Unit II
Unit II
• Mechanism: Attackers craft messages that look legitimate, often using logos and
language familiar to the target audience. The emails typically contain links to fake
websites designed to look like official sites, or they may include attachments that
contain malware.
• Identity Theft: Identity theft occurs when someone unlawfully obtains and uses another
person's personal information, typically for financial gain. This crime can severely impact the
victim’s credit, finances, and personal life.
• Financial Identity Theft: Using someone else’s personal information to open credit
accounts or make purchases.
• Medical Identity Theft: Using someone else’s health information to obtain medical
services or prescriptions.
• Criminal Identity Theft: Using someone else’s identity when arrested, leading to
legal complications for the victim.
• Example: A cybercriminal steals an individual's Social Security number through phishing and
applies for credit cards in the victim’s name. When the victim receives bills for purchases
they never made, it complicates their financial situation and damages their credit score.
2. Methods of Phishing
• Email Phishing: This is the most widespread phishing method. Attackers send mass emails
that appear to originate from reputable organizations to lure victims into revealing personal
information.
• Example: A victim receives an email that appears to be from a popular online
shopping site, stating there’s a problem with their account. The email includes a link
directing the victim to a fake website that looks identical to the legitimate site.
• Spear Phishing: Unlike general phishing, spear phishing targets specific individuals or
organizations. Attackers often research their targets extensively to make their attacks more
convincing.
• Example: An attacker sends a personalized email to an employee in a company’s
finance department, pretending to be the CFO and requesting immediate approval
for a financial transaction. The email may include specific details about the company
to enhance credibility.
• Whaling: This is a more targeted form of spear phishing aimed at high-profile targets such as
executives. The stakes are higher due to the potential access to sensitive company
information.
• Example: An attacker sends an email to the CEO of a company, posing as a trusted
board member, requesting a wire transfer for a supposed urgent investment. The
email appears legitimate, and the CEO, believing it is a genuine request, initiates the
transfer.
• Vishing (Voice Phishing): Vishing involves phone calls instead of emails. Attackers
impersonate legitimate organizations to extract personal information.
• Example: A victim receives a call from someone claiming to be from their bank’s
fraud department, asking them to verify account details due to suspicious activity.
The victim, trusting the caller, discloses sensitive information.
• Smishing (SMS Phishing): Smishing uses text messages to deceive individuals. Attackers send
messages that prompt users to click on links or provide personal information.
• Example: A user receives a text message claiming they’ve won a prize and must click
a link to claim it. The link directs them to a phishing site designed to steal their
credentials.
4. Phishing Toolkits
Phishing toolkits are software packages that cybercriminals use to create phishing campaigns. These
toolkits come equipped with various features that simplify the process of launching phishing attacks.
• Website Templates: Toolkits often include pre-designed templates for fraudulent websites,
allowing attackers to quickly create convincing sites that mimic legitimate services.
• Email Spoofing Tools: These tools enable attackers to forge email headers, making it appear
as though the email is coming from a trusted source.
• Data Harvesting Scripts: These scripts are designed to capture user input from fake
websites, allowing attackers to collect sensitive data without detection.
• Example: An attacker might use a phishing toolkit to create a fake banking site.
When victims log in, the toolkit captures their credentials, allowing the attacker to
access their real accounts.
5. Spy Phishing
Spy phishing is a more advanced phishing technique where attackers gather information about their
targets to tailor their phishing attempts effectively.
• Crafting the Attack: Once sufficient information is collected, attackers create phishing
emails that resonate with the victim’s interests or needs, making them more likely to fall for
the scam.
• Types of PII:
• Full Name: Often used to verify identity.
• Social Security Number (SSN): Critical for identity verification; its theft can lead to
severe financial fraud.
• Date of Birth: Commonly used in security questions and account recovery processes.
• Email Address: Frequently targeted in phishing attacks; essential for account recovery.
• Phone Number: Used for two-factor authentication and can be exploited in social
engineering attacks.
Risks Associated with PII: When cybercriminals obtain PII, they can exploit it for a range of
malicious activities, including opening new credit accounts, making unauthorized purchases, and
committing fraud.
• Medical Identity Theft: In this form of identity theft, an individual uses someone else’s
health information to obtain medical care or prescriptions, which can lead to serious health
issues for the victim.
• Example: A thief uses a victim's health insurance details to receive treatment,
resulting in the victim receiving medical bills and potentially damaging their
insurance coverage.
• Criminal Identity Theft: This occurs when a thief uses someone else’s identity during an
arrest. The victim can end up with a criminal record, which complicates their life
significantly.
• Example: A criminal provides a stolen identity to law enforcement during an arrest.
The innocent individual must navigate a complex legal system to clear their name.
8. Password Cracking
Password cracking is a technique used to recover passwords from stored data or transmitted
information. Attackers utilize various methods, each with different levels of effectiveness and time
requirements.
• Brute Force Attack: A brute-force attack involves trying every possible combination of
characters until the correct password is found. While it guarantees eventual success, it can
be very time-consuming, especially for complex passwords.
• Example: If a password consists of only four digits, a brute-force attacker might try
all combinations (0000 to 9999) until they find the correct one. For more complex
passwords, this method can take years.
• Dictionary Attack: A dictionary attack uses a list of common passwords and phrases to gain
access to accounts. This method is much faster than brute-force attacks because it targets
likely passwords.
• Example: An attacker may use a precompiled list of passwords such as "password,"
"123456," and "qwerty" in an attempt to gain access to an account.
• Rainbow Tables: Rainbow tables are precomputed tables for reversing cryptographic hash
functions, primarily used for cracking password hashes. They significantly speed up the
password recovery process.
• Example: If a password hash is stored using a common algorithm, an attacker can
use a rainbow table to quickly find the corresponding password without needing to
compute the hash themselves.
10. Backdoors
Backdoors are methods used to bypass normal authentication processes in a system, allowing
unauthorized access. Cybercriminals create backdoors to maintain access to compromised systems
without being detected.
• Types of Backdoors:
• Software Backdoors: Embedded in software applications to allow attackers to exploit
vulnerabilities later.
• Hardware Backdoors: Installed at the hardware level, these can remain undetected even
by advanced security measures.
• Example: An attacker may exploit a vulnerability in a web application to install a
backdoor that allows them to log in remotely at any time, bypassing normal security
measures.
11. Steganography
Steganography is the practice of hiding a message within another medium, such as an image or
audio file, making it undetectable. Unlike encryption, which makes data unreadable, steganography
hides the existence of the data itself.
• How It Works: Cybercriminals use various techniques to embed messages or data within
seemingly innocuous files. For example, modifying the least significant bits of an image file
can store hidden data without significantly altering the image’s appearance.
• Example: An attacker embeds malicious code within an image file. When the image is
shared, the hidden code can be executed on the recipient's system, potentially
compromising it.
12. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
• Denial of Service (DoS) Attack: A DoS attack aims to make a service or website unavailable
by overwhelming it with excessive traffic. This can lead to slowdowns or crashes, impacting
legitimate users.
• Example: An attacker uses a single computer to flood a web server with requests,
consuming all available resources and causing legitimate users to be unable to access the
site.
• Distributed Denial of Service (DDoS) Attack: A DDoS attack is a coordinated attack from
multiple compromised systems (often part of a botnet) aimed at overwhelming a target
system. This type of attack is more challenging to mitigate due to the distributed nature of
the traffic.
• Example: An attacker commands thousands of infected devices to simultaneously send
requests to a website, causing it to crash due to the massive influx of traffic.
• Mechanism: Attackers look for forms, URLs, or other input fields where they can submit
data. If the application does not properly validate or sanitize the input, it may execute
harmful SQL commands, leading to unauthorized access or data manipulation.
• Example: An attacker enters the following input into a login form: ' OR '1'='1. If the
application does not handle this input correctly, it might grant the attacker access to the
database, allowing them to view, modify, or delete sensitive information.
• Mechanism: When data input exceeds the allocated buffer size, it can overwrite neighboring
memory, which may include control data that dictates program execution flow. Attackers
can exploit this to redirect the program’s execution to their own code.
• Example: An attacker crafts an input string designed to overflow the buffer and overwrite
the return address of a function. By carefully controlling this input, they can redirect the
program to execute their malicious code, gaining control of the system.