Topic 3
Topic 3
Fundamentals
1506140
Dr Suha Afaneh
[email protected]
Topic 3:
Threats, Vulnerabilities,
and Common Attacks
Introduction
• Understanding Threat Actors
• Blocking Malware
ATTRIBUTES OF THREAT ACTORS
Internal/External
• An external threat actor or agent is one that has no account or authorized
access to the target system.
• A malicious external threat must infiltrate ( )يتسللthe security system using
malware and/or social engineering.
• It is the threat actor that is defined as external, rather than the attack
method.
• Conversely, an internal (or insider) threat actor is one that has been granted
permissions on the system.
• This typically means an employee, but insider threat can also arise from
contractors and business partners.
Threat Actors
1. Hacker
2. Script kiddie
3. Hacktivist
4. Advanced persistent threat (APT)
Threat Actors
1. Hacker
• Malicious individuals who use their technical expertise to launch attacks.
✓Hacker describes an individual who has the skills to gain access to computer systems
through unauthorized or unapproved means.
✓Originally, hacker was a neutral term for a user who excelled at computer
programming and computer system administration.
✓Hacking into a system was a sign of technical skill and creativity.
✓The terms black hat (unauthorized) and white hat (authorized) are used to distinguish
these motivations.
✓A Gray hat hacker (semi-authorized) might try to find vulnerabilities in a product or
network without seeking the approval of the owner; but they might not try to exploit
any vulnerabilities they find.
✓A white hat hacker always seeks authorization to perform penetration testing of
private and proprietary systems.
Threat Actors
2. Script kiddie
• Teenagers or hobbyists mostly limited to pranks and vandalism, have little or
no skill or experience , often using existing tools or instructions found on the
Internet to launch attacks
• A script kiddie is someone who uses hacker tools without necessarily
understanding how they work or having the ability to craft new attacks.
• Script kiddie attacks might have no specific target or any reasonable goal
other than gaining attention or proving technical abilities.
Threat Actors
3. Hacktivist
• Hacktivist works as part of some sort of team or group.
A hacktivist group uses cyber weapons to promote a political agenda.
• Hacktivists might attempt to obtain and release confidential information to
the public domain, perform denial of service (DoS) attacks, or deface
websites.
Grey hat hackers who rally and protest against different political and social
ideas. Hacktivists publicly protest against organizations or governments by
posting articles, videos, leaking sensitive information, and performing
distributed denial of service (DDoS) attacks.
DoS and DDoS
• Denial of service or DoS is an Internet security-related event in which
the hackers attack a particular server running some Internet services
to prevent it from working normal or to stop the services. In this case,
the servers are overwhelmed with the flooding of superfluous
messages.
• The distributed denial of service or DDoS is a very common technique
to overwhelm any online or cloud-based service with the huge influx
of the traffic from multiple locations directed to the targeted sever.
Threat Actors
4. Nation state/advanced persistent threat (APT)
• First, they used a variety of tools and techniques, not simply tools
downloaded from the Internet.
• Second, the attacks are persistent, occurring over a significant period of time.
In some cases, the attacks continued for months and years as attackers
patiently stalked their targets, awaiting the right opportunity to strike.
• Criminals usually choose an APT for business or political motives.
• APT should have a target.
ATTACK VECTORS
• An Attack Vector is the path that a threat actor uses to gain access to a
secure system. In the majority of cases, gaining access means being able to
run malicious code on the target.
1. Viruses 2. Worms
3. Trojan 4. PUPs
5. Spyware 6. Keylogger
7. Adware 8. Backdoor
9. RAT 10. Rootkit
10. Ransomware
1. Viruses
• A computer virus is a type of malware designed to
replicate and spread from computer to computer,
usually by "infecting" executable applications or
program code
• A virus is executed only when the user performs
an action such as downloading and running an
infected executable process, attaching an infected
USB stick, or opening an infected Word document
with macros enabled.
1. Replication mechanism
2. Activation mechanism
3. Payload mechanism
2. Worms
• A computer worm is memory-resident malware that can run without user
intervention and replicate over network resources.
• a worm can execute by exploiting a vulnerability in a process when the
user browses a website, runs a vulnerable server application, or is
connected to an infected file share.
• The primary effect of the first types of computer worm is to rapidly
consume network bandwidth as the worm replicates.
• worms can carry a payload that may perform some other malicious action.
1. Replication mechanism
2. Payload mechanism
3. Trojan Horse
• Malware concealed within an installer package for software that
appears to be legitimate.
• This type of malware does not seek any type of consent for
installation and is actively designed to operate secretly.
• Appears to be useful but is malicious
4. Potentially unwanted programs (PUPs)
✓Software installed alongside a package selected by the
user or perhaps bundled with a new computer system.
✓Unlike a Trojan, the presence of a PUP is not automatically
regarded as malicious.
✓It may have been installed without active consent or
consent from a purposefully confusing license agreement.
✓This type of software is sometimes described as grayware
rather than malware.
5. Spyware
2. Shoulder Surfing
a threat actor can learn a password or PIN (or other secure information) by
watching the user type it.
– Can be in person looking at a computer or smartphone
– Can be with a remote camera
Social Engineering
3. Lunchtime attacks
• If a user leaves a workstation unattended while logged on, an attacker
can physically gain access to the system.
• Most operating systems are set to activate a password-protected
screen saver after a defined period of no keyboard or mouse activity,
Users should also be trained to lock or log off the workstation
whenever they leave it unattended.
Social Engineering
4. Tailgating
• Tailgating is a means of entering a secure area without authorization by
following close behind the person that has been allowed to open the door
or checkpoint.
– Closely following authorized personnel without providing credentials
– Mitigated with mantraps
5. Dumpster diving
• Dumpster diving refers to combing through an organization's (or
individual's) garbage to try to find useful documents (or even files stored
on discarded removable media)
– Searching through trash looking for information
– Mitigated by shredding or burning papers
Social Engineering
6. Piggy backing
• The attacker enters a secure area with an employee's permission(his friend).
• piggy backing may be a means of an insider threat actor to allow access to
someone without recording it in the building's entry log.
• Block at boundaries
• Firewalls
• Unified Threat Management (UTM) systems
• devices frequently include firewall, IDS/IPS, antimalware, URL and email filtering and
security, data loss prevention, VPN, and security monitoring and analytics capabilities.
Antivirus software
• Signature-based detection
• Detects known malware based on signature definitions
• Heuristic-based detection
• Detects unknown malware based on behavior
• Cuckoo sandbox
• is an open-source automated malware analysis system. It is designed to analyze suspicious
files in a safe and isolated environment. Cuckoo Sandbox does this by running the file in a
virtual machine and monitoring its behavior. It then generates a detailed report of the
file's activity, which can be used to identify whether the file is malicious or not.
Live Cyber Threat Map
• https://threatmap.checkpoint.com/
• https://livethreatmap.radware.com/
Topic 3 Summary
• Understanding Threat Actors
• Blocking Malware