Attack Vectors
Attack Vectors
In cybersecurity realm
Michał Faron
Mateusz Włodarczyk
Maciej Kowalczyk
Franciszek Samiec
Mateusz Kadłubowski
Agenda
I. Phishing
II. Email attachments
III. Account Takeover
IV. Encryption
V. Insider Threats
VI. Browser-based attacks
VII.Application compromise
VIII.Patching vulnerabilities
IX. Open ports
X. Software vulnerabilities – case study
Phishing
Type of online scam where attackers trick people into sharing sensitive information by
posing as trusted entities.
Whaling
Advanced fee
scam
Phishing
Adware Botnets
Security practices
Legitimate sender
Relevant subject
Account Takeover
Account Takeover, commonly known as ATO, is a type of cybercrime where an attacker
gains unauthorized access to a user's account.
Hardcoded
Credential passwords
stuffing Passwords to accounts
Using bots to can be stored in
automatically attempt application code or
to log in to a user Account configuration files,
account using a list of
common or breached
Takeover which may be leaked.
passwords
Application Malware
vulnerabilities Malware infections on
Applications also have a user’s computer can
accounts, and an attacker steal passwords in
can exploit vulnerabilities various ways.
in these accounts to take Stolen cookies Phishing
advantage of their The cookies stored on a User credentials
access. user's computer can store are
information about their a common target
login session to allow of phishing
access to an account attacks
without a password
Account Takeover
A successful account takeover attack grants the attacker the same access and
permissions as the legitimate account owner. With this access, an attacker can take
various actions, such as:
Follow-on
Data theft Malware
attacks
delivery
• Breach and exfiltration of vast • Allow attackers to install and • Once an attacker gains access
amounts of sensitive, execute ransomware and other to a legitimate account, they
confidential, or protected malware on corporate systems can use that access to carry
classes of data out further attacks.
Lateral
Financial
movement
profit
• A compromised account can • Instead of using the
provide an entry point for an compromised account
attacker to an otherwise themselves, the attacker may
secure network. Attacker can sell access to it on the dark
expand their access or web
escalate privileges across
other corporate systems
Account Takeover Prevention
Strong password
policies
• Insiders may act out • Malicious insiders: Act with harmful int
of dissatisfaction, personal gain, or coe ent, exploiting privileges.
rcion from external attackers.
• Negligent insiders: Unintentionally
• They possess legitimate access, makin
g detection challenging. compromise security due to carelessne
ss.
Impact
Patching
process:
Analyzing data
Identifying Patching
and testin
vulnerabilities and the
understanding g
threats. vulnerabili
the nature of a
ty
threat
• If a port is not secured and has known vulnerabilities, attackers can exploit
those weaknesses to gain unauthorized access to the system.
• By keeping only essential ports open, you reduce the attack surface for
hackers.
• Sometimes, open ports can reveal information about the system they're on,
such as the operating system or software version. This information can be
valuable to hackers in crafting targeted attacks.
Pattern of malicious exploitation of
open ports
1. Vulnerable App:
•An Android app uses open ports for communication (intended
functionality).
•These ports lack proper security measures.
2. Attacker:
•Locates a vulnerable app (through scanning or targeting specific
apps).
•Crafts a malicious payload (data or code).
3. Attack Method:
•Remote
•LAN
•Phishing
4. Consequences:
• Steal data.
CMD:
• Install malware.
1. netstat –ano
• Execute malicious code (control device, disrupt functionality).
2. netsh advfirewall firewall add
5. Potential Impact:
rule name="Block Port"
• Numerous devices might be vulnerable due to widespread use of
protocol=TCP
unsecured open ports in apps.
localport=PORT_NUMBER
•Popular apps downloaded from official stores can be affected.
action=block
For app developers:
Measures
•Port binding (limit access points)
•Minimize open ports (open only what's needed)
•Regular security audits (check for weaknesses)
open ports
• Update device software & apps regularly.
• Review app permissions before installing.
• Consider antivirus/anti-malware software.
• Watch for unusual app behavior.
• Use strong passwords and multi-factor
authentication.
• Manage downloaded files carefully.
• Research apps before downloading.
Susceptibility of PV software might spell danger for the whole
country
https://infosec.exchange/@jarednaude/111660218766940579
Possible vulnerabilities related to cyber and
physical attacks in grid-connected PV plants
Consequences: Disrupted
communication, power fluctuations,
grid instability, equipment damage.