Module 2_Threats & ExploitsScript
Module 2_Threats & ExploitsScript
2.4 Tactics, Techniques and The Tactics, Techniques and Procedures utilised by Threat
Procedures Actors and stages of an attack
2.7 Zero-Day Vulnerabilities Description of, timelines of, case study and how to protect
against.
Module outline and expected learning outcomes
In this module we will explore the current cybercrime landscape; the people working within this
landscape, known as threat actors, or TAs and their motivations; the cyber threats that TAs utilise
such as malware and phishing scams; and a few key considerations resolving around threats
within the cybercrime landscape.
This equates to 226 million google searches, every minute of every day, with
each search using enough energy to power a standard 60W lightbulb for
around 17 seconds.
As you can imagine, this is a lot of activity and it’s estimated that Google’s
data centres use around 1.5% of the whole planet’s energy supply.
But what about activity in the darker underbelly of the internet - cybercrime?
Cyber criminals make an attack every 39 seconds with nearly all featuring
hacking, malware, phishing or social engineering.
Even with these alarming figures, only 5% of companies’ folders are properly
protected.
The Morris Worm of 1988 was one of the first documented computer worms
to gain media notoriety.
Morris claims that the code was not designed to cause damage, but as an
experiment to highlight security flaws.
An unfortunate and supposedly unintended consequence of the code
transformed the Morris Worm from a harmless intellectual exercise into a
virulent denial-of-service attack. This element of the code was in the
spreading mechanism, enabling the code to infect systems multiple times.
Each additional infection would slow the affected machine down to the point
where many became unusable.
The code infected two thousand computers in fifteen hours in a year when
there were only 60,000 computers connected to the internet and was so
damaging the internet had to be partitioned for several days to prevent the
spread, as networks were cleaned of the worm.
Moving a decade on to 1998, we see this image which shows the infamous
hacker group, L0pht Heavy Industries, as they testify to the US Senate. They
claimed that they were able to completely shutdown nationwide internet
access in just 30 minutes, and it is very likely that they could do what they
claimed. Even over 20 years ago, this would have had a significant affect on
the economy and would be completely devastating.
One thing of note is that this was not some basement-dwelling hacker group.
Many were highly educated electrical and software engineers who went on to
found successful cybersecurity companies and run government defence
programs.
He was actually also arrested five years earlier in 2003 when spotted by a
plainclothes NYPD officer withdrawing hundreds of dollars from an ATM, then
switching cards and withdrawing more, switching again and again and
continually withdrawing.
This initial arrest led to his employment by the United States Secret Service
to bring down the international hacker group he was affiliated with, called
Shadowcrew. After this he was allowed to return to normal life, however, his
gift for deception meant that throughout the time he was cooperating with the
Secret Service, he was also orchestrating a crew of hackers to gain access to
the 170 million payment card accounts which he had stolen from large
shopping chains in the US. He utilised a combination of SQL injection
backdoors in order to collect network traffic from within corporate computer
systems.
From September 2013 to May 2014, a famous trojan ran riot infecting
computers running Microsoft Windows with a ransomware called
CryptoLocker.
2019 was a year of big data breaches, with cyber attacks targeting Internet of
Things Devices surging 300%. Just three attacks alone against First
American, Facebook and Capital One resulted in over 1.5 billion
compromised records.
Compromised records, along with other illicit products, like drugs, weapons
and even child pornography, is sold by cyber criminals on darknet
marketplaces, such as Genesis Market and Samara Market.
One thing that’s clear is that there is a tremendous amount of money involved
and that the motivation behind attacks is evolving more and more toward pure
^CLICK^ financial gain rather than internet fame like we saw in the days of
L0pht Heavy Industries. This isn’t expected to change any time soon as more
internet-dependent consumables are developed each year with potential to
be targeted, such as driverless cars, airplane communication modules and
even medical devices like pacemakers.
But who exactly will be leading the way for cybercriminals? In the next video
we’ll look at the main culprits, and their motivations.
When picturing a cyber criminal, most would imagine a pale, skinny nerd
operating from his mum’s basement, but reality could not be further from the
truth.
You may have already guessed, the motivation of an organised cyber criminal
is financial gain. Cyber criminals achieve this by running large-scale
organisations with highly-skilled and well-communicating team members.
In recent years, the TTP of choice for organised cyber criminals by far has
been mass phishing campaigns designed to compromise as many machines
as possible. Each compromise only provides potential for a small monetary
gain, but when large numbers of machines are compromised, the revenue
generated can be astounding.
Hacktivists
The second type of threat actor aren’t interested in financial gain as they are
activism-motivated, and are know as Hacktivists.
The most well known hacktivists are the group Anonymous, who are a not
just a collection of hackers, but also activists and general internet users. They
target high profile ideological groups such as the KKK, ISIS and international
arms dealers.
Hacktivist’s have two main TTPs of choice. The first is defacing websites of
governments, embassies, corporations or any organisation they don’t agree
with. The aim of this kind of attack is to embarrass the victim which may seem
like a relatively light-hearted attack, but the potential damage caused to the
reputation of certain organisations such as a the police force can be severely
costly.
Nation States
The third group of threat actors are nation states, AKA state-sponsored
hackers. Nations have been obsessively spying on and attacking each other
since they’ve existed, and the invention of the internet has just permitted
them to up their efforts.
Nation States often hire prolific national hackers and provide them a route to
legitimate income away from cyber crime. State-sponsored hackers are highly
resourced and their TTP of choice is advance persistent threat (APT) which is
a term used to describe utilising multiple different attack vectors to gain long-
term access to information.
Insider Threats
And more recently, we have found an increase in activity from the fourth
category, insider threats, which are threats from within an organisation itself.
The intent of this type of threat actor can range dramatically from the
malicious to the best-intentions.
As you probably guessed, the TTP of choice is nearly always information data
theft.
Now that you’ve learnt about the four main types of Threat actors, it’s time to
dive a little deeper into the different types of Threats, Techniques and
Procedures that these four TAs favour.
The next section of this course will cover the different types of malware.
But before we start, what exactly is malware?
A lot of people think that malware is the same as computer viruses, but the
truth is that a computer virus is just one of many types of malware.
The word malware is derived from the term ‘Malicious Software’. Malicious
Software, or malware, is intrusive code designed to infect a computer, server,
client or network with the aim of causing harm or stealing information.
There are many different types of malware out there to be wary of, but
generally we categorise them depending on some key behavioural difference.
Worms
First we’ll cover worms, which are independent, self-contained malware
programs that are able to spread functional copies of themselves through
remote code execution. A worm does not require user interaction to infect a
system meaning they could infect your computer without you doing anything
at all.
Worms often spread exponentially as the number of infected computers
increases.
Trojan Horse
The next malware we’ll look at take their name from Ancient Greek mythology
where the Greeks hid within a giant wooden horse, disguised as a gift, in
order to penetrate the walls of Troy.
Trojan horses are any malware that misleads its true intent and cannot self-
replicate.
They often utilise social engineering tactics to compromise machines, such as
fake advertisements or phishing. One of the most common trojans is a user
receiving an email and opening an attachment believing it to be legitimate.
When they open it, however, the attacker uses the opportunity to delivers a
payload that may allow them to obtain the user’s personal information, such
as banking log in details and passwords
A big problem in the past and good example of a trojan is Fake Anti-Virus
software, or FakeAV. It is a type of rogue security software posing as
legitimate software which misleads the user into believing that their machine
is infected with malware. The FakeAV malware requires a payment in order to
be purchased, which the victim will happily pay in order to remove the fake
malware from their system, but will then install real malware on their
computer as part of the FakeAV installation.
Viruses
The third malware we will look at today are viruses. Virus’ require user
interaction
Viruses are malware which hide their own code within executable programs
such as .exe and com files. The virus will modify the executable so that when
the program is executed, the virus spreads or replicates.
A virus will spread further when the program which it is hiding within is shared
and subsequently executed by others.
Spyware
The term spyware has been around since roughly 2000, although spyware
really took off in 2003. It is any program that monitors and gathers information
without the user’s knowledge.
Generally, the software is installed on purpose by somebody with the
intention of monitoring another user of the computer that it is being installed
on. This is the key different between spyware and a trojan or backdoor - it is
without the user’s knowledge, not without the user’s permission. The
ambiguity is that there are multiple users.
A lot of spyware is directed toward ‘concerned’ family members or a
‘suspecting spouse’. Regardless of motivation, installing spyware without an
affiliate’s knowledge is a grossly unethical breach of privacy.
Common damage we see caused by spyware includes the collection of
personal and confidential information, the installation of unsolicited software,
redirection of web browsers and also the adjustment of computer settings.
Pause the video in a moment and refer to Exercise 1, Question 2 in your
exercise worksheet. What do you think Sally has done, and what does she
need to now do?
Ransomware
Modern Malware
Botnets
We’ve mentioned the term ‘botnet’ a few times over the course of this
module, which is a collection of compromised computers, often referred to as
zombies.
They are the product of malware makings rounds on the internet and infecting
large numbers of computers, sometimes into the millions!
The hacker who compromised these computers, referred to as the bot master
or bot herder, can access and control the botnet using command and control
(C&C) software to deliver DDoS attacks, send spam, orchestrate mass
phishing campaigns and more!
Continued learning:
If you’re interested in learning about more types of malware, you can do
some internet research on on any of the following types which haven’t been
covered in this syllabus:
Backdoors
• Downloaders
• Adware
• Droppers
• Rootkits
• Dialers
• Initial Access
• Execution
• Persistence
• Privilege Escalation
• Defensive Evasion
• Credential Access
• Discovery
• Lateral Movement
• Collection
• Command and Control
• Exfiltration
Initial Access
The adversary is trying to get into your network.
Initial Access consists of techniques that use various entry vectors to gain
their initial foothold within a network. Techniques used to gain a foothold
include targeted spearphishing and exploiting weaknesses on public-facing
web servers. Footholds gained through initial access may allow for continued
access, like valid accounts and use of external remote services, or may be
limited-use due to changing passwords.
Execution
Persistence
Privilege Escalation
Defense Evasion
Credential Access
Discovery
Lateral Movement
Collection
Exfiltration
Impact
In this video we will reviewing the types of attacks that threat actors carry out,
what they look like and steps to mitigate them. We will look at brute force
attacks, denial of service attacks, man in the middle attacks and SQL
injections.
What is a brute force attack? This is a trial and error hacking technique
where the hacker continually attempts to guess the credentials which includes
passwords, pin codes and encryption data. The hacker uses an automated
software to generate the guesses. Examples of these programmes include
John the Ripper and Cain and Abel.
These are run by high powered computers that can run tasks at high speed.
These attacks are not very sophisticated and they do take take advantages of
system vulnerabilities. Dictionary attacks use a list of common passwords and
frequently used combinations of words, letters and numbers to guess
passwords or patterns on the qwerty keyboard such as 1qaz. Hackers may
find lists of passwords on the dark web and use these in their dictionary
attacks.
The longer the password the less likely any brute force attack will ever be
able to crack the password it due to the probabilities involved.
So besides ensuring we have good password hygiene, how else can we
protect from brute force attack?
- Two-factor authentication is considered by many to be the first line of
defense against brute force attacks. Implementing such a solution
greatly reduces the risk of a potential data breach. The great thing
about two factor authentification is that password alone is not enough.
Even if an attacker cracks the password, they would have to have
access to your smartphone or email client.
- We all got used to seeing CAPTCHA on the internet. Nobody likes
trying to make sense of something that looks like it’s been scribbled by
a two-year-old, but tools such as CAPTCHA render automated bots
ineffective. That single requirement to enter a word, or the number of
traffic lights, is highly effective against bots, even though hackers have
started using optical character recognition tools to get past this safety
mechanism.
- Enforcing a timeout for users who exceed the maximum number of
failed login attempts. By locking an account only for a set amount of
time after a designated number of unsuccessful login attempts it means
that automated brute force attack tools will not be as useful.
Now let us look at how these attacks work. When you have a session
between a computer and a server, the computer will send requests to check it
is online and to interact with the content from the server. A denial of service
attack works by sending multiple requests, overloading the servers
capabilities, resulting in it becoming unavailable and unable to respond to
legitimate requests. The attacks leverage knowledge of protocols to maximise
the effect of their attacks to overwhelm the bandwidth of the target. These
attacks are measured by how many bits of traffic they send the target per
second, depending on the attack they may be measured in Mbps, Gbps and
Tbps. However not all attacks are bandwidth focused.
Both attacks work by flooding a network or server with requests until the
website comes inaccessible
A DoS attack uses a single machine to launch the attack whereas a DDoS
attack uses multiple machines
A DDoS attack may use malware to affect multiple computers
DDoS attacks often use multiple computers flood the target with requests
distributed using botnets
DDoS attack have become a growing form of cyber crime, with cybercriminals
monetising on this trend with DDoS for hire attacks They advertise their
services on the dark web with promises to take competitors offline. In 2019 a
21-year old pleaded guilty to operating the Satori botnet, offering DDoS-for-
hire services using hacked IoT devices. This botmaster had infected more
than 800,000 devices including home routers, security cameras, welcomes
and online gaming platforms. The Satori-controlled botnets would flood
victims systems with internet traffic, taking them offline.
These attacks are highly effective and can cause huge amounts of damage to
the victims. With one attack an organisation or individual may be offline for a
substantial amount of time causing loss in revenue, loss of communication
and damage to reputation.
Lets is now have a look at some of the motivation for DoS and DDoS attacks:
• Financial - a company may seek to cause a competitors website to go
offline in order to increase legitimate traffic to their own website. An
online retail business going offline during an end of tax year sale would
cause huge financial losses. In 2017 research carried out by Kaspersky
Lab revealed that more than 40% of businesses hit by DDoS attacks
believed their competitors were behind it
• Political - an organisation may want to take down a website of an
opponent or opposing political group so they are unable to share their
political messages. In 2014, citizens in Hong Kong were invited to vote
on a referendum of constitutional voting reforms which would allow all
citizens to vote in elections. DDoS attacks targeted pro-democracy
websites such as Popvote, with peak traffic levels hitting 500 Gbps
• Hacktivists - these are cyber activists who take sites offline in the name
of their own ideologies. These attacks are often a form of ‘justice’
delivered to an organisation that the hackivisits feel wronged by.
Anonymous is a hacktivist group that have been active for many years
and have launched DDoS attacks against financial institutions based on
the belief that capitalism is evil
So how can you prevent and combat these form of attacks?
Detection: abnormal traffic flows can be detected and responded to early on
before major damage is done.
Idenitfy: DoS attacks are easier to combat as the victim can identify and block
the IP address of the particular attacker. However, DDOS attacks are harder
to combat because of the sheer volume of traffic, and it is difficult to identify
between legitimate traffic and attacks.
Routing - Organisations can avoid a single point of failure by spreading their
servers or they may increase their bandwidth to make it more difficult for the
attackers to overwhelm the server.
Response plan: In order to be proactive organisations should have DDoS
response plan in the event of an attack or they may outsource support from
companies specialise in DDos attacks.
Man-In-The-Middle Attacks
Active MITM attacks often take place with email hijacking where the attacker
gains access to email accounts, can send emails from the victims account.
Here is an example of a MITM attack. The hacker impersonates both sides of
the conversation allowing him to gain access to funds.
This is commonly carried out with ARP spoofing. ARP spoofing is the process
of linking an attacker’s MAC address with the IP address of a legitimate user
on a local area network using fake ARP messages. As a result, data sent by
the user to the host IP address is instead transmitted to the attacker.
In 2015, a cyber-criminal group in Belgium stole a total of €6 million by
hacking through company emails using a man in the middle attack. The
hackers were able to gain access of corporate email accounts and request
money from clients using the hacked accounts.
So what is phishing?
Phishing works on the process of impersonating a trustworthy party to gain
access to sensitive data or install malware on a victims machine. It relies on
manipulation, where the user assumes the content from the author is
legitimate and has legitimate authority. The attacker is using using social
engineering tactics to fool you into thinking it is safe. Humans are, by nature,
trusting and often fall prey to manipulation online, which is a major risk to
cybersecurity.
Unsuspecting users are then sent to a fake PayPal branded website that
looks legitimate asking them to enter their credentials.
After they have logged in they are then asked to update their billing address
and payment information. The cyber criminal now has access to log in
credentials, address, mobile number and credit card information.
Now let us have a look at this email, interact with it and see it we can spot
any signs that would tell us it was a phishing email.
• Firstly, by hovering over the sender details, we can see that the email
domain is @gmail.com rather than the company name and the
company name has been misspelt
• When we look at the salutation we can see it is vague and does not
directly greet the recipient
• As you read the email you can see that the language is used to create a
sense of urgency and scare the recipient
• There are several spelling errors and poor grammar throughout.
• Before clicking on the link, you can hover over it and see that it does
not take you to the legitimate Dropbox website
Now let us have a look at a highly sophisticated zero day attack that targeted
Irans nuclear systems infrastructure.
In 2010, a highly sophisticated zero-day attack used Stuxnet, which was a
worm that exploited previously unknown Windows zero-day
vulnerabilities. Stuxnet was undetectable and the Iranian monitoring systems
never picked up the malware until it was too late.
This is how it happened
1) Attackers infiltrated Windows computer systems trying to find
vulnerabilities
2) Stuxnet was deployed using a worm via a USB and exploited zero day
vulnerabilities in the Microsoft Windows OS
3) The vulnerabilities passed from Windows software to the nuclear control
systems, allowing the malware to gain highly privileged access
4) The malware manipulated the centrifuge system, resulting in them
burning themselves out and shutting down