17. Malware and Cyber Attacks

Methods

Many different methods to gain access to a target computer:

Social Engineering

Persuading an authorized user to disclose sensitive information:

Spear phishing:

Hacking/Cracking

Password discovery: default passwords.

Password cracking tools also readily available for many systems (e.g. zip files, Windows password files).

Password attacks:

Denial of Service Attacks

Makes network services unavailable to users by overloading servers.

Financial incentive (DOS for hire services) and/or for extortion (stop attack when ransom paid).

No magic solution: use a properly-configured firewall to filter out illegitimate requests, and add more servers.

e.g. TCP SYN-ACK flood:

Rootkits

Collection of programs used to mask intrusion and obtain admin access.

After gaining user-level access to a target system, attacker can install rootkits through known vulnerabilities, password cracking etc.

They may collect user IDs and passwords from other machines on the network. e.g.

Once installed they may:

Blended Threats

Combination of attacks using different vulnerabilities:

Zero Day Attacks

Taking advantages of software vulnerabilities before the manufacturer can release a patch/fix.

Blaster worm (Windows 2000):

Nachi worm:

Time available to install updates shrinks over time and may be negative in some cases.

Attack Methods

Buffer Overflow

Exploits inadequate buffer boundary checking.

It often involves overwriting return addresses on the stack, making the machine run attacker-controlled code. However, it could also leak memory contents to the attacker.

Heartbleed was an example of the latter: