module 3
module 3
Module 3:
Tools and Methods used in Cybercrime
Phishing and Identity Theft
Gowtham R Naik
The National Institute of Engineering
Topics
• Introduction
• Proxy Servers and Anonymizers
• Phishing, Password Cracking
• Keyloggers and Spywares
• Virus and Worms
• Trojan Horses and Backdoors
• DoS and DDoS Attacks
• Attacks on Wireless Networks
• As the Internet and computer networks are
integral parts of information systems,
attackers have in-depth knowledge about
the technology and/or they gain thorough
Introduction knowledge about it.
• Various tools and techniques and complex
methodologies used to launch attacks.
• Network attack incidents reveal that
attackers are often very systematic in
launching their attacks.
• The basic stages of an attack are:
1. Initial uncovering
2. Network probe
Introduction 3. Crossing the line toward electronic
(Continued) crime (E-crime)
4. Capturing the network
5. Grab the data
6. Covering tracks
1. Initial uncovering
• In the first step called as reconnaissance, the
attacker gathers information, as much as
possible, about the target by legitimate means.
• Googling, public websites, news articles, press
Introduction releases are used.
(Continued) • In the second step, the attacker uncovers as
much information as possible on the company’s
internal network.
• Internet domain, machine names, IP ranges are
identified.
2. Network probe
• Invasive technique to find more information.
• A “ping sweep” of the network IP addresses
Introduction is performed to seek out potential targets,
and then a “port scanning” tool is used to
(Continued) discover exactly which services are running
on the target system.
• Attacker has done nothing that is considered
as abnormal activity/intrusion on network.
3. Crossing the line toward electronic crime
(E-crime)
• Now the attacker is toward committing what
is technically a “computer crime” by
exploiting possible holes on the target
Introduction system.
• Exploit possible holes in the system.
(Continued)
• Programming errors can be exploited. CGI
and Buffer overflow attacks.
• Default logins, and attempt for admin/root
access after gaining access.
4. Capturing the network:
• At this stage, the attacker attempts to “own”
the network. The attacker gains a foothold in
the internal network quickly and easily.
Introduction • Tools to replace system files with Trojan files
and services that have a backdoor password.
(Continued) • Hacking tools to remove log files and trace of
intrusion.
• Using backdoor, hackers can access the
system later and carry out attacks on the
entire network, next level attacks.
5. Grab the data
• Now that the attacker has “captured the
network,” he/she takes advantage of his/her
position to steal confidential data, customer
Introduction credit card information, deface webpages,
(Continued) alter processes and even launch attacks at
other sites from your network.
6. Covering tracks
• This is the last step in any cyberattack, which
refers to the activities undertaken by the
Introduction attacker to extend misuse of the system
(Continued) without being detected.
• Attacker can go undetected for long periods.
• Proxy server is a computer on a network which acts as
an intermediary for connections with other computers
on that network.
• Attacker first connects to a proxy server and
establishes a connection with target system. This helps
attacker to browse anonymously.
Proxy Servers • A proxy server has following purposes:
and 1. Keep the systems behind the curtain.
Strong password
• A strong password is long
enough, random or otherwise
difficult to guess – producible
only by the user who chooses it.
• Can each one of you give at least
one sample strong password?
Password Cracking
Strong, Weak and Random Passwords
• Random Password
• Password is stronger if it includes a mix of upper and
lower case letters, numbers and other symbols, when
allowed, for the same number of characters.
• The difficulty of the password will make the user to
write it down somewhere which the password
vulnerable.
• Pseudorandom passwords – It follows some pattern.
• System generated password and password aging.
Password Cracking
Strong, Weak and Random Passwords
• Random Password - The general guidelines applicable to the password policies are:
1. Passwords and user IDs must be unique to each user.
2. Minimum of 8 alphanumeric characters.
3. Password rules and periodic testing to identify password weakness.
4. Private and must not be shared with anyone, not to be coded or written
anywhere.
5. Must be changed in 30/45 days, automatic expiration, prevent reusing
password.
6. Freezing accounts after 5 failed logins, record in log, audit log and take action.
7. Session must be suspended after 15 minutes of inactivity.
8. Display date and time of last login.
9. Accounts must be suspended if not used for a long duration.
10. High risk systems, alarm for excessive violations, let the personal continue
with the session while personnel investigate alarm.
Password Cracking
Strong, Weak and Random Passwords
• Netizens should follow password guidelines:
1. Password for business, personal, banking account must be different.
2. Should be minimum 8 alphanumeric characters.
3. Should be changed every 30/45 days.
4. Should not be shared with anyone.
5. While renewing passwords, old passwords should not be used.
6. Passwords must be changed using secure systems if accessed using public
systems.
7. Should not be stored on mobile devices etc, which are vulnerable to cyber
attacks.
8. Check legitimacy of the email before clicking on the hyperlinks (Bank email)
9. Check legitimacy of the SMS before following the instructions.
10. If hacked, respective agencies must be informed immediately.
Keyloggers and Spywares
Software Keyloggers
• Software keyloggers are software programs installed on the computer
systems which usually are located between the OS and the keyboard
hardware, and every keystroke is recorded.
• They are installed by Trojans and viruses without the knowledge of the
user.
• Insecure computers systems in public places.
• A keylogger usually consists of two files in a directory: a dynamic link
library (DLL) file and an Executable (EXE) file that installs the DLL file and
triggers it to work.
Keyloggers and Spywares (Continued)
Hardware Keyloggers
• Hardware keyloggers are small hardware
devices connected to the PC and/or to
the keyboard and save every keystroke
into a file or in the memory of the
hardware device.
• These keyloggers look like an integrated
part of such systems; hence, bank
customers are unaware of their
presence.
• Keyloggers in ATM.
Keyloggers and Spywares (Continued)
• Anti-keylogger
• Anti-keylogger is a tool that can detect the keylogger installed on the computer
system and also can remove the tool.
• Advantages are:
1. Firewalls cannot detect the installations of keyloggers on the systems; hence,
anti-keyloggers can detect installations of keylogger.
2. This software does not require regular updates of signature bases to work
effectively such as other antivirus and anti-spy programs.
3. Prevents Internet banking frauds.
4. It prevents ID theft.
5. It secures E-Mail and instant messaging/chatting.
Keyloggers and Spywares
(Continued)
• Spywares
• Spyware is malicious software secretly
installed on the user’s personal computer.
• Spywares such as keyloggers are installed by
the owner of a shared, corporate or public
computer on purpose to secretly monitor
other users.
• Collect personal information, internet
browsing data and redirect browsing data.
• Change settings resulting in slow Internet
speed.
• Anti-spyware software are available in the
market.
Viruses and Worms
• Computer virus is a program that can “infect” legitimate
programs by modifying them to include a possibly “evolved”
copy of itself.
• Spreads like biological viruses spread from one person to
another.
• Viruses may contain malicious instructions (cause damage,
annoyance) and can spread without visible symptoms.
• It can start event-driven effects, time-driven effects, or
could be random.
Viruses and Worms (Continued)
• Viruses can take some typical actions:
1. Display a message to prompt an action which may set of the
virus;
2. delete files inside the system into which viruses enter;
3. scramble data on a hard disk;
4. cause erratic screen behaviour;
5. halt the system (PC);
6. just replicate themselves to propagate further harm.
Viruses and Worms (Continued)
• The term virus is erroneously used to refer to other types of
malware, adware, spyware that may not spread.
• A true virus can spread from one system to another.
• A worm spread itself automatically to other computers
through networks by exploiting security vulnerabilities.
• Trojan is a code/program that appears to be harmless but
hides malicious functions.
Thank you.
• Computer viruses can be categorized based on attacks
on various elements of the system and can put the
system and personal data on the system in danger.
Viruses and 1. Boot sector viruses
Reading https://www.bbc.com/news/world-
57394831
Thank you.
• Even when people travel, they still need to
work.
• The employee is no longer tied to an office
Attacks on location and is, in effect, “boundaryless.”
Wireless • The following are different types of “mobile
workers”:
Networks 1. Tethered/remote worker
2. Roaming user
3. Nomad
4. Road warrior
1. Tethered/remote worker
• Remains at a single point of work but is
remote to the central company systems.
Attacks on 2. Roaming user
Wireless • Who works in an environment or in
Networks multiple areas.
(Continued) 3. Nomad
• Employees in hotel rooms and other semi-
tethered environments.
4. Road warrior
• Ultimate mobile user, spends little time in
office. Needs regular access to data and
function on the move.
• Wireless networks extend the range
of traditional wired networks by
Attacks on using radio waves to transmit data to
wireless-enabled devices such as
Wireless laptops and PDAs.
Networks • Wireless networks are generally
(Continued) composed of two basic elements:
a) access points (APs)
b) other wireless-enabled devices,
such as laptops radio transmitters
and receivers to communicate or
“connect” with each other.
Attacks on Wireless Networks (Continued)
Thank you.
Attacks on Wireless Networks (Continued)
• Important Components of wireless network (other than routers, hubs and
firewalls)
1. 802.11 networking standard
• Family of WLANs.
• 802.11a – 54 Mbps in 5 GHz band uses orthogonal frequency division
multiplexing (OFDM).
• 802.11b - 11 Mbps in 2.4 GHz band – “Wi-Fi Standard”.
• 802.11g – 54 Mbps in 2.4 GHz band using OFDM.
• 802.11n – Multiple-input multiple-output (MIMO), 140 Mbps.
• 802.15 – Bluetooth technology.
• 802.16 – WiMax, Wireless Metropolitan Area Networks.
Attacks on Wireless Networks (Continued)
2. Access points
• Hardware/Software that acts as transmitter and receiver of WLAN radio
signals.
• Connects to wired LAN.
3. Wi-Fi hotspots
• Free Wi-Fi hotspots – Public places, free of cost, click and connect, no
authentication, Vulnerable to cyber attacks.
• Commercial hotspots – Authentication, payment to avail services, Airports,
Business hotels, VPNs for secure access.
4. Service set identifier (SSID)
• Name of the 802.11i WLAN and all wireless devices must use same name
to communicate.
• Administrator/User sets a SSID (can be 32 characters long).
• Turn off SSID broadcast, force manual entering of SSID.
Attacks on Wireless Networks (Continued)
(Spam E- [email protected]
4. Use alternate email ids for personal work, don’t use
Mails) business email addresses everywhere.
5. Do not forward any emails from unknown recipients.
6. Preview an email before opening it.
7. Never use email addresses as screen names in chat
groups or rooms.
8. Never respond to a spam email asking to remove
your email address from the mailing list.
• Deliberate attempt to deceive or trick user
into believing or accepting that something is
real, when it is actually false.
Phishing • It may or may not be spam.
(Hoax E- • Difficult to recognize whether an email is a
spam or hoax.
Mails)
• Websites to check if it is hoax.
• Breakthechain.org
• Hoaxbusters.org
1. Dragnet
Methods of 2. Rod-and-reel
Phishing 3. Lobsterpot
4. Gillnet
1. Dragnet
• Use of spammed emails, bearing falsified corporate
identification, addressed to a large group of people
to websites or pop-up windows.
• Phishers do not identify victims in advance and rely
on the false information included in the email.
• Requested to enter bank or credit card account data
Methods of or other personal data.
Scams 8.
9.
System reconfiguration attacks
Data theft
10. Content-injection Phishing
11. Man-in-the-middle Phishing
12. Search engine Phishing
13. SSL certificate Phishing
1. Deceptive Phishing
• Broadcast deceptive emails with the objective to
steal identity.
• Verify bank account / system failure / account
changes / new free services / quick action.
Types of • Netizens enter information and fall prey.
Phishing 2. Malware-based Phishing
• Malicious code is used, email-attachment /
Scams downloadable file / exploiting security feature.
• OS and anti-virus update.
3. Keyloggers
• Malware embed keyloggers to track user input.
• It can be a small browser entity like a plugin.
4. Session hijacking
• After connection is established using credential,
malicious code takes control of the connection
and perform transactions.
Types of 5. In-session Phishing
Phishing • One-browsing session opening interfering and
misusing another session say banking session.
Scams • Users feel that it is a Pop-up from bank session.
6. Web Trojans
• Invisible pop-ups which gather information
when user tries to login using browser.
• Gather information and transmit to phisher.
7. Pharming
• Attacker exploits vulnerability in ISP DNS server
and hijacks domain name.
• Host file poisoning – Windows host file, poison
and redirect the traffic to fake website
Types of (developed by phisher) which looks like real
website.
Phishing • DNS –based poisoning – Tampers with DNS so
that he responds with fake address when a DNS
Scams request is sent to it. DNS hijacking.
8. System reconfiguration attacks
• Modify setting in user’s computer for malicious
purposes.
• URL saved in bookmarks can be changed.
• xyzbank.com to xyzbanc.com
9. Data theft
• Critical and confidential data is stolen.
• Corporate servers and web are easy targets.
• Unsecured systems are most vulnerable.
• Widely used business espionage approach.
• Sell the data and cause economic damage.
Types of 10. Content-injection Phishing
Phishing • Replace part of content in a legitimate website with false
content to mislead users into revealing personal
Scams information.
• Malicious code to collect information from a legitimate
website and send it to phisher.
11. Man-in-the-middle Phishing
• Phishers positions himself between user and legitimate
website/system.
• Collect information transmitted between the systems and
sell /misuse the data.
12. Search engine Phishing
• Create websites with attractive offers and have
them indexed legitimately with search engine.
• Mobile phones for less price, low interest
credits, etc.
Types of • Search engine optimization – Maximizing traffic
to a website so that the search engine places
Phishing this website on the top.
13. SSL certificate Phishing
Scams • Targets web servers with SSL certificates to
create a duplicitous website displaying similar
lock icon.
• SSL certificates are valid and belong to
legitimate website and these are misused by
phishers.
Thank you.
Distributed Phishing Attack (DPA)
• An advanced form of phishing attack that
works as per victim’s personalization of the
location of sites collecting credentials and a
Types of covert transmission of credentials to a
Phishing hidden coordination center run by the
phisher.
Scams • A large number of fraudulent web hosts are
used for each set of lured E-Mails.
• Each server collects only a tiny percentage of
the victim’s personal information.
• Toolkit is a set of scripts/programs that allows a
phisher to automatically set up phishing websites
that looks like legitimate site.
• Sold in the dark web.
Phishing • Free phishing tools are do it yourself tools. These
Toolkits and may contain backdoor to send phished information
to someone other than the tool user.
Spy Phishing • Rock Phish – Allows a single website with multiple DNS
names to host variety of phished pages.
• Xrenoder Trojan Spyware – Resets homepage/search
settings to other sites.
• Cpanel Google – Modifies DNS entry in host’s file to point
to its own website.
• The countermeasures prevent malicious attacks that phisher
may target to gain the unauthorized access to the system to
steal the relevant personal information about the victim, from
the system.
• It is always challenging to recognize/judge the legitimacy of a
website while Googling.
1. Keep antivirus up to date
2. Do not click on hyperlinks in E-Mails
3. Take advantage of anti-Spam software
Phishing 4. Verify https (SSL)
Countermeasures 5. Use anti-spyware software
6. Get educated
7. Use Microsoft Baseline Security Analyzer
8. Firewall
9. Use backup system images
10. Do not enter sensitive or financial information into
pop-up windows
11. Secure the hosts file
12. Protect against DNS Pharming attacks
• With Sanitizing Proxy System (SPS), web Phishing attack
can be immunized by removing part of the content that
entices the netizens into entering their personal
information.
• SPS sanitizes all HTTP responses from suspicious URLs
with warning messages.
• Phishing attack comprises two phases:
Phishing • Attraction
Countermeasures • Acquisition
(SPS Algorithm) • Characteristics of SPS
1. Two-level filtering
2. Flexibility of the rule set
3. Simplicity of the filtering algorithm
4. Accountability of HTTP response sanitizing
5. Robustness against both misbehavior of novice
users and evasion techniques
• Characteristics of SPS
1. Two-level filtering
• Strict URL filtering and HTTP response sanitizing.
2. Flexibility of the rule set
• Rule set as defined by the operator of SPS.
3. Simplicity of the filtering algorithm
Phishing • 20 steps for implementation in existing browsers,
plugins or firewalls.
Countermeasures 4. Accountability of HTTP response sanitizing
(SPS Algorithm) • Removes malicious HTTP headers/tags from HTTP
responses.
• Alert users.
5. Robustness against both misbehavior of novice users
and evasion techniques
• Built-in proxy can protect from all deceit cases of web
spoofing.
• Fraud that involves someone pretending to
be someone else to steal money or get other
benefits.
• The person whose identity is used can suffer
various consequences when he/she is held
Identity responsible for the perpetrator’s actions.
• Statistics as per Federal Trade Commission
Theft (FTC)
1. Credit card fraud (26%)
2. Bank fraud (17%)
3. Employment fraud (12%)
4. Government fraud (9%)
5. Loan fraud (5%)
• 4 variants: Personal, Personally, Identifiable,
Identifying
• Fraudsters attempts to steal the elements
mentioned below:
Personally 1. Full name
2. National identification number (e.g., SSN)
Identifiable 3. Telephone and mobile phone numbers
Information 4. Driver’s license number
5. Credit card numbers
(PII) 6. Digital identity (e.g., E-Mail address, online
account ID and password)
7. Birth date and Place name
8. birthplace
9. Face and fingerprints
• A fraudster generally searches the
following about an individual:
1. First or last name
Personally 2. age
Identifiable 3. country, state or city of residence
Information 4. gender
(PII) 5. name of the
school/college/workplace
6. job position, grades and/or salary
7. criminal record
• Types of Identity Theft
1. Financial identity theft
Personally 2. Criminal identity theft
Identifiable 3. Identity cloning
Information 4. Business identity theft
(PII) 5. Medical identity theft
6. Synthetic identity theft
7. Child identity theft
• Types of Identity Theft
1. Financial identity theft
• 25 types - Bank, credit card, tax
refund, mail fraud.
Personally • Name, SSN, bank account.
• Recovery is expensive, time-
Identifiable consuming, psychologically painful.
Information 2. Criminal identity theft
• Taking over someone’s identity and
(PII) committing crime.
• Computer & cybercrimes, organized
crimes, trafficking, money laundering.
• Employer conducts a criminal
background verification.
• Types of Identity Theft
3. Identity cloning
• Clones compromise victim’s life by actually
living and working as the victim at a different
location.
Personally • May pay bills, get engaged, married and start
a family.
Identifiable 4. Business identity theft
• Fraudster rents a space in the same building
Information as victim’s office.
• Applies for corporate credit cards using
(PII) victim firm’s name.
• Business sensitive information (BSI) is info
about the business, privileged in nature or
proprietary information, if compromised,
could cause serious damage. (Sensitive
asset)
• Masquerading business goods, IP theft.
• Types of Identity Theft
5. Medical identity theft
Personally • Medical records of patients get created who
avail medical facility.
Identifiable • Protected health information (PHI) changing
Information hands when multiple agencies are involved.
(Medical representatives, health officers,
(PII) doctors, medical insurance organizations,
hospitals)
• A man received medical services bill who
had no health issues.
• Types of Identity Theft
6. Synthetic identity theft
• Fraudster will take parts of personal
Personally information from many victims and
combine them.
Identifiable • Not specific to any particular victim
but can affect all victims.
Information 7. Child identity theft
(PII) • Parents using children’s identity to
open credit card accounts, utility
accounts, bank accounts, take loans
because their credit history is
insufficient.
1. Human-based methods – Techniques used by
attacker without or minimum use of technology
• Direct access to information (who have gained trust
and have access to buildings– House cleaners,
babysitters, nurses, friends)
• Dumpster diving (retrieving documents from trash
bins)
Techniques • Theft of a purse or wallet (credit cards, debit cards,
DL, Insurance ID card)
of ID Theft • Mail theft and rerouting (Steal postal mails from
mailboxes)
• Shoulder surfing (People in public loitering around
near ATM, cybercafes)
• False or disguised ATMs (Miniaturized equipment on
a valid ATM)
• Dishonest or mistreated employee (Access to
personal files, salary info, confidential info)
• Telemarketing and fake telephone calls (Vishing)
2. Computer-based technique
• Backup theft (Steal equipment from private
buildings, public facilities)
• Hacking, unauthorized access to systems and
database theft (compromise information
systems)
Techniques • Phishing
of ID Theft • Pharming (websites looking similar to legit
site and domain is altered slightly,
www.xyzbank.com to www.xyzbanc.com )
• Redirectors (Redirect users traffic to
locations they did not intend to visit,
infecting DNS server)
• Hardware (Keystroke recording device)
1. Monitor your credit closely.
2. Keep records of your financial data and
transactions.
3. Install security software.
4. Use an updated web browser.
Identity Theft:
5. Be wary of e-mail attachments and links in
Countermeasures both email and instant messages.
6. Store sensitive data securely.
7. Shred documents.
8. Protect your PII.
9. Stay alert to the latest scams.
Tools that users can use to remove their usage
footprints.
How to 1. Anti tracks
efface your 2. Privacy eraser pro.
online 3. MyPrivacy
identity 4. Web 2.0 suicide machine
5. Seppukoo
Thank you.