Skip to content
Permalink
master
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Go to file
 
 
Cannot retrieve contributors at this time
---
title: Know your enemy
---
We begin this week by outlining the most common types of threat a
business or individual may face.
Malware is an umbrella term defining any software that is harmful to
computers. It's a very broad brush term that covers a wide range of
threats, including viruses, spyware, and other exploits.
Generally, malware involves installing some software onto a computer;
this may be initiated by the user (i.e. the user installs a compromised
version of a legitimate program), or through some other exploit (for
example, a worm virus that infects computers over the network).
Below we discuss the common ways security threats such as Malware occour.
## Phishing and Social Engineering
Hackers are like Vampires, and are usually need to be invited into our
systems.
Having a user install the malware for us is the most common attack
vector. Techniques such as Phishing try to trick a user into
installing the rogue program. Phishing is a form of social
engineering where we try to convince the target we are a legitimate
account, service or person, and install the Malware onto their system
for us.
It is claimed that around 90% of malware installations are due to
Phishing. Personally I take this to include a broad definition of
phishing including setting up fake websites or app-stores in the hope
of luring people into installing software, rather than the more
targeted approach.
## Web Based attacks
Are the second most common vector (after Phishing) for installing
malware. Web based exploits can also be an attack vector outside of
directly attacking websites.
For example, browser based attacks such as clickjacking (injecting
software into a website that affects a browsers behaviour), and
cryptojacking (installing bitcoin mining software on vulnerable
computers that visit a website) are common. Additionally, malware
can be installed though malicious browser plugins, or making use of
vulnerabilities in the browser itself.
One recent example of malware installed via a browser plugin comes
from the "web development toolbar". The toolbar is a very well
respected extension, that allows you to examine, and test the
functionality on web pages. The author of the toolbar was the victim
of a Phishing attack, which compromised his email account, and a
malicious version of the toolbar was
released. <https://www.theregister.co.uk/2017/08/02/chrome_web_developer_extension_hacked/>
Other web based vectors include Man In The Middle (MITM) attacks, where
the network traffic is intercepted by a third party. This means that
"secure" information you send to a site could be seen by a 3rd party.
We will discuss methods of protecting against MITM, and eavesdropping
in the cryptography section of the course.
## Web Application Attacks
Previously we explored web application attacks, with the OWASP
top 10. These attacks may not directly affect users of a website, but
give the potential for information about users to be revealed though
data breaches.
Web application attacks affect the operation of a website and can lead
to exploitation or a data breach. Around 30% of data breaches involve
vulnerabilities in web applications. Issues with Web applications
that allow an attacker to comprimise can involve:
- SQL (Structured Query Language) injection. Rated the Number 1 threat by OWSAP (51%)
- File Includes vulnerabilities (35%)
- XSS (Cross Site Scripting). Places malicious code on the site itself. (9%)
- Content Management Systems (CMS). Such as WordPress
- Newly discovered vulnerability affected ~2million sites.
Each of these attacks can lead either to a data breach, where
information such as user details is revealed, or a full comprimise of
the server, allwing the attacker to take control.
Another interesting trend in web application attacks is through
Phishing. Compromised versions of software plugins have been used to
gather information about a sites users. Two examples of organisations
that have been exploited through the use of an insecure 3rd party
plugin include:
- British Airways
- Ticketmaster
## The Insider Threat
While not a direct threat for exploitation, the insider threat is still
the 2nd most common cause of an incident within an organisation.
This occurs when an employee uses their authorised access to harm the
security of an organisation. While the majority of cases are unwilling
(employees being Phished etc), there are still a number of cases when
the employee maliciously exploits the systems.
Analysis shows that the majority of insiders tend to ignore security
policies to speed productivity. For example they may:
- Send files to personal accounts
- Writing down passwords
- Store data on media external to the organisation
## Hardware issues
Security issues with hardware design have always been present, but
came to prominence in 2018 with *Spectre* and *Meltdown*. These
exploit the way the processor has been designed to allow an attacker
to read parts of computer memory they should not have access to.
Hardware based issues can be difficult to fix retrospectively. If the
flaw is with the physical design of the chip then there is little that
can be done, and modifying the behaviour of the code running on the
chip itself is difficult.
While not strictly a hardware on the hardware itself, a flaw in the
firmware for the Broadcom WiFi chips left billions of devices open to
attack. <https://thehackernews.com/2017/04/broadcom-wifi-hack.html>
# Threat Actors
As well as the security flaws themselves, we also need to understand
where the threats originate from.
## Cyber Criminals
Cyber criminals, commit crime by targeting computers or networks, and
can be either lone entities, or part of a larger organised group.
Remain the most active threat in cyberspace, and are responsible for
2/3 of all registered incidents.
Analysis of recent trends shows that the behaviour of cyber criminals
is becoming more organised, and trending toward monetisation of
activity. This is evident in the increase in targeted attacks and
data breaches in the business sector, and the rise of ransomware. One
interesting trend is the increased number of Phishing campaigns
targeting of high value targets, such as the CEO of organisations.
## Nation States
Nation state hackers may either be part of an "cyber army" or
individuals with a "Licence to Hack"
Organised hacking at a state level, with hackers working for a
government to disrupt or compromise other governments, organisations
or individuals. It is estimated that nation state hacking is
responsible for 20% of all incidents.
This style of attack can include; spreading propaganda on social
media, stealing national or industrial secrets, interfering with
elections, or compromising the nuclear safety of a country.
https://www.csoonline.com/article/3218104/what-is-stuxnet-who-created-it-and-how-does-it-work.html
## Hacktivists / Cyber Fighters
The hacking activist takes their political, religious or social cause
onto the internet. This can range from defacing the website of a
corporation they disagree with, to directly attacking the
infrastructure of an organisation.
There are several large scale hacktivist groups (such as anonymous),
that may adopt a cause. It could also be argued that some hacktivist
groups are actually a front for nation state activity.
## Script Kiddies
Script kiddies are our final threat, these are generally untrained
hackers, making use of tools and scripts available on the internet.
Generally they are responsible for simple, low impact cyber attacks.
However, they can have a significant impact, for example the Talk Talk
data breach was caused by teenage hacker using simple tools.