Cyber Attacks-2
Cyber Attacks-2
Unit -1
Over view of cyber security
Cyber security focuses on protecting computer systems from unauthorised access or being
otherwise damaged or made inaccessible. According to the Cyber Security & Infrastructure
Security Agency (CISA), "Cyber security is the art of protecting networks, devices and data
from unauthorized access or criminal use and the practice of ensuring confidentiality,
integrity and availability of information."
The Different Types of Cybersecurity : Cyber security is a wide field covering several
disciplines. It can be divided into seven main pillars:
4. Cloud Security:As organizations increasingly adopt cloud computing, securing the cloud
becomes a major priority. A cloud security strategy includes cyber security solutions,
controls, policies, and services that help to protect an organization’s entire cloud deployment
(applications, data, infrastructure, etc.) against attack.
5. IOT Security: While using Internet of Things (IoT) devices certainly delivers productivity
benefits, it also exposes organizations to new cyber threats. Threat actors seek out
vulnerable devices inadvertently connected to the Internet for nefarious uses such as a
pathway into a corporate network or for another bot in a global bot network.
Cyber space
Cyberspace allows users to share information, interact, swap ideas, play games,
engage in discussions or social forums, conduct business and create intuitive
media, among many other activities.
The term cyberspace was initially introduced by William Gibson in his 1984
book, Neuromancer. Gibson criticized the term in later years, calling it “evocative
and essentially meaningless.” Nevertheless, the term is still widely used to
describe any facility or feature that is linked to the Internet. People use the term
to describe all sorts of virtual interfaces that create digital realities.
More on Cyberspace
In many key ways, cyberspace is what human societies make of it.
One way to talk about cyberspace is related to the use of the global Internet for
diverse purposes, from commerce to entertainment. . Wherever the Internet is
used, you could say, that creates a cyberspace. The prolific use of both desktop
computers and smart phones to access the Internet means that, in a practical
(yet somewhat theoretical) sense, the cyberspace is growing.
To really consider what cyberspace means and what it is, consider what happens
when thousands of people, who may have gathered together in physical rooms in
the past to play a game, do it instead by each looking into a device from remote
locations.
Theoretically, the same human societies could create other kinds of cyberspace
—technical realms in which digital objects are created, dimensioned and
evaluated in technical ways.
In the end, it seems that the cyberspaces that we have created are pretty
conformist and one-dimensional, relative to what could exist. In that sense,
cyberspace is always evolving, and promises to be more diverse in the years to
come.
Threat landscape
The cyber security threat landscape is vast, and we are often faced with the
challenge of keeping in touch with novel attack techniques and new attack surfaces.
As enterprises continue to transition to storing data and offering services through the
cloud, we will continue to see an increase in threat activity relevant to all forms of
cloud technology.
There are so many dangerous cloud attack methods observed in the wild today,
The examples included in this post are based on both active opportunistic and
targeted attackers we observe.
4. Cloud Management Platform Access :Examples like those above can teach us
an important lesson: So much of the cloud threat landscape centers around the desire to
access the cloud management platform, especially privileged cloud accounts. It’s so critical
to defend against cloud threats because they offer the attacker an opportunity to break the
barrier of accessing information or control over a powerful, normally-trusted service.
An attacker with privileged access to the management platform of a cloud service, be it AWS
GCP or Azure, can weave their way into many difficult-to-identify places. Thanks to the use
of open source tools like Purple Panda, an attacker with their hands on stolen
credentials can automate cloud privilege escalation and identify opportunities for lateral
movement.
The ways that attackers seek such access are, again, quite vast. For example, we know
opportunistic attackers scan online code and image repositories (Github, Docker Hub) for
mistakenly leaked keys. This has allowed them to kick off supply chain attacks and general
bulk data theft. Additionally, highly capable and well resourced targeted attackers like APT29
also place a deliberate effort into seeking such access for state-sponsored missions. Overall,
this is a highly desirable level of access any attacker would enjoy, so it should be of the
utmost importance for defenders to track.
Hackers trick you into installing malware on your devices. Once installed, a
malicious script runs in the background and bypasses your security — giving
hackers access to your sensitive data.
Malware is one of the most commonly used cyber attacks. And there are
multiple variations that you should be aware of:
2. phishing attack: Tis attack occurs when a cybercriminal sends you a fraudulent
email, text (called “smishing”), or phone call (called “vishing”). These messages look
like they’re from someone official or a person or business who you trust – such as
your bank, the FBI, or a company like Microsoft, Apple, or Netflix.
In actuality, these messages are sent from imposters. If you reply with sensitive
information such as your password, they can use it to take over your accounts.
Phishing and smishing messages may also instruct you to click on a link or open an
email attachment that will either download malware to your device or send you to a
phishing site designed to steal your information.
In many cases, phishing attacks cast a wide net and don’t target specific individuals
(this makes them easier to identify). However, there are a few new phishing cyber
attacks that are more targeted and harder to spot. These include:
Spear phishing attacks: These attacks are usually sent via email and target
a specific individual. The hacker will use your personal information that
they have bought on the Dark Web (or found in your online footprint and on
social media) to make it sound more believable and get you to click on the
link.
Whaling: A whale phishing attack occurs when a hacker targets high-
profile individuals, like CEOs and executives. The goal is to steal their
credentials and get backdoor access to their company’s network. CEO
fraud is now a $26-billion-a-year scam
Angler phishing attacks: An Angler attack is a new type of phishing scam in
which a hacker “baits” users on social media by pretending to be a well-
known company’s customer service account. Scammers create accounts
like “@AmazonHelp$” and then auto-respond to relevant messages by
providing a link for you to talk to a “rep.” But really, it’s a scam designed to
steal your information.
3. Man-in-the-middle attacks
A man-in-the-middle attack (MitM) occurs when attackers intercept data or
compromise your network to “eavesdrop” on you. These attacks are especially
common when using public Wi-Fi networks, which can easily be hacked.
For example, let’s say you’re using the Wi-Fi at Starbucks and need to check your
bank account balance. When you log in, a hacker can intercept your data and
capture your username and password (and drain your account later).
A denial of service (DOS) attack occurs when hackers use false requests and traffic
to overwhelm a system and shut it down.
A distributed denial of service (DDoS) attack is the same type of attack, except the
hacker uses multiple breached devices at the same time.
The goal of these cyber attacks isn’t usually to steal data, but to halt or even shut
down business operations.
DDoS attacks have shut down sites like Twitter, Sound Cloud, and Spotify, and
even severely damaged Amazon’s AWS .
4. SQL injection attacks
Most websites use SQL databases to store sensitive information like logins,
passwords, and account information. Hackers use an SQL injection attack to “trick”
the database into giving up this information.
These attacks are a bit technical, but they come down to a hacker entering
predefined SQL commands into a data-entry box (like a login or password field).
Those commands can read sensitive data, modify database data, or even trigger
executive functions (such as shutting down the system).
Just last year, 70 gigabytes of data was stolen from Gab — a far-right website —
through an SQL injection attack
6. DNS tunneling
DNS tunneling is a type of cyber attack that hackers use to bypass traditional
security systems like firewalls to gain access to systems and networks. Hackers
encode malicious programs within DNS queries and responses (that most security
programs ignore).
Once the program is inside, it latches onto the target server, giving the hackers
remote access.
DNS tunneling attacks are especially dangerous as they often go unnoticed for days,
weeks, or months. During that time, cybercriminals can steal sensitive data, change
code, install new access points, and even install malware.
In one example, cybercriminals used DNS tunneling to attack Air India and other
airlines and steal passport details and credit card numbers.
Zero-day exploits are cyber security vulnerabilities that exist in a software or network
without the manufacturer’s knowledge.
For example, Apple might release a new version of iOS that accidentally contains a
way for hackers to steal your iCloud information. Once they discover the flaw, the
attacked company has “zero days” to fix it, as they’re already vulnerable.
A zero-day attack occurs when hackers use those vulnerabilities to get into a system
to steal data or cause damage. In the first few months of 2022, Microsoft, Google,
and Apple all had to patch zero-day bugs
8. Password attack
Password attacks comprise any cyber attacks in which hackers try to guess, brute
force, or trick you into giving up your passwords.
There are a few different password-based cyber attacks you need to be aware of:
Password spraying: This is when hackers attempt to use the same
password across many accounts. For example, over 3.5 million Americans
use the password “123456”.[ easy to remember ]
Brute force: A brute force attack occurs when hackers create software that
tries different combinations of usernames and passwords until finding one
that works. They’ll often use logins leaked to the Dark Web because many
people reuse passwords across accounts (this is also called the
“Dictionary” method).
Social engineering: Social engineering attacks occur when hackers use
psychology to trick you into giving up your password. For example, they
might use a phishing email pretending to be from your bank and fool you
into “confirming” your account details.
Most cyber attacks require some action from you — like clicking on a link or
downloading an attachment. But a drive-by attack (or drive-by download) occurs
when you just browse an infected website.
Back in 2016, a drive-by download attack used vulnerabilities in Adobe Flash Player
to install crypto-ransomware .. Once installed, victims were redirected to a site
demanding 0.05 bitcoin to return access to their device.
When the code executes in your browser, the hacker is able to masquerade as your
account and do anything you can do.
Sites vulnerable to XSS include message boards, forums, and web pages. These
pages depend on user input that is not screened for malicious codes. But even larger
sites are at risk.
For example, in 2014, a site vulnerability on eBay led to customers being redirected
to malicious sites upon clicking on product links . The sites displayed fake eBay login
pages, prompting users to enter their details which were then stolen.
Root kits hide deep inside your device’s operating system, making them hard to
detect but also incredibly dangerous.
A root kit could allow hackers to steal sensitive information, install key loggers, or
even remove antivirus software. For example, in July 2022, Kasper sky uncovered a
rootkit that can persist on a victim's machine even after a reboot or reinstallation
Domain Name System (DNS) spoofing allows hackers to send online traffic to a
“spoofed” website.
These sites look nearly identical to your destination (for example, the login page for
your bank or a social media account). But any information you submit goes straight
to the hackers, giving them access to your accounts.
Hackers can also use DNS spoofing to sabotage companies by redirecting their site
visitors to a poor-quality site with obscene content.
In one famous example, Google’s homepage was spoofed in Romania and Pakistan
sending users to an unfamiliar site. Thankfully, in this case, the hacker did not seem
to have malicious intent other than redirecting visitors.
Internet of Things (IoT) devices, such as your smart speakers, TVs, and toys can
also be the targets of cyber attacks.
An IoT attack occurs when hackers steal data from a device — or string together
multiple IoT devices into a botnet — that can be used for DDoS attacks.
IoT devices usually don’t have antivirus software installed, making them easy targets
for hackers. Many of the world’s largest DDoS attacks used “bot armies” composed
of IoT devices. It may seem unlikely, but even your “smart fridge” could be an
unwitting soldier in a cyber attack.
The attacker’s computer swaps its IP address for the client’s address and continues
to access the server, without needing any sort of authentication.
Once they’ve hijacked a session, hackers can do anything the client’s account could
do. For example, let’s say you’re accessing your company’s internal database while
on a work trip. If a hacker hijacks your session, they’ll gain access to all of your
company files.
URL manipulation occurs when hackers alter the parameters in a URL address to
redirect you to a phishing site or download malware.
For example, many people use URL shorteners to help remember long web
addresses or specific pages. If hackers “poison” that shortened URL, they can send
you to a phishing site designed to steal your personal information.
In other situations, hackers manipulate the URL to get the server to show pages they
shouldn’t have access to. For example, they might enter
While not necessarily an “attack,” Norton is facing harsh criticism after revelations
that their latest update quietly installed a crypto miner inside its antivirus software.
Inside threats occur when someone who works for a company purposefully steals
data, gives someone unauthorized access, or leaks passwords.
For example, at the start of the COVID-19 pandemic, a disgruntled former staff
member of a medical device packaging company used his administrator access to
wipe over 100,000 company records .
ATTACK VECTOR
With the average cost of a data breach at $4.35 million, it's important to plan
ahead to minimize potential attack vectors and prevent data breaches. Digital
forensics and IP attribution are helpful for cleaning up data breaches, but it's
much more important to know how you can prevent them.
The most common attack vectors include malware, viruses, email attachments,
web pages, pop-ups, instant messages, text messages, and social engineering.
An attack surface is the total number of attack vectors an attacker can use to
manipulate a network or computer system or extract data.
Threat vector can be used interchangeably with attack vector and generally
describes the potential ways a hacker can gain access to data or other
confidential information.
1. Compromised Credentials
sernames and passwords are still the most common type of access credential
U
and continue to be exposed in data leaks, phishing scams, and malware. When
lost, stolen, or exposed, credentials give attackers unfettered access. This is why
organizations are now investing in tools to continuously monitor for data
exposures and leaked credentials. Password managers, two-factor
authentication (2FA), multi-factor authentication (MFA), and biometrics can
reduce the risk of leak credentials resulting in a security incident too.
2. Weak Credentials
eak passwords and reused passwords mean one data breach can result in
W
many more. Teach your organization how to create a secure password, invest in
a password manager or a single sign-on tool, and educate staff on their benefits.
3. Insider Threats
ommon data encryption methods like SSL certificates and DNSSEC can
C
prevent man-in-the-middle attacks and protect the confidentiality of data being
transmitted. Missing or poor encryption for data at rest can mean that sensitive
data or credentials are exposed in the event of a data breach or data leak.
5. Mis configuration
7. Phishing
hishing attacks are social engineering attacks where the target is contacted by
P
email, telephone, or text message by someone who is posing to be a legitimate
colleague or institution to trick them into providing sensitive data, credentials,
or personally identifiable information (PII). Fake messages can send users to
malicious websites with viruses or malware payloads.
8. Vulnerabilities
ew security vulnerabilities are added to the CVE every day and zero-day
N
vulnerabilities are found just as often. If a developer has not released a patch for
a zero-day vulnerability before an attack can exploit it, it can be hard to prevent
zero-day attacks.
9. Brute Force
rute force attacks are based on trial and error. Attackers may continuously try to
B
gain access to your organization until one attack works. This could be by
attacking weak passwords or encryption, phishing emails, or sending infected
email attachments containing a type of malware. Read our full post on brute force
attacks.
DDoS attacks are cyber attacks against networked resources like data centers,
servers, websites, or web applications and can limit the availability of a computer
system. The attacker floods the network resource with messages which cause it
to slow down or even crash, making it inaccessible to users. Potential mitigations
include proxies.
12. Trojans
XSS attacks involve injecting malicious code into a website but the website itself
is not being attacked, rather it aims to impact the website's visitors. A common
way attackers can deploy cross-site scripting attacks is by injecting malicious
code into a comment e.g. embedding a link to malicious JavaScript in a blog
post's comment section.
hen you log into a service, it generally provides your computer with a session
W
key or cookie so you don't need to log in again. This cookie can be hijacked by an
attacker who uses it to gain access to sensitive information.
ATTACK SURFACE
An organization’s attack surface is the sum of vulnerabilities, pathways or methods—
sometimes called attack vectors—that hackers can use to gain unauthorized access to the
network or sensitive data, or to carry out a cyber attack.
The digital attack surface potentially exposes the organization’s cloud and
on-premises infrastructure to any hacker with an internet connection.
Common attack vectors in an organization’s digital attack surface include:
THREAT
The threat is nothing but an expression of intention to inflict evil, injury, or damage
A cyber security threat refers to any possible malicious attack that seeks to unlawfully
access data, disrupt digital operations or damage information.
1.computer virus :
Computer viruses are pieces of software that are designed to be spread from one computer
to another. They’re often sent as email attachments or downloaded from specific websites
with the intent to infect your computer
Rogue security software is malicious software that mislead users to believe that they have
network security issues, most commonly a computer virus installed on their computer or that
their security measures are not up to date.
By "adware" we consider any software that is designed to track data of your browsing habits
and, based on that, show you advertisements and pop-ups. Adware collects data with your
consent and is even a legitimate source of income for companies that allow users to try their
software for free, but with advertisements showing while using the software. The adware
clause is often hidden in related User Agreement docs .When adware is downloaded without
consent, it is considered malicious.
Spyware works similarly to adware, but is installed on your computer without your
knowledge. It can contain keyloggers that record personal information including email
addresses, passwords, even credit card numbers, making it dangerous because of the high
risk of identity theft.
4 . computer worm
Computer worms are pieces of malware programs that replicate quickly and spread from one
computer to another. A worm spreads from an infected computer by sending itself to all of
the computer’s contacts
A website during a DoS attack, or denial-of-service, a malicious traffic overload that occurs
when attackers over flood a website with traffic. When a website has too much traffic, it’s
unable to serve its content to visitors.
A DoS attack is performed by one machine and its internet connection, by flooding a website
with packets and making it impossible for legitimate users to access the content of flooded
website.
A DDoS attack, or distributed denial-of-service attack, is similar to DoS, but is more forceful.
It’s harder to overcome a DDoS attack. It’s launched from several computers, and the
number of computers involved can range from just a couple of them to thousands or even
more.
¶ 7. Phishing
Phishing is a method of a social engineering with the goal of obtaining sensitive data such as
passwords, usernames, credit card numbers.
The attacks often come in the form of instant messages or phishing emails designed to
appear legitimate. The recipient of the email is then tricked into opening a malicious link,
which leads to the installation of malware on the recipient's computer
8. Rootkit
¶
Rootkit is a collection of software tools that enables remote control and administration-level
access over a computer or computer networks. Once remote access is obtained, the rootkit
can perform a number of malicious actions; they come equipped with keyloggers, password
stealers and antivirus disablers.
We know today that many servers storing data for websites use SQL. As technology has
progressed, network security threats have advanced, leading us to the threat of SQL
injection attacks.SQL injection attacks are designed to target data-driven applications by
exploiting security vulnerabilities in the application’s software.
Man-in-the-middle attacks are cyber security attacks that allow the attacker to eavesdrop on
communication between two targets. It can listen to a communication which should, in
normal settings, be private.
RISK
Cyber security risks relate to the loss of confidentiality, integrity, or availability
of information, data, or information (or control) systems and reflect the potential
adverse impacts to organizational operations (i.e., mission, functions, image, or
reputation) and assets, individuals, other organizations.
Cyber security risk is the probability of exposure or loss resulting from a cyber
attack or data breach on your organization. A better, more encompassing definition
is the potential loss or harm related to technical infrastructure, use of technology or
reputation of an organization.
Organizations are becoming more vulnerable to cyber threats due to the increasing
reliance on computers, networks, programs, social media and data globally. Data
breaches, a common cyber attack, have massive negative business impact and
often arise from insufficiently protected data.
Global connectivity and increasing use of cloud services with poor default security
parameters means the risk of cyber attacks from outside your organization is
increasing. What could historically be addressed by IT risk management and access
control now needs to be complemented by sophisticated cyber security
professionals, software and cybersecurity risk management.
Valnarability
A vulnerability is a weakness in an IT system that can be exploited by an attacker to deliver
a successful attack. They can occur through flaws, features or user error, and attackers will
look to exploit any of them, often combining one or more, to achieve their end goal.
Many vulnerabilities impact popular software, placing the many customers using the
software at a heightened risk of a data breach, or supply chain attack. Such zero-day
exploits are registered by MITRE as a Common Vulnerability Exposure (CVE).
Vulnerability Examples
There are several different types of vulnerabilities, determined by which infrastructure they’re
found on. Vulnerabilities can be classified into six broad categories:
1. Hardware
Any susceptibility to humidity, dust, soiling, natural disaster, poor encryption, or firmware
vulnerability.
2. Software
Insufficient testing, lack of audit trail, design flaws, memory safety violations (buffer
overflows, over-reads, dangling pointers), input validation errors (code injection, cross-site
scripting (XSS), directory traversal, email injection, format string attacks, HTTP header
injection, HTTP response splitting, SQL injection), privilege-confusion bugs (clickjacking,
cross-site request forgery, FTP bounce attack), race conditions (symlink races, time-of-
check-to-time-of-use bugs), side channel attacks, timing attacks and user interface failures
(blaming the victim, race conditions, warning fatigue).
3. Network
4. Personnel
Poor recruiting policy, lack of security awareness and training, poor adherence to security
training, poor password management, or downloading malware via email attachments.
5. Physical site
6. Organizational
Improper internal controls, lack of audit, continuity plan, security, or incident response plan.
Network Vulnerabilities. These are issues with a network's hardware or software that
expose it to possible intrusion by an outside party. ...
Operating System Vulnerabilities. ...
Human Vulnerabilities. ...
Process Vulnerabilities.
Complexity :
ommon code, software, operating systems, and hardware increase the probability
C
that an attacker can find or has information about known vulnerabilities.
Connectivity
The more connected a device is, the higher the chance of a vulnerability.
eak passwords can be broken with brute force, and reusing passwords can result
W
in one data breach becoming many.
ike any software, operating systems can have flaws. Operating systems that are
L
insecure by default allow any user to gain access and potentially inject viruses and
malware.
Internet Usage
Software Bugs
If your website or software assumes all input is safe, it may execute unintended SQL
commands.
People
EXPLOIT
An exploit is a code that takes advantage of a software vulnerability or security flaw. It
is written either by security researchers as a proof-of-concept threat or by malicious actors
for use in their operations.
In the hacking Information can be sold ,Information can be used to steal ,Protest –
Eg. Hactivism: a hacktivist is someone whom utilizes technology to announce a
social, ideological, religious, or political message • Challenge – Fun, problem-
solving skill, the thrill of power
Hackers want to use the victim’s computer to store illicit materials i.e pirated
software, pornography, etc. .hackers can steal the victim’s personal information in
order to access accounts or the accounts of the website visitors. The data can be
used to gain access to important databases; billing, merchant accounts, etc.
Hackers want to set-up fake ecommerce sites to access credit card details; gain
entry to servers that contain credit card details and other forms of credit card fraud
spy on friends, family, co-workers for personal reasons revenge
Cyber Terrorism
Cyber terrorism means the Cyber terrorist acts are carried out using computer servers, other
devices and networks visible on the public internet. Secured government networks and other
restricted networks are often targets.
Disruption of major websites. The intent here is to create public inconvenience or stop
traffic to websites containing content the hackers disagree with.
Unauthorized access. Attackers often aim to disable or modify communications that
control military or other critical technology.
Disruption of critical infrastructure systems. Threat actors try to disable or disrupt
cities, cause a public health crisis, endanger public safety or cause massive panic and
fatalities. For example, cyberterrorists might target a water treatment plant, cause a
regional power outage or disrupt a pipeline, oil refinery or fracking operation.
Cyberespionage. Governments often carry out or sponsor cyberespionage attacks.
They aim to spy on rival nations and gather intelligence, such as troop locations or
military strategies.
In one word it is a real threat because The threat of cyber terrorism is greater than ever.
In 2021, the Center for Strategic and International Studies (CSIS), a bipartisan,
nonprofit policy research group, identified 118 significant cyber attacks that either
occurred during that time or were acknowledged to have occurred earlier. Significant
attacks, as the CSIS defines them, include those that target government agencies,
defense and high-tech companies, as well as economic crimes with losses over $1
million.
January. Hackers with ties to the Chinese government deployed ransomware attacks
against five major gaming companies. They demanded over $100 million in ransom.
February. Hackers tried to contaminate the water supply of Oldsmar, Fla., by exploiting
a remote access system to increase the amount of sodium hydroxide present.
March. The Polish government said it suspected Russian hackers had taken control of
Poland's National Atomic Energy Agency and Health Ministry websites for a short time.
They tried to spread alarms about a radioactive threat that didn't exist.
May. North Korea carried out a cyber attack against South Korea's state-run Korea
Atomic Energy Research Institute by taking advantage of a virtual private network
vulnerability.
July. Iran used Facebook to target U.S. military personnel, posing as recruiters,
journalists and nongovernmental organization personnel. The hackers sent files with
malware and used phishing sites to trick victims into providing sensitive credentials.
September. Hackers stole 15 terabytes of data from 8,000 organizations working with
Voicenter, an Israeli company. The hackers offered the data online for $1.5 million.
October. Brazilian hackers attacked a website belonging to Indonesia's State Cyber and
Password Agency.
December. A Russian group claimed responsibility for a ransomware attack on CS
Energy, an Australian utility company.
security risks are secured by endpoint security services on a network or the internet.
There are three ways an end-user can protect themselves. They are
No pirated and cracked software: Avoid usage of pirated and cracked software. ...
Always keep your devices protected with antivirus: An antivirus gives you optimum
protection against potential malware and bugs. ...
Always keep your software bundle updated: Updating antivirus database is not just the key
to a healthy system.
The Information Technology Act, 2000 defines Critical Information Infrastructure (CII) as
“those computer resource, the destruction of which, shall have debilitating impact on national
security, economy, public health or safety”.
The three interwoven elements of critical infrastructure (physical, cyber and human) are
explicitly identified and should be integrated throughout the steps of the framework, as
appropriate.
Cyber warefare
What Is Cyber Warfare?
Cyber warfare is usually defined as a cyber attack or series of attacks that target a country. It
has the potential to wreak havoc on government and civilian infrastructure and disrupt critical
systems, resulting in damage to the state and even loss of life.
There is, however, a debate among cyber security experts as to what kind of activity
constitutes cyber warfare. The US Department of Defense (DoD) recognizes the threat to
national security posed by the malicious use of the Internet but doesn’t provide a clearer
definition of cyber warfare. Some consider cyber warfare to be a cyber attack that can result
in death.
Cyber warfare typically involves a nation-state perpetrating cyber attacks on another, but in
some cases, the attacks are carried out by terrorist organizations or non-state actors seeking
to further the goal of a hostile nation. There are several examples of alleged cyber warfare in
recent history, but there is no universal, formal, definition for how a cyber attack may
constitute an act of war.
Refers to monitoring other countries to steal secrets. In cyber warfare, this can involve
using botnets or spear phishing attacks to compromise sensitive computer systems before
exfil trating sensitive information.
Sabotage : Government organizations must determine sensitive information and the risks if
it is compromised. Hostile governments or terrorists may steal information, destroy it, or
leverage insider threats such as dissatisfied or careless employees, or government
employees with affiliation to the attacking country.
Denial-of-service (DoS) Attacks : DoS attacks prevent legitimate users from accessing a
website by flooding it with fake requests and forcing the website to handle these requests.
This type of attack can be used to disrupt critical operations and systems and block access
to sensitive websites by civilians, military and security personnel, or research bodies.
Electrical Power Grid : Attacking the power grid allows attackers to disable critical systems,
disrupt infrastructure, and potentially result in bodily harm. Attacks on the power grid can
also disrupt communications and render services such as text messages and
communications unusable.
Propaganda Attacks :Attempts to control the minds and thoughts of people living in or
fighting for a target country. Propaganda can be used to expose embarrassing truths, spread
lies to make people lose trust in their country, or side with their enemies.
Economic Disruption :
Most modern economic systems operate using computers. Attackers can target computer
networks of economic establishments such as stock markets, payment systems, and banks
to steal money or block people from accessing the funds they need.
Surprise Attacks : These are the cyber equivalent of attacks like Pearl Harbor and 9/11.
The point is to carry out a massive attack that the enemy isn’t expecting, enabling the
attacker to weaken their defenses. This can be done to prepare the ground for a physical
attack in the context of hybrid warfare.
CASE STUDIES
CASE STUDY 1:
attacks, it’s about preparing for them. This means finding them and dealing with them in real
time. The longer a cyber-attack goes undetected (on average 154 days), the more damage it
does to the business and the more money it will cost for the business to recover.
security breaches as organizations simply don’t have the bandwidth to manually trace all
alerts across their security fabric, organisations are therefore adopting SIEM (Security
Information and Event Management) solutions to provide a single pane of glass view in real
time of all external and internal threats, allowing them to be proactive in stopping the attack
Today, customers can choose from a wide range of SIEM software and other security
technologies, however, many organisations have realised that software alone will not bring
The Challenge
Client X have a small IT team, with no dedicated security consultants. With around x
systems, which in turn generate thousands of log entries and alerts per day, data is not being
transformed into actionable information of potential cyber threats, posing the risk of multiple
Organisations the size of Client X are expected to be targeted with around 1000 cyber-attack
attempts within any 24 hour period! Without a dedicated team to focus on this, it is inevitable
some threats will be missed, causing both financial and reputational damage.
2. Only the most obvious attacks are investigated…
With so much unmanageable data, Client X can currently only investigate what are perceived
as easily recognisable cyber-attacks. This however results in too many false positives and
does not allow the IT team to drill-down to find and react to REAL attacks that would have
The lack of visibility means intrusions cannot be analysed without consolidating data from
having to view and understand the nature of issues and alerts on several systems, in order to
confirm an attack. This is a highly ineffective means of determining the root cause of an
attack, as well as how to respond. Time to remediation will be dramatically increased, leading
to potentially greater financial loss and brand reputational damage in the event of an attack.
Insider threats are a bigger risk to cyber security than external hackers, with 74% of cyber
incidents happening from within companies. Employees are inadvertently causing corporate
data breaches and leaks daily and are very costly to remediate against. Loss of credentials due
to phishing theft, or even carelessness invites malware into the system when an employee
leaver wishing to remove data that could potentially provide a competitor important insight
RESULT – Client X had a cyber breach which resulted in significant financial loss….
The Solution
SCC worked in partnership with Client X to provide the SCC SOC service enabling real time,
rapid and thorough analysis of security events originating from both internal and external
The CSS service is designed to detect anomalies, uncover advanced threats and removes false
positives. It consolidates log events and network flow data from devices, endpoints and
Analysts monitor incoming alerts and events. The SOC service remains continually up to date
with the latest threats and vulnerabilities provided It then uses an advanced Sense Analytics
engine to normalise and correlate this data and identifies security offences requiring
The Outcome
• Continuous improvement – the methods that determine what is being attacked and how to
stop an attack, are constantly being monitored; as the hackers evolve, we evolve with them,
dramatic increase in the number of threats and attacks. The goals are to streamline security
solutions while reducing operational costs and staffing requirements. SCC consolidates this
data from multiple sources, including networks, servers, databases, applications, and so forth;
this enables our SOC analysts to monitor everything from everywhere, in one central
location.
Streamlined incident investigations – Immediate insights into risky user behaviours, action
and activity history. 360°Analysis – Perform analysis of activities at the end point, insights
• Single view of vulnerabilities – Single centralised view of all vulnerabilities with their
status and their context. Prioritise by threat and impact – Analyses threat intelligence,
1. BACKGROUND
A financial company dealing in banking services and credit card businesses is headquartered
in the Middle East with many branches spread across several cities. There were talks of a
mega merger. On a Wednesday afternoon, just before a 3 day weekend, the CIO received a
ransom email from an unknown entity, stating that they knew about the merger plans and also
As a sample, private details of five hundred customers were enclosed within the ransom
email as "proof". The threat : Unless a major ransom was paid in Bitcoin they might leak
the
merger plans and sell the client info. Along with a Legal company, Infopercept, as a Managed
Security Services Provider, was also appointed to manage and advise on the incident
response. We commenced work right away, power-assisted by the expert competent teams, to
2. FIRST RESPONSE:
Our “Security Operations Centre” was set up as a primary step to validate the threat. We
found a discussion on a hacker website, within the dark net, that talked about the availability
The RED TEAM of Infopercept works on the aforementioned proverb. Although simple in
nature, it is the core strategy of Infopercept. This is implemented as soon as the security audit
is completed.
The RED TEAM MEMBERS are our Ethical Hacking Consultants; experts, who test various
vulnerabilities.
Our team plunged into action, and within a few hours they were able to record and safeguard
the relevant server logs. A big crisis was averted and further damage prevented, as the
malware was identified and neutralized immediately which was still active on our clients
network. Even as these activities were occurring, all other communicating channels were
simultaneously secured which were used between the customer, the advocates and the
forensic analysts. After thorough analysis of the sample data that was compromised, we concluded
that it was indeed the client data that was compromised and security was breached.
On further analysis of the server log noise, we figured out that in reality personal data records
of 500 employees were only missing and the rest of the data was safe. This also led us to
doubt if the hackers had any reliable information about the merger.
Even as the cyber team was securing the network, another team began work on drafting and
implementing guidelines for various other communications and reports that were to be
generated. Immediate action was taken regarding communicating to the relevant authorities,
It had become clear that apart from the data of the 500 customers, the hackers didn’t have any
other data or information regarding the upcoming merger. Thus with consensus from the
company, the legal team, and us, it was mutually decided not to pay the ransom.
But action had to be taken regarding the leaked data. As it contained the customer’s name,
contact details, email addresses etc., it was decided to inform them of the breach and caution
them against falling prey to fraudulent emails or calls. The customer care executives too were
A press conference was called and relevant details were given out. The concerned authorities
such as the monetary authority and the administrative authority were briefed within 24 hours
of the receipt of the ransom email. This was done even before the customers were informed
about the breach.We wanted to ensure that the line of communication was transparent right from
the beginning till the end of the investigation. This was done so that the legal team, the security
team
members, and the government authorities were all on the same page and there was no
miscommunication.
We further reiterated that from then on, there will be sharing of information among the
involved parties with regular updates. We advised the customers to strengthen their online
security, be alert to any unusual activity, and inform the security team in case of any
suspicion.
Modus operandi by hackers: The CEO of our client company used to travel a lot.
He was also part of many CSR (Corporate Social Responsibility) activities and
communication through emails. Like on any regular day the EA received an email
downloaded the attachment leading to entry of the malware into the system and
putting the whole network at risk. Non deployment of IT staff 24x7: Even though
important security measures were in place such as antivirus and firewalls which
delayed the breach, it wasn’t sufficient to stop the hack. As the attack was intelligently
planned on the weekend, the log alerts went unnoticed and there was no one to take action.
corporation, the resources allocated to take care of security was proportionally very
less. This was a glaring loop hole in the entire security framework.
Security Audit: It was also learned that there was no one looking into the security
audit of the firm which is essential to remain on top of the game. So the first thing we
suggested and implemented was putting in a team to do regular audits and all other
compliances.
regular security audit. The main benefit being identifying vulnerabilities or gaps in the
Outsourcing of Web Portal & Applications: The design and implementation of the
website of the customer was given to a third party. Naturally it gave rise to security
to take care of the websites, applications and their external network, three glaring
vulnerabilities were spotted by our team and brought to the notice of the company.
Weak Encrypted Internet Traffic: The most shocking observation we found was
the lack of use of HTTPS (which is the encrypted internet traffic) at a login form in
the website. This glaring error made the network vulnerable and easy for the hackers
to get access to the customers usernames and passwords, when they would log in on
this vulnerable page. This way our clients’ customers accounts may have been
compromised. The customers were bank account holders, credit card holders of our
Bridge between our CLIENT and the AMALGAMATOR: As the incident was out
in the open, everyone including the buyers who were part of the merger had become
aware of the security breach. Although a lot of damage control had been done, still it
was necessary to convince the buyers of a secure network. Thus the client requested
us to play the role of “Security Advisor”. We represented the client and did a
presentation in front of the board members of the buyers and their cyber security team
to show the security of the infrastructure. We explained in detail the reason for the
hack, the lapses and the remedial action taken by us. Once they saw the security
measures taken up by us they were reassured and convinced and gave the green signal
Security Audit: Upon auditing the security network, 300 odd lapses were found and
corrective actions taken.Training of the resources: Our team shadowed the clients IT Team,
Optimization taken as a Approach: The first step taken by us was that of Optimization. We
optimized the client’s resources and tools within the allocated budget and were able to
for the client. As the client was in the banking sector, PCI DSS (Payment Card Industry Data
Security Standard) was set up to take care of the transactions. A 90 day trial run was done
Compliances: Compliance certifications were done as per the required norms of the Central
Bank regularization. This was well appreciated by the client as this determines their
reengineered in a chronological order. This streamlined the operations and brought in much
relief to the clients. They were now able to focus on their core business by leaving the
security management to Infopercept. From time to time the management sought reviews from
As per the requirement of the client we implemented DARK WEB as the most
reliable tool to secure the online transactions being done by customers of our client.
technology for advanced attack detection. Moving Target Defense (MTD) was
brought into action to control the changes across the multiple system dimensions. This
was done to make it complicated for the attackers to hack the network, stall their
attack and buy time to stop them from causing major damage.
FINAL RESULTS:
After the great job done by Infopercept’s RED TEAM, BLUE TEAM, GREEN
TEAM, PURPLE TEAM, and PINK TEAM for 180 days, our clients were extremely
satisfied with the result. We were asked to look after their security systems for a year and set
up their SOC, TOC and COC centres for a year. We further advised them to be alert to any
suspicious activity and report at once to our security team. We also taught them the remedial
actions to be taken in case of a future attack. As part of strengthening their network we asked
them to segregate their activities related to their daily dealings from the network that deals
with storage of sensitive data and information pertaining to their customers. We also worked
closely with them in reframing their cyber security policies and procedures and increasing
CASE STUDY 3:
EX-FILTRATING REMOTE USER ACCOUNT TO INJECT RANSOMWARE
OVERVIEW
internal assets and set a wholistic plan to mitigate future risk through enhanced MFA,
policies, and training.
ATTACK SUMMARY:
Adversaries performed data theft techniques to exfiltrate vulnerable information and hold
ransom internal systems. Incident led to the company negotiating a Bitcoin payment to
Through a phishing campaign adversaries were able to obtain user credentials and VPN
Mimikatz was then installed on vulnerable systems to recover Windows Service Accounts.
Using the escalated privileges the attackers exfiltrated information through data transfer
services and propagated Medusalocker ransomware on internal assets. Attackers held ransom
VULNERABILITY
HALOCK determined O365 and the corporate VPN solution lacked strong authentication
controls. It was discovered that the VPN authentication utilized the same credential as Active
RECOVERY
The HALOCK team identified the attack vector malicious binary code and shut down all
external access which included O365 replication, and all user passwords were reset.
Recovered systems that had capable backups. The organization then paid ransom for critical
A comprehensive security plan was developed to continually protect and monitor the
• Develop critical system back-up plan to ensure they are recoverable from malware attacks
• Scheduling regular vulnerability scans, and threat monitoring to identify risky login
attempts.
********************************************************************