Section 6
Section 6
Section 6
46: This course section covers malware, defining it as malicious software designed to infiltrate and
potentially damage computer systems without user consent. It explores threat vectors (methods of
infiltration) and attack vectors (means of gaining access and infecting systems). The analogy of a
cupcake infiltrating a house illustrates these concepts. The focus is on analyzing indicators of
malicious activity, including various malware types like viruses, worms, Trojans, ransomware, and
more. The WannaCry ransomware attack is cited as an example. The course also delves into malware
attack techniques and signs of a successful malware attack. A quiz is provided to reinforce learning.
47:
Boot Sector Virus: Stored in the first sector of a hard disk, difficult to detect before the
operating system boots.
Macro Virus: Embedded in documents like Word, Excel, or PowerPoint, exploiting user
actions.
Program Virus: Targets executables or application files to infect with malicious code.
Multipartite Virus: Combines boot sector and program viruses, ensuring persistence on
infected machines.
Encrypted Virus: Hides by encrypting its code to evade detection by anti-virus software.
Polymorphic Virus: Alters its code each time executed to avoid signature-based anti-virus
detection.
Metamorphic Virus: Writes itself entirely before attempting to infect a file, an advanced form
of polymorphic virus.
Stealth Virus: Uses techniques to avoid detection by anti-virus software, including encryption
and payload modification.
Armored Virus: Adds layers of protection to confuse analysis attempts.
Hoax Virus: A form of social engineering that tricks users into taking undesirable actions,
often by falsely claiming a virus infection.
48:
In this lesson, we delve into computer worms, a type of malicious software similar to viruses but with
a distinct characteristic. Unlike viruses that require user actions such as opening files or clicking on
links, worms can replicate themselves without user intervention. The key difference lies in the fact
that worms exploit vulnerabilities in operating systems and applications to spread across networks
autonomously.
Worms pose a dual threat. They can infect computing assets, and due to their self-replicating nature,
they can disrupt normal network traffic. By exploiting vulnerabilities, worms can rapidly spread
across networks, consuming network and computing resources. The constant replication process can
lead to denial-of-service attacks on networks and associated servers.
Historically, notable worms like Nimda (2001) and Conficker (2009) have demonstrated the
widespread impact of these threats. Nimda propagated across the internet in just 22 minutes, while
Conficker infected millions of machines by exploiting a critical security patch gap in Windows.
The key takeaway is that worms can self-replicate without user interaction, distinguishing them from
viruses. They actively search for network connections, scanning resources to exploit known
vulnerabilities and infect machines, emphasizing the importance of robust cybersecurity measures to
mitigate these threats.
49:
In this lesson, we explore Trojans, a type of malware named after the historical Trojan horse. In
ancient Greece, during a prolonged war, the Greeks presented the city of Troy with a large wooden
horse as a peace offering. However, the seemingly harmless gift concealed Greek soldiers who, once
inside the city walls, unleashed an attack, leading to Troy's downfall. In cybersecurity, Trojans work
similarly, disguising malicious software as harmless or desirable programs.
A Trojan, when executed, performs the claimed function but also carries out malicious activities, such
as installing backdoors or viruses. An example is the embedding of malicious code into a popular
game like Tetris distributed on floppy disks. This early form of a Remote Access Trojan (RAT) allowed
attackers to establish remote connections, gaining control over victimized machines.
RATs, a subtype of Trojans, provide attackers with remote control over compromised systems. The
lesson emphasizes the need for caution when downloading programs from the internet. Users should
employ anti-virus or anti-malware solutions to check for Trojans before installing any software.
Regular patching is crucial to preventing system vulnerabilities that Trojans exploit for unauthorized
access, data exfiltration, and other malicious activities.
50:
Virus Creation:
Tool Used: The instructor employs a program called "Virus Maker 3.0" or "JPS" for creating a virus.
Example: A simple virus named "Crazy Mouse" is demonstrated. The user selects options such as the
name after installation ("service host") and the file name ("Explorer.exe").
Tool Used: The instructor uses a program called "ProRat" to create a RAT server.
Settings: General settings, including port number (5110), server password (12345), and a fake error
message ("You have been hacked") are configured.
Server Creation: The ProRat server is created, and additional options, such as binding it with a
picture file, are demonstrated.
File Binding: The server is bound with a picture of a desert, given an EXE extension, and an icon is
selected.
Execution: The server is created in the current directory, and the resulting file is renamed to
"Desert."
Victim's Perspective:
Trickery: The instructor emphasizes that social engineering or trickery is used to get the victim to
download and run the file.
Effect: For the virus, a demonstration is shown where the mouse cursor becomes uncontrollable,
causing disruption.
RAT Execution: The victim opens the file thinking it's a photo of the desert. An error message
appears, indicating they have been hacked.
RAT Control:
Access: The instructor shows the ProRat interface on the attacking machine.
Information Gathering: System information, user details, date and time, and the last 25 visited
websites are displayed.
Remote Actions: The attacker can take screenshots, view the webcam (if available), and even send
messages to the victim's screen.
Manipulation: Examples include hiding desktop icons, making the mouse go crazy, flipping the screen
upside down, and sending messages to the victim's desktop.
51:
Key Points:
Definition of Ransomware:
Ransomware is the digital equivalent of kidnapping but focuses on digital data and information
assets.
It encrypts computer systems or data and demands payment for a decryption key.
Ransom amounts can vary, with some demands being low for individual users and multi-million
dollar demands for large organizations.
The Colonial Pipeline attack of 2021 is cited as an example where a fuel company paid $4.4 million in
Bitcoin to DarkSide attackers.
Real-world Consequences:
The Colonial Pipeline attack led to a shutdown, causing fuel shortages, panic buying, and increased
gas prices.
The University Hospital in Dusseldorf suffered a ransomware attack, resulting in the death of a
patient due to delayed emergency treatment.
Regular Backups:
Store backups on physical devices and use cloud-based solutions to prevent them from being
encrypted during an attack.
Software Updates:
Install regular software updates, especially for the operating system and antivirus programs.
Patch vulnerabilities to prevent exploitation by attackers.
Users should be cautious of unsolicited emails, especially those with attachments or links.
Makes it more challenging for attackers to breach user accounts and install ransomware.
Paying the ransom does not guarantee data recovery and supports criminal behavior.
Immediately disconnect the infected machine from the network to prevent the spread of
ransomware.
Notify Authorities:
Ransomware attacks are considered criminal events and should be reported to the authorities.
Ensure that ransomware is completely removed before restoring critical data to prevent re-
encryption.
52:
Botnets:
Formation: Botnets are created by infecting systems with malware, turning them into zombies and
adding them to the botnet.
Control Mechanism: An attacker controls the botnet through a command and control node (C2
node).
Scale: Botnets can consist of hundreds, thousands, or even millions of compromised systems.
2. Zombies:
Definition: A zombie is a compromised computer or device that is part of a botnet and is used to
perform tasks using remote commands from the attacker.
Task Execution: Zombies carry out tasks assigned by the attacker without the user's knowledge.
Control Hierarchy: Zombies are under the control of a master node, and commands are transmitted
through the C2 node.
3. Botnet Activities:
DDoS Attacks: Distributed Denial of Service attacks involve multiple zombies targeting a victim
simultaneously, overwhelming systems and causing a denial of service.
Illegal Content Storage: Some attackers use botnets to store illegal content across numerous
compromised devices.
Spam and Phishing: Botnets are utilized to send spam emails and phishing campaigns to a wide range
of targets globally.
Crypto Mining: Attackers may command zombies to perform crypto mining, using their processing
power to mine cryptocurrency.
Breaking Encryption: Botnets' combined processing power can be employed to break through
different encryption schemes.
Economic Incentive: Attackers leverage the combined processing power of botnets for crypto mining,
gaining monetary benefits.
Avoiding Detection: To avoid detection, attackers typically use a portion (20-25%) of each zombie's
processing power, minimizing the impact on the user's machine.
Detection Challenges: Attackers often avoid using all available processing power to prevent
immediate detection.
Security Measures: Users and organizations should implement security measures to prevent
machines from becoming part of a botnet.
Best Practices: Regular updates, security awareness training, and multi-factor authentication help
protect against malware and botnet infections.
53:
1. Rootkits Overview:
Definition: Rootkits are specific types of software designed to gain administrative-level control over a
computer system without detection.
2. Administrative Permissions:
Windows vs. Unix/Linux/Mac OS: On Windows, the highest level of permission is held by the
administrator account, while on Unix, Linux, or Mac OS, it is the root account.
Power of Administrative Access: Administrative or root access grants the ability to install and delete
programs, manage ports, and perform various actions on the system.
Security Rings: Computer systems have different rings of permissions, with user permissions in ring
three (outermost) and kernel mode (ring zero) having the highest permissions.
Kernel Mode: Kernel mode allows control over critical system components like device drivers, sound
cards, and video displays.
4. Rootkit Operations:
Targeted Rings: Rootkits aim to operate in ring one or even ring zero, maximizing their permissions
and potential damage.
Detection Avoidance: Rootkits move from ring one to ring zero to hide from the operating system
and avoid detection.
Challenges for Security Solutions: Rootkits are challenging to detect due to their deep integration
into the operating system.
5. DLL Injection:
Definition: DLL injection is a technique to run arbitrary code within another process's address space
by forcing it to load a dynamic-link library (DLL).
DLLs in Windows: DLLs, collections of code and data, are used by multiple programs simultaneously,
often provided within the Windows OS.
Malicious Code Insertion: Rootkits use DLL injection to insert malicious code into a running process,
exploiting the loading of DLLs at runtime.
6. Shim Technique:
Definition: A shim is a piece of software code placed between two components, intercepting and
redirecting their calls.
Rootkit Application: Rootkits use the shim technique to intercept communications between the
operating system and dynamic-link libraries, redirecting calls through embedded malicious code.
Detection Challenges: Rootkits are challenging to detect because they operate deep within the
operating system, often rendering traditional antivirus solutions ineffective.
Effective Detection Method: The most effective method for detecting rootkits is to conduct an
external system scan using a live boot Linux distribution.
54:
1. Backdoors:
Definition: Originally placed in computer programs to bypass normal security and authentication
functions.
Historical Context: Common in the 1980s and 1990s for maintenance and repairs without going
through usual security layers.
Modern View: Considered a breach of secure coding practices; most software today avoids
backdoors.
Nature: Acts like a backdoor; placed by threat actors to maintain persistent access.
Installation: Users tricked into clicking phishing links, leading to malware installation.
Functionality: Creates a callback connection, allowing the attacker to connect and bypass default
security measures.
3. Easter Eggs:
Definition: Insecure coding practice where programmers insert hidden features, jokes, or gags into
software.
Example: Google's "do a barrel roll" Easter Egg in the search application.
Security Implications: May introduce vulnerabilities due to additional code; not subjected to rigorous
security testing.
4. Logic Bombs:
Definition: Malicious code inserted into a program; executes when specific conditions are met.
Purpose: Typically more malicious than Easter Eggs; has harmful intent.
Example: Dennis Nedry's logic bomb in "Jurassic Park" designed to shut down power for theft.
Backdoors: Should not be included in modern applications; considered a breach of secure coding
standards.
Easter Eggs: While generally harmless, may introduce vulnerabilities; avoid in critical applications.
Logic Bombs: Malicious and harmful; strict security measures should be in place to prevent them.
Avoidance: Backdoors, Easter Eggs, and logic bombs are discouraged in modern applications for
security reasons.
55:
1. Keyloggers:
Definition: Software or hardware that records every keystroke on a computer or mobile device.
Software-Based:
Often bundled with other software or delivered through social engineering attacks.
Operate silently in the background and transmit captured data to a remote server.
Hardware-Based:
3. Risks Associated:
Personal Risks:
Business Risks:
4. Protective Measures:
Ensure systems and software are updated to prevent exploitation of known vulnerabilities.
Train end-users to be cautious about downloading attachments or clicking links from unknown or
untrusted sources.
Implement MFA across the enterprise network to add an extra layer of verification.
Even if passwords are captured, additional steps are required for access.
Keystroke Encryption:
Scrambles typed information before sending it over the system, making it unusable to threat actors.
Physical Checks:
Regularly inspect system hardware for unfamiliar devices, especially in sensitive environments.
56:
1. Spyware:
Definition: Malicious software designed to gather and send information about a user or organization
without their knowledge.
Data Collection: Ranges from browsing habits to sensitive data like passwords and credit card
numbers.
Installation Methods:
Effects:
Invasion of privacy.
Protection Measures:
Use reputable antivirus and anti-spyware tools regularly updated for threat detection and removal.
2. Bloatware:
Definition: Software pre-installed on devices that users did not specifically request or need.
Origin: Often part of promotional partnership deals between manufacturers/vendors and software
companies.
Effects:
Mitigation:
3. Removal of Bloatware:
Manual Removal:
On Windows, use the Programs and Features section in the Control Panel.
4. Best Practices:
Spyware Protection:
Bloatware Management:
57:
Historical Methods:
Modern Approach:
Objective:
3. Attacker Objectives:
Network Influence:
Action on Objectives:
Concealment:
Hide tracks, erase log files, and eliminate evidence of malicious activities.
Various Methods:
Strategy:
Awareness:
58:
1. Account Lockouts:
Indicator:
Significance:
Indicator:
Significance:
3. Blocked Content:
Indicator:
Significance:
4. Impossible Travel:
Indicator:
User account accessed from geographically separated locations in a very short time.
Significance:
Indicator:
Significance:
6. Resource Inaccessibility:
Indicator:
Significance:
7. Out-of-Cycle Logging:
Indicator:
Significance:
8. Missing Logs:
Indicator:
Significance:
Indicator:
Significance: