Chapter 2 Type of Attack Indicators
Chapter 2 Type of Attack Indicators
Exam SY0-601
2
Types of Attack Indicators
• Attacks can be made against virtually any layer of software, from
network protocols to applications.
• Once it has been copied and is inside the system, the Trojan will
perform its hidden purpose with the user often still unaware of its true
nature.
6
Worms
• Worms are pieces of code that attempt to penetrate networks and
computer systems.
• Once a penetration occurs, the worm will create a new copy of itself on
the penetrated system.
• Reproduction of a worm thus does not rely on the attachment of the virus
to another piece of code or to a file, which is the definition of a virus.
7
Potentially Unwanted Programs
(PUP)
• Potentially unwanted program (PUP) is a designation used by security
companies and antivirus vendors to identify programs that may have adverse
effects on a computer’s security or privacy.
• These involve adware or spyware components and are used for revenue
generation purposes.
• Illegal botnets work in the same fashion, but controlled by a bot herder
11
Crypto-malware
• Malicious cryptomining
• Cybercriminals hack into personal and business
computer to install software to steal cryptocurrency
account credentials or to use the computer’s
resources to mine for cryptocurrencies without the
user knowledge.
13
Logic Bombs
• Logic bombs are a type of malicious software that is deliberately
installed, generally by an authorized user.
• A logic bomb is a piece of code that sits dormant for a period of time until
some event or date invokes its malicious payload.
• Logic bombs are difficult to detect because they are often installed by
authorized users and, in particular, have been installed by administrators
who are also often responsible for security.
14
Spyware
• Spyware is software that “spies” on users, recording and reporting on their
activities.
• Typically installed without the user’s knowledge, spyware can perform a wide
range of activities.
• It can record keystrokes (commonly called keylogging) when the user logs on to
specific websites.
• It can monitor how a user applies a specific piece of software, such as to monitor
attempts to cheat at games.
• What makes a keylogger a malicious piece of software is when its operation is (1)
unknown to the user, and (2) not under the user’s control.
• Malicious keyloggers have several specific characteristics: they are frequently hidden
from the user’s view, even when looking at Task Manager, and they are used against
the end user’s interests.
• Hackers use keyloggers to obtain passwords and other sensitive pieces of information,
enabling them to use these secrets to act as the user without the user’s consent.
• Keylogger functionality has even been found in legitimate programs, where keystrokes
are recorded for “legitimate” purposes and then are stored in a fashion that enables
unauthorized users to steal the data.
16
Remote-Access Trojans (RATs)
• This backdoor into the target machine can allow an attacker unfettered
access, including the ability to monitor user behavior, change computer
settings, browse and copy files, access connected systems, and more.
18
Rootkit
• Rootkits modify the operating system kernel and supporting functions, changing
the nature of the system’s operation.
• The use of rootkit functionality to hide other processes and files enables an
attacker to use a portion of a computer without the user or other applications
knowing what is happening.
• This hides exploit code from antivirus and anti-spyware programs, acting as a
cloak of invisibility.
20
Rootkit
• Rootkits can load before the operating system loads, acting as a virtualization
layer, as in SubVirt and Blue Pill.
• Rootkits can exist in firmware, and these have been demonstrated in both video
cards and expansion cards.
• Rootkits can exist as loadable library modules, effectively changing portions of the
operating system outside the kernel.
• Five types of rootkits exist: firmware, virtual, kernel, library, and application level.
21
Backdoors
• Backdoors were originally (and sometimes still are) nothing more than
methods used by software developers to ensure that they can gain
access to an application, even if something were to happen in the future
to prevent normal access methods.
– Aka “maintenance hooks”
22
PASSWORD ATTACKS
• Spraying
• Dictionary
• Brute Force
– Offline
– Online
• Rainbow Tables
• Plaintext/Unencrypted
23
Spraying
• These programs often permit the attacker to create various rules that tell
the program how to combine words to form new possible passwords.
• A dictionary attack involves the use of a lookup table to try and find an
answer.
25
Brute Force
• An attempt of all possible password combinations.
• The length of the password and the size of the set of possible
characters in the password will greatly affect the time a brute force
attack will take.
• A brute force attack on a password can take place at two levels: it can
attack a system, where the attacker is attempting to guess the
password at a login prompt, or it can attack the list of password hashes
contained in a password file.
• Offline
• Online
26
Brute Force
• Offline
– Offline, brute force attacks can be employed to perform hash
comparisons against a stolen password file. This has the challenge of
stealing the password file, but if accomplished, it is possible to use high-
performance GPU-based parallel machines to try passwords at very high
rates and against multiple accounts at the same time.
• Online
– When the brute force attack occurs in real time against a system, it is
frequently being done to attack a single account with multiple examples of
passwords. Success or failure is determined by the system under attack,
and the attacker either gets in or doesn’t. Online brute force attacks tend
to be very noisy and easy to see by network security monitoring, and they
are also limited by system response time and bandwidth.
27
Rainbow Tables
• Rainbow tables are precomputed tables or hash values associated with
passwords. Using rainbow tables can change the search for a password
from a computational problem to a lookup problem.
• This can tremendously reduce the level of work needed to crack a given
password.
• The best defense against rainbow tables is salted hashes, as the addition
of a salt value increases the complexity of the problem by making the
precomputing process not replicable between systems.
30
Malicious USB Cable
• Most users view a USB cable as just a wire, but in fact a USB cable
can have embedded electronics in it.
• “Poisoned” cables have been found with electronics that can deliver
malware to machines.
• This has been found in both normal USB cables and in lightning
cables for Apple devices.
• Demo cables have even been made with embedded Wi-Fi devices,
enabling attacks against a Wi-Fi network from the cable itself.
– Example: The OMG cable
31
Malicious Flash Drives
• They have been used to dupe users into picking them up, plugging them into their
machine, and accessing an attractive folder such as “HR data” or “Sensitive
pictures.”
• USB dropping is a well-known means of attack, where the attacker leaves tainted
USB devices for people to pick up and use.
– Aka; Baiting
• Once they plug them into the network, the attack is automated.
• For user convenience, operating systems adopted an Auto Run or Auto Play
feature on USB devices, enabling content to run when the device was plugged in.
32
Card Cloning
• AI-enabled systems are used in anti-malware products to find new threats based
on analytical analysis of programmatic behaviors.
• Can AI also be used to evade defenses? The answer is yes, and this is known
as adversarial AI. Just as defenders can write AI-enabled tools, attackers can
use AI to enable their attacks, such as phishing, to avoid machine detection.
35
Tainted Training Data for Machine
Learning (ML)
• Machine learning (ML) is one of the techniques used in AI.
• ML works by using a training data set to calibrate the detection model to enable
detection on sample data.
• One of the weaknesses of ML is this training set dependency. The ability of the model
to detect is a function of the efficacy of the training data set. A good training data set
can build a solid detection model.
• A deficient training set of data can build a model with holes in it—holes that allow
conditions to go undetected. Tainting the training data is one of the attack vectors that
attackers can use against ML systems.
• The parts that are used—be they physical like a hard drive or
logical like a library module—can be tainted, either by accident or
on purpose.
• Types of attacks:
– Birthday
– Collision
– Downgrade
40
Birthday
41
Collision
• This is done to enable the highest form of encryption that both server
and browser can support.
• POODLE attack: Forcing TLS 1.0 to “downgrade” to SSL 3.0 and then
using the SSL Strip tool to remove SSL from the connection; thereby
reverting to an unsecure state.
43