Professional Documents
Culture Documents
Attack
MN502
• Define malware
• Analyse different types of malware
• Identify payloads of malware
• Describe the types of social engineering
psychological attacks
• Explain physical social engineering attacks
• Most viruses today go to great lengths to avoid detection (called an armored virus)
• Some armored virus infection techniques include:
– Swiss cheese infection - viruses inject themselves into
executable code
• Virus code is “scrambled” to make it more difficult to detect
• Worms may:
– Consume resources or
– Leave behind a payload to harm infected systems
How does it spread to User transfers infected files to Uses a network to travel from
other computers? other devices one computer to another
Does it infect a file? Yes No
Does there need to be
user action for it to Yes No
spread?
• Example
– User downloads “free calendar program”
• Program scans system for credit card numbers and passwords
• Transmits information to attacker through network
• Dumpster diving
– Digging through trash to find information that can be useful in an attack
• Tailgating
– Following behind an authorized individual through an access door
– An employee could conspire with an unauthorized person to allow him to walk in
with him (called piggybacking)
– Watching an authorized user enter a security code on a keypad is known as
shoulder surfing
With this information they contacted Amazon.com by telephone and were able to convince the
customer service representative that it was Mat who was calling; they tricked the representative into
asking if the last four digits of his credit number on file were 1954 (of course, the attackers said it was).
With Mat’s Apple ID, billing address, and last four digits of his credit card number, the attackers called
AppleCare by phone and convinced the representative to issue a temporary password for Mat’s Apple
account. They then reset the password, locking Mat out, and with the mhonan@me.com name and
new password, they reset the password on his Gmail account—and then promptly erased more than 6
GB of Google email messages. They also used iCloud’s remote wipe service to completely erase all the
data on his iPhone, iPad, and MacBook” [1].
Reference:
[1] M. Ciampa, "Introduction to Security," in Security+ Guide to Network Security Fundamentals, 5th ed., Cengage, 2015.