credentials using customized tools. This approach can entail launching millions of attempts
to determine where a user potentially reused their credentials on another website or application. Credential stuffing attacks
prey on password reuse and are only effective because so many users reuse the same credential combinations across multiple
sites.
5. Password Spraying
Password spraying is a credential-based attack that attempts to access many accounts by using a few common passwords.
Conceptually, this is the opposite of a brute force password attack. Brute force attempts to gain authorized access to a single
account by repeatedly pumping large quantities of password combinations. During a password spray attack, the threat actor
attempts a single, commonly used password (such as "12345678" or "Password") against many accounts before proceeding
to attempt a second password.
3.6 KEYLOGGER
A keylogger, also known as keystroke logger or keystroke recorder, is a type of software, hardware, or a
combination of both that records every keystroke made on a computer or mobile device. This includes not only the
characters typed but also special keys, function keys, and keyboard shortcuts.
The primary purpose of a keylogger is to secretly monitor and capture a user's keystrokes without their knowledge.
Keyloggers are a particularly insidious type of spyware that can record and steal consecutive keystrokes (and much
more) that the user enters on a device.
The term keylogger, or "keystroke logger," is self-explanatory: Software that logs what you type on your keyboard.
However, keyloggers can also enable cybercriminals to eavesdrop on you, watch you on your system camera, or
listen over your smartphone's microphone.
Keyloggers, whether categorized as tools or malicious software, capture and log the keystrokes executed on a
system, subsequently storing this data in a file. The individual employing this malware can access and review the
recorded keystrokes. Keyloggers can manifest as software or hardware devices. In terms of operation, keyloggers
are primarily utilised to surreptitiously capture sensitive data such as passwords, bank information, and other
confidential details.
The first keylogger emerged in the 1970s as a hardware device, and the first software-based keylogger was
developed in 1983. Since then, keyloggers have evolved and become increasingly sophisticated, posing a significant
threat to users' privacy and security.
3.7 SPYWARE
Spyware is malicious software that enters a user's computer, gathers data from the device and user, and sends it to
third parties without their consent. A commonly accepted spyware definition is a strand of malware designed to
access and damage a device without the user's consent. Spyware collects personal and sensitive information that it
sends to advertisers, data collection firms, or malicious actors for a profit.
Attackers use it to track, steal, and sell user data, such as internet usage, credit card, and bank account details, or
steal user credentials to spoof their identities.
Spyware is one of the most used cyberattack methods that can be difficult for users and businesses to identify and
can-do serious harm to networks. It also leaves businesses vulnerable to data breaches and data misuse, often affects
device and network performance, and slows down user activity.
Spyware is malicious software that is designed to monitor and collect information from a user's device without their
knowledge or consent. It often operates in the background, covertly gathering data about a user's online activities,
browsing habits, passwords, keystrokes, personal information, and more. The collected data is then sent to a remote
server controlled by the attacker or entity behind the spyware.
Spyware is a breach of cyber security as they usually get into the laptop/ computer system when a user
unintentionally clicks on a random unknown link or opens an unknown attachment, which downloads the spyware
alongside the attachment. It is a best practice to be cautious of the sites that are used for downloading content on
the system. Spyware is a type of software that unethically without proper permissions or authorisation steals a user's
personal or business information and sends it to a third party. Spyware may get into a computer or laptop as a hidden
component through free or shared wares.
Spywares perform the function of maliciously tracking a user's activity, having access to data, or even resulting in
the crashing of the computer/laptop system. Spyware in many cases runs as a background process and slows down
the normal functioning of the computer system.
Key characteristics and aspects of spyware:
1. Stealthy Operation: Spyware operates discreetly and is often difficult to detect by the user. It runs silently in the
background, capturing data without the user's awareness.
2. Data Collection: Spyware can collect a wide range of information, including keystrokes, passwords, login
credentials, browsing history, e-mail content, chat logs, personal information, and more.
3. Information Leakage: The gathered data is transmitted to the attacker's server or a predefined location, where it
can be accessed and exploited for various malicious purposes.
4. Adware vs. Spyware: While adware displays unwanted advertisements, spyware goes beyond this by secretly
collecting user data. Some adware, however, may have spyware components.
5. Infiltration Methods: Spyware can infiltrate a device through malicious e-mail attachments, infected websites,
software downloads, freeware or shareware bundles, phishing, or exploiting software vulnerabilities.
6. Keylogging and Screen Capture: Some spyware variants record keystrokes and take screenshots, allowing
attackers to capture sensitive information, passwords, and user interactions.
7. Financial and Identity Theft: Spyware can be used for financial fraud, identity theft, stealing banking information,
credit card numbers, and other confidential data.
8. Browser Hijacking: Spyware can manipulate browser settings, change the default search engine, modify the
homepage, or redirect the user to malicious websites.
9. Remote Control: Advanced spyware may allow attackers to remotely control the infected device, execute
commands, or even download and install additional malware.
10. Legitimate Purposes: While spyware is typically malicious, there are instances where monitoring software is used
legally for parental control or employee monitoring with explicit consent and appropriate notifications.
Protecting against spyware involves implementing robust cybersecurity practices, such as using reputable antivirus and
anti-malware software, regularly updating operating systems and applications, being cautious of e-mail attachments and
suspicious websites, and being mindful of the sources from which software is downloaded. Additionally, educating users
about potential risks and the importance of safe browsing practices is crucial in mitigating the threat of spyware.
2 Objective The main objective of worms is to eat the The main objective of the viruses is to
system resources. It consumes system modify the information.
resources such as memory and bandwidth and
made the system slow in speed to such an
extent that it stops responding.
3 Host It doesn't need a host to replicate from one It requires a host is needed for spreading.
computer to another.
5 Detection and Worms can be detected and Antivirus software Antivirus software is used for protection
protection and firewall. against viruses.
6 Controlled by Worms can be controlled by remote. Viruses can’t be controlled by remote.
7 Execution Worms are executed via weaknesses of the Viruses are executed via executable files.
systems.
8 Comes from Worms generally comes from the downloaded Viruses generally comes from the shared and
files or through a network connection. downloaded files.
9 Symptoms -Hampering computer performance by -Pop-up windows linking to malicious
slowing down. websites.
-Automatic opening and running of programs. -Hampering computer performance by
-Sending of e-mails without your knowledge. slowing down it.
-Affected the performance of web browser. -After booting, starting of unknown
program.
-Passwords get changed without your
knowledge.
10 Prevention -Keep your operating system and system in -Installation of Antivirus software.
updates state. -Never open an email attachment.
-Avoid clicking on the links from untrusted or -Avoid usage of pirated software.
unknown websites. -Keep your operating system updated.
-Avoid opening e-mails from unknown
sources.
-Use Antivirus software and a firewall.
11 Types Internet worms, Instant messaging worms, E- Boot sector virus, Direct Action virus,
mail worms, File sharing worms, Internet Polymorphic virus, Macro virus, Overwrite
relay chat (IRC) worms are different types of virus, File In- fector virus are different types
worms. of viruses
12 Speed Its spreading speed is faster. Its spreading speed is slower as compared to
worms.
13 Examples Examples of worms include Morris worm, Examples of viruses include Creeper,
storm worm, etc. Blaster, Slammer, etc.
3.9 TROJAN-HORSES AND BACKDOORS
A Trojan horse is a type of malware that pretends to be a harmless file or program to trick users into executing it.
Named after the ancient Greek tale of the Trojan War, where a wooden horse was used to infiltrate Troy.
It disguises itself using social engineering, hiding malicious code within seemingly legitimate software.
Unlike viruses or worms, Trojans don't self-replicate; they need to be intentionally installed by a user.
Capable of taking control of the computer and performing harmful actions like stealing or damaging data.
Tricks users into loading and executing files on their devices, often through disguised attachments or downloads.
In cybersecurity, a Trojan appears harmless but is malicious. Unexpected changes in computer settings or unusual
activities may indicate a Trojan's presence.
Typically hidden in seemingly innocent email attachments or free downloads.
Once the user opens the attachment or downloads the program, the hidden malware is transferred to the computer.
Aims to deceive users into thinking it's safe, leading them to unwittingly install and activate the malicious code.
Unlike viruses or worms, Trojans cannot replicate themselves but rely on user actions for installation.
3.10 STEGANOGRAPHY
The term 'Steganography' originates from the combination of two Greek words: 'stegos,' which translates to 'to
cover', and 'graphia', meaning 'writing". This results in the interpretation of 'covered writing' or 'hidden writing.'
Steganography is a way of hiding secret information by putting it secretly into files like audio, video, images, or
text. It's like a secret method used to protect important data from potential bad attacks. It's about hiding messages
in a way that only the sender and the intended receiver know it's there.
Unlike cryptography, which focuses on making a message unreadable to unauthorised users, steganography aims
to keep the existence of the message secret.
In steganography, the thing that hides the secret information is like a canvas, and this hidden data can be text,
pictures, sound, or video. It's blended into the canvas in a way that makes it hard for someone to notice it casually.
For example, if a bank website can handle 10 people a second by clicking the Login button, an attacker only has to
send 10 fake requests per second to make it so no legitimate users can log in. DoS attacks exploit various
weaknesses in computer network technologies. They may target servers, network routers, or network
communication links. They can cause computers and routers to crash and links to bog down.
The most famous DoS technique is the Ping of Death. The Ping of Death attack works by generating and sending
special network messages (specifically, ICMP packets of non- standard sizes) that cause problems for systems that
receive them. In the early days of the Web, this attack could cause unprotected Internet servers to crash quickly.
It is strongly recommended to try all described activities on virtual machines rather than in your working
environment.
Following is the command for performing flooding of requests on an IP.
ping ip_address - t-65500
Where:
"ping" sends the data packets to the victim.
"ip_address" is the IP address of the victim.
"-t" means the data packets should be sent until the program is stopped.
"-1(65500)" specifies the data load to be sent to the victim.
Once an identity thief gains access to someone's personal information, they can use it to commit various fraudulent
activities, such as:
1. Financial Fraud: Identity thieves may use stolen information to open new credit card accounts, apply for loans,
or make unauthorised purchases. They may also drain victims' bank accounts or engage in fraudulent financial
transactions, leaving victims responsible for the charges.
2. Identity Fraud: Identity thieves may assume the victim's identity to obtain government benefits, secure
employment, or even commit crimes, leaving the victim with potential legal consequences.
3. Medical Identity Theft: Thieves may use stolen identities to obtain medical services, prescription drugs, or file
fraudulent insurance claims. This can lead to incorrect medical records, denial of insurance coverage, or even
endanger the victim's health if incorrect information is added to their medical history.
4. Tax Fraud: Identity thieves can use stolen information to file fraudulent tax returns to claim refunds or tax credits,
resulting in financial loss and potential legal issues for the victim.
5. Social Engineering: Identity thieves may use stolen information to manipulate individuals or organisations into
disclosing more personal or financial data. They may impersonate the victim or use their personal information to
gain trust and deceive others.
To protect yourself from identity theft, consider the following preventive measures
1. Safeguard Personal Information: Keep personal documents and sensitive information in a secure place, and avoid
sharing personal details unless necessary. Be cautious when providing personal information online or over the
phone, especially to unknown or untrusted sources.
2. Use Strong Passwords: Create strong and unique passwords for all online accounts, and enable multi-factor
authentication whenever possible. Regularly update passwords and avoid using easily guessable information, such
as birthdates or names.
3. Secure Online Activities: Be cautious when accessing websites and ensure that they are secure (look for the
padlock symbol and "https" in the URL). Avoid clicking on suspicious links or downloading attachments from
unknown sources.
4. Monitor Financial Accounts: Regularly review bank statements, credit card bills, and other financial accounts for
any unauthorised activity. Report any discrepancies or suspicious charges immediately to the respective financial
institutions.
5. Protect Personal Devices: Keep your computer, smartphone, and other devices secure by installing reputable
antivirus software, keeping them up to date with the latest security patches, and avoiding downloading apps or
software from untrusted sources.
6. Shred Sensitive Documents: Before discarding any documents containing personal information, use a cross-cut
shredder to ensure that the information cannot be retrieved.
7. Check Credit Reports: Regularly check your credit reports from major credit bureaus to identify any suspicious
or unauthorised activities. You are entitled to a free annual credit report from each bureau.
8. Be wary of Phishing Attempts: Be cautious of unsolicited e-mails, messages, or phone calls requesting personal
information. Avoid clicking on links or providing sensitive information unless you can verify the legitimacy of the
source.