Sy0 601 04
Sy0 601 04
4
Identifying Social Engineering and Malware
Topic
4A
Compare and Contrast Social Engineering Techniques
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 2
Syllabus Objectives
Covered
• 1.1 Compare and contrast different types of social engineering techniques
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 3
Social Engineering
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 4
Social Engineering Principles
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 5
Impersonation and
Trust
• Impersonation
• Pretend to be someone else
• Use the persona to charm or to
intimidate
• Exploit situations where identity-
proofing is difficult
• Pretexting
• Using a scenario with convincing
additional detail
• Trust
• Obtain or spoof data that
supports the identity claim
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 6
Dumpster Diving and
Tailgating
• Dumpster diving
• Steal documents and media from trash
• Tailgating
• Access premises covertly
• Follow someone else through a door
• Piggy backing
• Access premises without authorization, but with the knowledge of an employee
• Get someone to hold a door open
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 7
Identity Fraud and Invoice
Scams
• Identity fraud
• Impersonation with convincing detail and stolen or spoofed proofs
• Identity fraud versus identity theft
• Invoice scams
• Spoofing supplier details to submit invoices with false account details
• Credential theft and misuse
• Credential harvesting
• Shoulder surfing
• Lunchtime attack
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 8
Phishing, Whaling, and
Vishing
• Trick target into using a malicious
resource
• Spoof legitimate communications and
sites
• Spear phishing
• Highly targeted/tailored attack
• Whaling
• Targeting senior management
• Vishing
• Using a voice channel
• SMiShing
• Using text messaging
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 9
Spam, Hoaxes, and
Prepending
• Spam
• Unsolicited email
• Email address harvesting
• Spam over Internet messaging (SPIM)
• Hoaxes
• Delivered as spam or malvertising
• Fake A-V to get user to install remote desktop software
• Phone-based scams
• Prepending
• Tagging email subject line
• Can be used by threat actor as a consensus or urgency technique
• Can be added by mail systems to warn users
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 10
Pharming and Credential
Harvesting
• Passive techniques have less risk of detection
• Pharming
• Redirection by DNS spoofing
• Typosquatting
• Use cousin domains instead of redirection
• Make phishing messages more convincing
• Watering hole
• Target a third-party site
• Customer, supplier, hobbies, social media...
• Credential harvesting
• Attacks focused on obtaining credentials for sale rather than
direct
intrusion
• Attacks focused on obtaining multiple credentials for
single company
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 11
Influence Campaigns
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 12
Social Engineering Techniques
Review Activity
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 13
Topic
4B
Analyze Indicators of Malware-based Attacks
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 14
Syllabus Objectives
Covered
• 1.2 Given a scenario, analyze potential indicators to determine the type of
attack
• 4.1 Given a scenario, use the appropriate tool to assess organizational
security (Cuckoo only)
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 15
Malware Classification
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 16
Computer Viruses
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 17
Computer Worms and Fileless
Malware
• Early computer worms
• Propagate in memory/over network links
• Consume bandwidth and crash process
• Fileless malware
• Exploiting remote execution and memory residence to deliver payloads
• May run from an initial script or Trojan
• Persistence via the registry
• Use of shellcode to create backdoors and download additional tools
• “Living off the land” exploitation of built-in scripting tools
• Advanced persistent threat (APT)/advanced volatile threat (AVT)/
low observable characteristics (LOC)
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 18
Spyware, Adware, and
Keyloggers
• Tracking cookies
• Adware (PUP/grayware)
• Changes to browser settings
• Spyware (malware)
• Log all local activity
• Use of recording devices and
screenshots
• Redirection
• Keylogger
• Software and hardware
Screenshot used with permission from ActualKeylogger.com.
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 19
Backdoors and Remote Access
Trojans Screenshot used with permission from
Wikimedia Commons by CCAS4.0
International.
• Backdoor malware
• Remote access trojan (RAT)
• Bots and botnets
• Command & control (C2 or C&C)
• Backdoors from misconfiguration
and unauthorized software
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 20
Rootkits
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 21
Ransomware, Crypto-Malware, and Logic
Bombs
• Ransomware
• Nuisance (lock out user by
replacing shell)
• Crypto-malware
• High impact ransomware
(encrypt
data files or drives)
• Cryptomining/crypojacking
• Hijack resources to mine
cryptocurrency
• Logic bombs
Image by Wikimedia Commons.
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 22
Malware Indicators
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 23
Process
Analysis
Screenshot: Process Explorer docs.microsoft.com/en-us/sysinternals. • Signature-based detection is failing
to identify modern APT-style tools
• Network and host behavior
anomalies drive detection methods
• Running process analysis
• Process Explorer
• Logging activity
• System Monitor
• Network activity
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 24
Indicators of Malware-Based Attacks
Review Activity
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 25
Assisted Lab
Lab Activity
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 26
Applied Lab
Lab Activity
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 27
Lesson
4
Summary
CompTIA Security+ Lesson 4 | Copyright © 2020 CompTIA Properties, LLC. All Rights Reserved. | CompTIA.org 28