Security+ Guide to Network Security Fundamentals, Fifth Edition

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Thank you to IT Training at Indiana University Computer Malware.
What is Bad ? Spam, Phishing, Scam, Hoax and Malware distributed via
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Dr. John P. Abraham Professor UTPA 2 – Systems Threats and Risks.
Unit 18 Data Security 1.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Computer Viruses.
Chapter 4 Personal Security
Content  Overview of Computer Networks (Wireless and Wired)  IP Address, MAC Address and Workgroups  LAN Setup and Creating Workgroup  Concept on.
Threats To A Computer Network
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Quiz Review.
Internet Safety Basics Being responsible -- and safer -- online Visit age-appropriate sites Minimize chatting with strangers. Think critically about.
Security+ Guide to Network Security Fundamentals, Fourth Edition
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Hacker Zombie Computer Reflectors Target.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
Introduction to ITE Chapter 9 Computer Security. Why Study Security?  This is a huge area for computer technicians.  Security isn’t just anti-virus.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Attacks On systems And Networks To understand how we can protect our system and network we need to know about what kind of attacks a hacker/cracker would.
IT internet security. The Internet The Internet - a physical collection of many networks worldwide which is referred to in two ways: The internet (lowercase.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Topic 5: Basic Security.
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 2 Malware and Social Engineering Attacks.
Malicious Software.
Understand Malware LESSON Security Fundamentals.
W elcome to our Presentation. Presentation Topic Virus.
Cybersecurity Test Review Introduction to Digital Technology.
Any criminal action perpetrated primarily through the use of a computer.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Remember effective ways to search +walk (includes words) Intitle:iPad Intext:ipad site:pbs.org Site:gov filetype:jpg.
Computer Security Keeping you and your computer safe in the digital world.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
Cyber security. Malicious Code Social Engineering Detect and prevent.
Escalation Of Ad Wars Boosts Malware Delivery
Botnets A collection of compromised machines
What they are and how to protect against them
Malware and Computer Maintenance
Network Security Fundamentals
3.6 Fundamentals of cyber security
Malware and Social Engineering
IT Security  .
Unit 4 IT Security.
Social Engineering Charniece Craven COSC 316.
Instructor Materials Chapter 7 Network Security
Lesson 3 Safe Computing.
Phishing is a form of social engineering that attempts to steal sensitive information.
Protect Your Computer Against Harmful Attacks!
Botnets A collection of compromised machines
Security+ Guide to Network Security Fundamentals, Fourth Edition
Cybersecurity Awareness
Chap 10 Malicious Software.
UNIT 18 Data Security 1.
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
Faculty of Science IT Department By Raz Dara MA.
Chap 10 Malicious Software.
How to keep the bad guys out and your data safe
Securing your system, protecting your digital data and devices.
Test 3 review FTP & Cybersecurity
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 2 Malware and Social Engineering Attacks Chapter 2 Malware and Social Engineering Attacks

Objectives Define malware List the types of malware Identify payloads of malware Describe the types of social engineering psychological attacks Explain physical social engineering attacks Objectives Define malware List the types of malware Identify payloads of malware Describe the types of social engineering psychological attacks Explain physical social engineering attacks Security+ Guide to Network Security Fundamentals, Fifth Edition

Attacks Using Malware Malware (malicious software) - Software that enters a computer system without the owner’s knowledge or consent Refers to a wide variety of damaging or annoying software Attacks Using Malware Malware (malicious software) - Software that enters a computer system without the owner’s knowledge or consent Refers to a wide variety of damaging or annoying software Security+ Guide to Network Security Fundamentals, Fifth Edition

Mutating Malware Attackers can mask the presence of their malware by having it “mutate” or change Three types of mutating malware are: Oligomorphic malware - Changes its internal code to one of a set number of predefined mutations whenever executed Polymorphic malware - Completely changes from its original form whenever it is executed Metamorphic malware - Can actually rewrite its own code and thus appears different each time it is executed Mutating Malware Attackers can mask the presence of their malware by having it “mutate” or change Three types of mutating malware are: Oligomorphic malware - Changes its internal code to one of a set number of predefined mutations whenever executed Polymorphic malware - Completely changes from its original form whenever it is executed Metamorphic malware - Can actually rewrite its own code and thus appears different each time it is executed Security+ Guide to Network Security Fundamentals, Fifth Edition

Malware Traits: 1 & 2 Definitions of the different types of malware are often confusing and may overlap One method of classifying various types of malware is using four primary traits that malware possesses: Circulation - Some malware has primary trait of spreading rapidly to other systems to impact large number users Infection – Some malware has primary trait of “infect” or embed itself into that system Malware Traits: 1 & 2 Definitions of the different types of malware are often confusing and may overlap One method of classifying various types of malware is using four primary traits that malware possesses: Circulation - Some malware has primary trait of spreading rapidly to other systems to impact large number users Infection – Some malware has primary trait of “infect” or embed itself into that system Security+ Guide to Network Security Fundamentals, Fifth Edition

Malware Traits: 3 & 4 Concealment - Some malware has as its primary trait avoiding detection by concealing its presence from scanners Payload capabilities - When payload capabilities are the primary focus of malware, the focus is on what nefarious action(s) the malware performs Malware Traits: 3 & 4 Concealment - Some malware has as its primary trait avoiding detection by concealing its presence from scanners Payload capabilities - When payload capabilities are the primary focus of malware, the focus is on what nefarious action(s) the malware performs Security+ Guide to Network Security Fundamentals, Fifth Edition

Virus Types Computer virus - Malicious computer code that reproduces itself on the same computer Program virus - Virus that infects an executable program file Macro virus - One of most common data file viruses written in a script known as a macro (macro is series of instructions that can be grouped together as single command) Virus Types Computer virus - Malicious computer code that reproduces itself on the same computer Program virus - Virus that infects an executable program file Macro virus - One of most common data file viruses written in a script known as a macro (macro is series of instructions that can be grouped together as single command) Security+ Guide to Network Security Fundamentals, Fifth Edition

Armored Virus Different virus infection methods One common type is appender infection: Virus appends itself to end of a file Replaces beginning of file with jump instruction pointing to the virus code Armored virus - Viruses that go to great lengths to avoid detection Swiss cheese infection – Encrypts virus code and then divide decryption engine into different pieces and inject these pieces throughout the infected program code Armored Virus Different virus infection methods One common type is appender infection: Virus appends itself to end of a file Replaces beginning of file with jump instruction pointing to the virus code Armored virus - Viruses that go to great lengths to avoid detection Swiss cheese infection – Encrypts virus code and then divide decryption engine into different pieces and inject these pieces throughout the infected program code Security+ Guide to Network Security Fundamentals, Fifth Edition

Appender Infection (Figure 2-1) A figure of an appender infection virus. The upper box contains the program code and instruction jump, code line one, code line two, code lines three, code line four, etc.. The lower box contains the virus code. A line goes from the jump to the start of the virus code. Security+ Guide to Network Security Fundamentals, Fifth Edition

Swiss Cheese Infection (Figure 2-2) A figure of a Swiss cheese infection. The upper box contains the program code and the lower box contains the virus code that is encrypted. The jump instruction points to decrypt part one. This in turn points to decrypt part two, which points to decrypt part three, which points to decrypt part four, which points to decrypt part five and then points to the virus code. Security+ Guide to Network Security Fundamentals, Fifth Edition

Split Infection Split infection - Viruses split the malicious code itself into several parts: Also has one main body of code All parts are placed at random positions throughout the program code To make detection even more difficult these parts may contain unnecessary “garbage” code to mask their true purpose Split Infection Split infection - Viruses split the malicious code itself into several parts: Also has one main body of code All parts are placed at random positions throughout the program code To make detection even more difficult these parts may contain unnecessary “garbage” code to mask their true purpose Security+ Guide to Network Security Fundamentals, Fifth Edition

Split Infection (Figure 2-3) A figure of a split infection. The first box contains the program code. The next box contained fires code part C. The next box contains virus code part B. The next box contains virus code main body. The next box contains virus code parts D. The next box contains virus code part A. A jump instruction at the beginning of the program code points to virus code part A, which then points to virus code part B, which then points to virus code part C, which then points to buyers code part D, which then finally points to virus code main body. Security+ Guide to Network Security Fundamentals, Fifth Edition

Virus Actions When infected program is launched it activates its malicious payload Viruses may display an annoying message but usually much more harmful Examples of virus actions: Cause a computer to repeatedly crash Erase files from or reformat hard drive Turn off computer’s security settings Virus also replicates itself by spreading to another file on same computer Virus Actions When infected program is launched it activates its malicious payload Viruses may display an annoying message but usually much more harmful Examples of virus actions: Cause a computer to repeatedly crash Erase files from or reformat hard drive Turn off computer’s security settings Virus also replicates itself by spreading to another file on same computer Security+ Guide to Network Security Fundamentals, Fifth Edition

Virus Carriers Virus cannot automatically spread to another computer Relies on user action to spread Viruses are attached to files Viruses are spread by transferring infected files Virus must have two “carriers”: File to which it attaches Human to transport it to other computers Virus Carriers Virus cannot automatically spread to another computer Relies on user action to spread Viruses are attached to files Viruses are spread by transferring infected files Virus must have two “carriers”: File to which it attaches Human to transport it to other computers Security+ Guide to Network Security Fundamentals, Fifth Edition

Worm Worm - Malicious program that uses a computer network to replicate Sometimes called network viruses Worm designed to enter computer through network and then take advantage of vulnerability in application or operating system on host computer Once worm exploits vulnerability on one system it immediately searches for another computer on the network that has same vulnerability Worm Worm - Malicious program that uses a computer network to replicate Sometimes called network viruses Worm designed to enter computer through network and then take advantage of vulnerability in application or operating system on host computer Once worm exploits vulnerability on one system it immediately searches for another computer on the network that has same vulnerability Security+ Guide to Network Security Fundamentals, Fifth Edition

Trojan Trojan - Program that does something other than advertised Example: User downloads “free calendar program” Program scans system for credit card numbers and passwords Transmits information to attacker through network Trojan Trojan - Program that does something other than advertised Example: User downloads “free calendar program” Program scans system for credit card numbers and passwords Transmits information to attacker through network Security+ Guide to Network Security Fundamentals, Fifth Edition

Difference Between Viruses, Worms, and Trojans (Table 2-2) A table with four columns and five rows. The first row is composed of column headers: Action, Virus, Worm, and Trojan. Row 2. Action: What does it do? Virus: Inserts malicious code into a program or data file Worm: Exploits a vulnerability in an application or operating system Trojan: Masquerades as performing a benign action but also does something malicious Row 3. Action: How does it spread to other computers? Virus: User transfers infected files to other devices Worm: Uses a network to travel from one computer to another Trojan: User transfers Trojan file to other computers Row 4. Action: Does it infect a file? Virus: Yes Worm: No Trojan: It can Row 5. Action: Does there need to be user action for it to spread? Virus: Yes Worm: No Trojan: Yes Security+ Guide to Network Security Fundamentals, Fifth Edition

Rootkit Rootkit - Software tools used by an attacker to hide actions or presence of other types of malicious software Will hide or remove traces of log-in records, log entries May alter or replace operating system files with modified versions specifically designed to ignore malicious activity Can be difficult to detect a rootkit or clean it from an infected system Rootkit Rootkit - Software tools used by an attacker to hide actions or presence of other types of malicious software Will hide or remove traces of log-in records, log entries May alter or replace operating system files with modified versions specifically designed to ignore malicious activity Can be difficult to detect a rootkit or clean it from an infected system Security+ Guide to Network Security Fundamentals, Fifth Edition

Computer Infected with Rootkit (Figure 2-4) A figure of a computer infected with rootkit. At the left is a computer monitor with a list of actual files: archives, figures, research, and rootkit files. At the right is a computer monitor with a list of files displayed to user: archive, figures, and research. Security+ Guide to Network Security Fundamentals, Fifth Edition

Spyware Spyware - Software that gathers information without user consent Spyware is tracking software that is deployed without: Adequate notice Consent Control by the user Spyware Spyware - Software that gathers information without user consent Spyware is tracking software that is deployed without: Adequate notice Consent Control by the user Security+ Guide to Network Security Fundamentals, Fifth Edition

Technologies Used By Spyware (Table 2-3) A table with three columns and five rows. The first row is composed of column headers: Technology, Description, and Impact. Row 2. Technology: Automatic download software Description: Used to download and install software without the user’s interaction Impact: May be used to install unauthorized applications Row 3. Technology: Passive tracking technologies Description: Used to gather information about user activities without installing any software Impact: May collect private information such as websites a user has visited Row 4. Technology: System modifying software Description: Modifies or changes user configurations, such as the web browser home page or search page, default media player, or lower-level system functions Impact: Changes configurations to settings that the user did not approve Row 5. Technology: Tracking software Description: Used to monitor user behavior or gather information about the user, sometimes including personally identifiable or other sensitive information Impact: May collect personal information that can be shared widely or stolen, resulting in fraud or identity theft Security+ Guide to Network Security Fundamentals, Fifth Edition

Keylogger Keylogger - Program that captures user’s keystrokes Information later retrieved by attacker Attacker searches for useful information Can be either small hardware device or software program Keyloggers can go beyond capture keystrokes; can also make screen captures and turn on computer’s web camera to record images of user Keylogger Keylogger - Program that captures user’s keystrokes Information later retrieved by attacker Attacker searches for useful information Can be either small hardware device or software program Keyloggers can go beyond capture keystrokes; can also make screen captures and turn on computer’s web camera to record images of user Security+ Guide to Network Security Fundamentals, Fifth Edition

Hardware Keylogger (Figure 2-5) A figure of a hardware keylogger. A keyboard cable connects to a small hardware keylogger that connects to the USB Port on the back of the computer. Security+ Guide to Network Security Fundamentals, Fifth Edition

Adware Adware - Program that delivers advertising content in manner unexpected and unwanted by the user Downsides of adware for users: May display objectionable content Frequent pop-up ads cause lost productivity Pop-up ads slow computer or cause crashes Unwanted ads can be a nuisance Typically displays advertising banners and pop-up ads Can also perform tracking of online activities Adware Adware - Program that delivers advertising content in manner unexpected and unwanted by the user Downsides of adware for users: May display objectionable content Frequent pop-up ads cause lost productivity Pop-up ads slow computer or cause crashes Unwanted ads can be a nuisance Typically displays advertising banners and pop-up ads Can also perform tracking of online activities Security+ Guide to Network Security Fundamentals, Fifth Edition

Ransomware Ransomware – Program that prevents a user’s device from properly operating until a fee is paid Ransomware malware is highly profitable Variation of ransomware displays a fictitious warning that there is a problem with the computer No matter what the condition of the computer, the ransomware always reports that there is a problem Ransomware Ransomware – Program that prevents a user’s device from properly operating until a fee is paid Ransomware malware is highly profitable Variation of ransomware displays a fictitious warning that there is a problem with the computer No matter what the condition of the computer, the ransomware always reports that there is a problem Security+ Guide to Network Security Fundamentals, Fifth Edition

Ransomware Message (Figure 2-6) A figure of a ransomware message. The message said your computer has been locked and has the seal of the department of justice Federal Bureau of Investigation. Security+ Guide to Network Security Fundamentals, Fifth Edition

Ransomware Message (Figure 2-7) A figure of a ransomware message. The left pane contains main, perform scan, Internet Security, personal security, proactive defense, firewall, and configuration. It also contains the message, Activate your copy of right now and get full real time protection with Win 7 Internet Security. The right pane contains the message current PC State: infected! Security+ Guide to Network Security Fundamentals, Fifth Edition

Logic Bomb Logic bomb - Computer code that lies dormant until triggered by a specific logical event and then performs malicious activities Difficult to detect before it is triggered Logic bombs are often embedded in very large computer programs Trusted employee can easily insert a few lines of computer code into a long program without anyone detecting it Logic Bomb Logic bomb - Computer code that lies dormant until triggered by a specific logical event and then performs malicious activities Difficult to detect before it is triggered Logic bombs are often embedded in very large computer programs Trusted employee can easily insert a few lines of computer code into a long program without anyone detecting it Security+ Guide to Network Security Fundamentals, Fifth Edition

Famous Logic Bombs (Table 2-4) A table with three columns and four rows. The first row is composed of column headers: Description, Reason for attack, and Results. Row 2. Description: A logic bomb was planted in a financial services computer network that caused 1000 computers to delete critical data. Reason for attack: A disgruntled employee had counted on this to cause the company's stock price to drop; he planned to use that event to earn money. Results: The logic bomb detonated but the employee was caught and sentenced to 8 years in prison and ordered to pay $3.1 million in restitution. Row 3. Description: A logic bomb at a defense contractor was designed to delete important rocket project data. Reason for attack: The employee’s plan was to be hired as a highly paid consultant to fix the problem. Results: The logic bomb was discovered and disabled before it triggered. The employee was charged with computer tampering and attempted fraud and was fined $5000. Row 4. Description: A logic bomb at a health services firm was set to go off on the employee’s birthday. Reason for attack: The employee was angered that he might be laid off (although he was not). Results: The employee was sentenced to 30 months in a federal prison and paid $81,200 in restitution to the company. Security+ Guide to Network Security Fundamentals, Fifth Edition

Backdoor Backdoor - Software code that circumvents normal security to give program access Common practice by developers Intent is to remove backdoors in final application but often overlooked Backdoor Backdoor - Software code that circumvents normal security to give program access Common practice by developers Intent is to remove backdoors in final application but often overlooked Security+ Guide to Network Security Fundamentals, Fifth Edition

Zombies and Botnets Zombie - Infected robot (bot) computer Botnet – Multiple zombie computers gathered into a logical computer network Bot herder – Attacker who controls bonet Command and control (C&C or C2) – Instructions from the bot herders regarding which computers to attack and how Common C&C mechanism used today is Hypertext Transport Protocol (HTTP) Zombies and Botnets Zombie - Infected robot (bot) computer Botnet – Multiple zombie computers gathered into a logical computer network Bot herder – Attacker who controls bonet Command and control (C&C or C2) - Structure from the bot herders regarding which computers to attack and how Common C&C mechanism used today is Hypertext Transport Protocol (HTTP) Security+ Guide to Network Security Fundamentals, Fifth Edition

Uses of Botnets (Table 2-5) A table with two columns and five rows. The first row is composed of column headers: Type of attack and Description. Row 2. Type of attack: Spamming Description: Botnets are widely recognized as the primary source of spam email. A botnet consisting of thousands of zombies enables an attacker to send massive amounts of spam. Row 3. Type of attack: Spreading malware Description: Botnets can be used to spread malware and create new zombies and botnets. Zombies have the ability to download and execute a file sent by the attacker. Row 4. Type of attack: Manipulating online polls Description: Because each zombie has a unique Internet Protocol (IP) address, each “vote” by a zombie will have the same credibility as a vote cast by a real person. Online games can be manipulated in a similar way. Row 5. Type of attack: Denying services Description: Botnets can flood a web server with thousands of requests and overwhelm it to the point that it cannot respond to legitimate requests. Security+ Guide to Network Security Fundamentals, Fifth Edition

Social Engineering Attacks Social engineering – Means of gathering information from individuals by relying on their weaknesses Social engineering attacks can involve: Psychological approaches Physical procedures Social Engineering Attacks Social engineering – Means of gathering information from individuals by relying on their weaknesses Social engineering attacks can involve: Psychological approaches Physical procedures Security+ Guide to Network Security Fundamentals, Fifth Edition

Social Engineering Psychology Psychology - The mental and emotional approach in social engineering attack Social engineering psychological attacks relies on attacker’s clever manipulation of human nature to persuade victim to: Provide information Take actions Several basic “principles” or reasons make psychological social engineering effective Social Engineering Psychology Psychology - The mental and emotional approach in social engineering attack Social engineering psychological attacks relies on attacker’s clever manipulation of human nature to persuade victim to: Provide information Take actions Several basic “principles” or reasons make psychological social engineering effective Security+ Guide to Network Security Fundamentals, Fifth Edition

Social Engineering Effectiveness (Table 2-6) A table with three columns and eight rows. The first row is composed of column headers: Principle, Description, and Example. Row 2. Principle: Authority Description: Directed by someone impersonating authority figure or falsely citing their authority Example: “I’m the CEO calling.” Row 3. Principle: Intimidation Description: To frighten and coerce by threat Example: “If you don’t reset my password, I will call your supervisor.” Row 4. Principle: Consensus/social proof Description: Influenced by what others do Example: “I called last week and your colleague reset my password.” Row 5. Principle: Scarcity Description: Something is in short supply Example: “I can’t waste time here.” Row 6. Principle: Urgency Description: Immediate action is needed Example: “My meeting with the board starts in 5 minutes.” Row 7. Principle: Familiarity/liking Description: Victim is well-known and well-received Example: “I remember reading a good evaluation on you.” Row 8. Principle: Trust Description: Confidence Example: “You know who I am.” Security+ Guide to Network Security Fundamentals, Fifth Edition

Social Engineering Psychological Approaches Attacker will ask for only small amounts of information, often from several different victims Request needs to be believable Attacker “pushes the envelope” to get information before victim suspects anything Flattery and flirtation often used Attacker may smile and ask for help Social Engineering Psychological Approaches Attacker will ask for only small amounts of information, often from several different victims Request needs to be believable Attacker “pushes the envelope” to get information before victim suspects anything Flattery and flirtation often used Attacker may smile and ask for help Security+ Guide to Network Security Fundamentals, Fifth Edition

Impersonation Impersonation - Masquerade as a real or fictitious character and then play out the role of that person on a victim Common roles impersonated: Repairperson IT support Manager Trusted third party Fellow employee Impersonation Impersonation - Masquerade as a real or fictitious character and then play out the role of that person on a victim Common roles impersonated: Repairperson IT support Manager Trusted third party Fellow employee Security+ Guide to Network Security Fundamentals, Fifth Edition

Phishing Phishing - Sending email or display web announcement claiming to be from legitimate source May contain legitimate logos and wording Tries to trick user into giving private information Passwords Credit card numbers Social Security numbers Bank account numbers Phishing Phishing - Sending email or display web announcement claiming to be from legitimate source May contain legitimate logos and wording Tries to trick user into giving private information Passwords Credit card numbers Social Security numbers Bank account numbers Security+ Guide to Network Security Fundamentals, Fifth Edition

Phishing Email Message (Figure 2-8) A figure of a fishing e-mail message. The message says you sent a payment. Dear paypal user, you sent a payment for $1297.20 to Morris Cope. Please note that it may take a little while for this payment to appear in the race in activity list on your account overview. View the details of this transaction online. Security+ Guide to Network Security Fundamentals, Fifth Edition

Common Phishing Features Deceptive web links - Use variations of a legitimate address (www.ebay_secure.com, www.e—bay.com, www.e-baynet.com) Logos - Include logo of vendor to make request look genuine Urgent request - Include instructions requiring immediate action or else something serious will occur (user’s account will be unavailable or a large amount of money will be deducted from their account) Common Phishing Features Common phishing features Deceptive web links - Use variations of a legitimate address (www.ebay_secure.com, www.e—bay.com, www.e-baynet.com) Logos - Include logo of vendor to make request look genuine Urgent request - Include instructions requiring immediate action or else something serious will occur (user’s account will be unavailable or a large amount of money will be deducted from their account) Security+ Guide to Network Security Fundamentals, Fifth Edition

Phishing Variations Variations of phishing: Pharming - Automatically redirects user to fraudulent web site Spear phishing - Email messages target specific users Whaling - Going after the “big fish” by targeting wealthy individuals Vishing (voice phishing) - Attacker calls victim with recorded message with callback number, but number is actually to attacker Phishing Variations Variations of phishing: Pharming - Automatically redirects user to fraudulent web site Spear phishing - Email messages target specific users Whaling - Going after the “big fish” by targeting wealthy individuals Vishing (voice phishing) - Attacker calls victim with recorded message with callback number, but number is actually to attacker Security+ Guide to Network Security Fundamentals, Fifth Edition

Spam Spam - Unsolicited email One of primary vehicles for distribution of malware Sending spam is lucrative business Spim - Targets instant messaging users Image spam: Uses graphical images of text Circumvents text-based filters Often contains nonsense text Spam Spam - Unsolicited email One of primary vehicles for distribution of malware Sending spam is lucrative business Spim - Targets instant messaging users Image spam: Uses graphical images of text Circumvents text-based filters Often contains nonsense text Security+ Guide to Network Security Fundamentals, Fifth Edition

Image Spam (Figure 2-9) Image Spam (Figure 2-9) An image of image spam. The top box is the unsuspicious subject line. The middle box is the image. The bottom box is the nonsense text. The unsuspicious subject line says subject: check this out!!. The middle image box shows discount pharmacy online. Security+ Guide to Network Security Fundamentals, Fifth Edition

Hoaxes Hoaxes - False warning or claim May be first step in an attack Hoax purports that “deadly virus” circulating through the Internet and that the recipient should: Erase specific files Change security configurations Forward message to other users However, changing configurations allow an attacker to compromise the system Hoaxes Hoaxes - False warning or claim May be first step in an attack Hoax purports that “deadly virus” circulating through the Internet and that the recipient should: Erase specific files Change security configurations Forward message to other users However, changing configurations allow an attacker to compromise the system Security+ Guide to Network Security Fundamentals, Fifth Edition

Typo Squatting Typo squatting (URL hijacking) – Attacker registers fake look-alike site to which user is automatically directed when makes a typing error when entering URL address in a web browser (goggle.com or google.net instead of google.com) Site may contain: Visitor survey that promises a chance to win prizes (but the attacker actually captures the entered email addresses to sell to spammers) Ads (for which the attacker receives money for traffic generated to the site) Typo Squatting Typo squatting (URL hijacking) – Attacker registers fake look-alike site to which user is automatically directed when makes a typing error when entering URL address in a web browser (goggle.com or google.net instead of google.com) Site may contain: Visitor survey that promises a chance to win prizes (but the attacker actually captures the entered email addresses to sell to spammers) Ads (for which the attacker receives money for traffic generated to the site) Security+ Guide to Network Security Fundamentals, Fifth Edition

Watering Hole Attack Similar types of animals congregate around a pool of water for refreshment Watering hole attack - Directed toward smaller group of specific individuals, such as the major executives working for a manufacturing company These executives all tend to visit a common website, so attacker focuses on compromising that site Watering Hole Attack Similar types of animals congregate around a pool of water for refreshment Watering hole attack - Directed toward smaller group of specific individuals, such as the major executives working for a manufacturing company These executives all tend to visit a common website, so attacker focuses on compromising that site Security+ Guide to Network Security Fundamentals, Fifth Edition

Social Engineering Physical Procedures Just as some social engineering attacks rely on psychological manipulation, other attacks rely on physical acts These attacks take advantage of user actions that can result in compromised security Social Engineering Physical Procedures Just as some social engineering attacks rely on psychological manipulation, other attacks rely on physical acts These attacks take advantage of user actions that can result in compromised security Security+ Guide to Network Security Fundamentals, Fifth Edition

Dumpster Diving Dumpster diving - Digging through trash to find useful information Dumpster Diving Dumpster diving - Digging through trash to find useful information A table with two columns and eight rows. The first row is composed of column headers: Item retrieved and Why useful. Row 2. Item retrieved: Calendars Why useful: A calendar can reveal which employees are out of town at a particular time. Row 3. Item retrieved: Inexpensive computer hardware, such as USB flash drives or portal hard drives Why useful: These devices are often improperly disposed of and may contain valuable information. Row 4. Item retrieved: Memos Why useful: Seemingly unimportant memos can often provide small bits of useful information for an attacker who is building an impersonation. Row 5. Item retrieved: Organizational charts Why useful: These identify individuals within the organization who are in positions of authority. Row 6. Item retrieved: Phone directories Why useful: A phone directory can provide the names and telephone numbers of individuals in the organization to target or impersonate. Row 7. Item retrieved: Policy manuals Why useful: These may reveal the true level of security within the organization. Row 8. Item retrieved: System manuals Why useful: A system manual can tell an attacker the type of computer system that is being used so that other research can be conducted to pinpoint vulnerabilities. Security+ Guide to Network Security Fundamentals, Fifth Edition

Tailgating and Shoulder Surfing Tailgating – Following an authorized person entering through a door Methods of tailgating: Tailgater calls “please hold the door” Waits outside door and enters when authorized employee leaves Employee conspires with unauthorized person to walk together through open door Shoulder surfing - Casually observing user entering keypad code Social Engineering Attacks (cont’d.) Tailgating – Following an authorized person entering through a door Methods of tailgating: Tailgater calls “please hold the door” Waits outside door and enters when authorized employee leaves Employee conspires with unauthorized person to walk together through open door Shoulder surfing - Casually observing user entering keypad code Security+ Guide to Network Security Fundamentals, Fifth Edition

Security+ Guide to Network Security Fundamentals, Fifth Edition Chapter 2 Malware and Social Engineering Attacks Chapter 2 Malware and Social Engineering Attacks