CybSec Module 2
CybSec Module 2
• How Hackers Exploit: Attackers scan for systems that still use these default
configurations or have easily guessable credentials. Misconfigurations,
such as open ports or directories, give hackers easy entry points to exploit,
allowing them to move laterally within the network or take control of
critical resources.
Categories of Cybercrime:
• Cybercrimes can be categorized based on the following:
1. The target of the crime, and
Crimes targeted at individuals
Crimes targeted at property
Crimes targeted at organizations
3. Online stalkers: They aim to start the interaction with the victim
directly with the help of the Internet.
• Email and chat rooms are the most popular communication
medium to get connected with the victim, rather than using
traditional instrumentation like telephone/cell phones.
• The stalker makes sure that the victim recognizes the attack
attempted on him/her.
• The stalker can make use of a third party to harass the victim.
2. Offline stalkers: The stalker may begin the attack using traditional
methods such as following the victim, watching the daily routine of
the victim etc.
• Searching on message boards/newsgroups, personal websites, and
people finding services or websites are most common ways to
gather information about the victim using the Internet.
• The victim is not aware that the Internet has been used to
perpetuate an attack against them.
How Stalking Works?:
• It is seen that stalking works in the following ways:
1. Personal information gathering about the victim.
2. Establish a contact with victim through telephone/cellphone.
3. Stalkers will almost always establish a contact with the victims through
Email.
4. Some stalkers keep on sending repeated Emails asking for various kinds of
favors or threaten the victim.
5. The stalker may post the victim’s personal information on any website
related to illicit services. (Ex: Dating Services)
6. Whosoever comes across the information, start calling the victim the given
contact details.
7. Some stalkers subscribe/register the Email account of the victim to
innumerable pornographic and other sites.
Botnets: The Fuel for Cybercrime:
• The dictionary meaning of Bot is “(computing) an automated
program for doing some particular task, often over a network.”
• Botnet is a term used for collection of software robots, or Bots, that
run autonomously and automatically.
• The term is often associated with malicious software but can also
refer to the network of computers using distributed computing
software.
• In simple terms, a Bot is simply an automated computer program.
• One can gain the control of the computer by infecting them with the
virus or other malicious code that gives the access.
• Botnets are often used to conduct a range of activities, from
distributing Spam and viruses to conducting denial-of-service attacks.
• A Botnet (also called as zombie network) is a network of computers
infected with a malicious program that allows cybercriminals to
control the infected machines remotely without the user's
knowledge.
• “Zombie networks” have become a source of income for entire groups
of cybercriminals.
• If someone wants to start a “business” and has no programming skills,
there are plenty of “Bot for sale” offers on forum.
• One can reduce the chances of becoming part of Bot by limiting access
into the system. Leaving the Internet connection ON and unprotected
is just like leaving the front door of the house wide open.
• One can ensure following to secure the system:
1. Use antivirus and anti-Spyware software and keep it up-to-date.
2. Set the OS to download and install security patches automatically.
3. Use the firewall to protect the system from hacking attacks while it is
connected on the Internet.
4. Disconnect from the Internet when you are away from your
computer.
5. Downloading the freeware only from websites that are known and
trustworthy.
6. Check regularly the folders in the mailbox-sent items or outgoing- for
those messages you did not send.
7. Take an immediate action if your system is infected.
The diagram illustrates how botnets are used for illegal and gainful purposes. Here's a breakdown of the flow:
1. Botnet Creation
•This is the initial step where a botnet is created. A botnet is a network of infected computers controlled by a central
entity (the botmaster).
2. Botnet Renting and Botnet Selling
Once a botnet is established, it can be:
•Botnet Renting: The botnet is rented out to others for various malicious purposes.
• DDoS Attacks: Distributed Denial of Service (DDoS) attacks, where the botnet is used to flood a target with
traffic, making it inaccessible.
• Spam Attacks: The botnet sends mass spam emails or messages.
• Malware and Adware Installation: The botnet is used to install malicious software (malware) or unwanted
advertising software (adware) on infected computers.
•Botnet Selling: The entire botnet is sold to someone else for their use.
• Stealing Confidential Information: This includes collecting sensitive information like personal data and login
credentials from infected devices.
• Selling Credit Card and Bank Account Details: The stolen financial information is sold on black markets.
• Selling Personal Identity Information: The botnet is used to steal and sell personal identity details such as
social security numbers, addresses, etc.
• Spamdexing: The botnet is used to manipulate search engine rankings by generating false or repetitive
content.
• Phishing Attacks: The botnet carries out phishing campaigns to trick users into providing sensitive information
like passwords or credit card numbers.
• Selling Internet Services and Shops Account: Stolen accounts from online services and e-commerce platforms
are sold for illegal profits.
Attack Vector:
• An ‘attack vector’ is a path or means by which an attacker can gain
access to a computer or to a network server to deliver a payload or
malicious outcome.
• Attack vectors enable attackers to make use of system vulnerabilities,
including the human element.
• Attack vectors include viruses, Email attachments, webpages, pop-up
windows, instant messages, chat rooms, and deception.
• All of these methods involve programming, except deception, in which a
human operator is fooled into removing or weakening system defenses.
• To some extent, firewalls and antivirus software can block attack
vectors.
• The most common malicious payloads are viruses, Trojan Horses,
worms and spyware.
The attack vectors are launched:
1. Attack by Email
2. Attachment(and other files)
3. Attack by deception
4. Hackers
5. Viruses
6. Attack of the worms
7. Heedless guests (Attack by Webpage)
8. Malicious Macros
9. Foistware (Sneakware)
1. Attack by Email:
The hostile content is either embedded in the message or leaked to by the
message.
Sometimes attacks combine the two vectors, so that if the message does
not get you, the attachment will.
Spam is almost always carrier for scams, frauds, dirty tricks, or malicious
action of some kind.
Any link that offers something ‘free’ or tempting is a suspect.
2. Attachment(and other files):
Malicious attachments install malicious computer code.
The code could be a virus, Trojan Horse, Spyware, or any other kind of
malware.
Attachments attempt to install their payload as soon as we open them.
3. Attack by deception:
Deception is aimed at the user/operator as a vulnerable entry point.
It is not just malicious computer code that one needs to monitor.
Frauds, scams, hoaxes, spam, viruses, worms, and such require the unwitting
cooperation of the computer’s operator to succeed.
4. Hackers:
Hackers/crackers are a formidable attack vector.
Hackers/crackers use a variety of hacking tools and heuristics, to gain access
to computers and online accounts.
They often install a Trojan Horse to commander the computer for their own
use.
5. Viruses:
These are malicious computer codes that hitch a ride and make the
payload.
Now-a-days, virus vectors include Email attachments, downloaded files,
worms, etc.