Unit 1 Cyber Security
Unit 1 Cyber Security
Cyber Security
Cybercrime – Definition
Cybercrime is any illegal activity that takes place using computers or the internet. These crimes can
be aimed at stealing personal information, money, or causing damage to systems. Here’s a detailed
breakdown in the simplest terms:
1. What is Cybercrime?
• Cybercrime refers to crimes committed using a computer or a network (like the internet). It
involves criminals hacking or breaking into systems to steal information or cause damage.
2. Types of Cybercrime
There are many types of cybercrime, but here are some of the most common:
a. Hacking
• Gaining unauthorized access to someone’s computer or network. Hackers break into systems
to steal information, spread viruses, or disrupt services.
b. Phishing
• Sending fake emails or messages to trick people into giving out personal information like
passwords, bank details, or credit card numbers.
c. Identity Theft
• Stealing someone’s personal information (like Social Security numbers, credit card details,
etc.) to pretend to be them and commit fraud.
d. Online Scams
• Fraudulent schemes that trick people into giving money or personal information through
fake websites, emails, or advertisements.
• Cybercriminals spread harmful software to damage computers, steal data, or spy on users
without them knowing.
f. Cyberbullying
• Using the internet to threaten, harass, or harm someone emotionally or mentally through
messages, social media, or other online platforms.
• Personal Data Theft: Cybercriminals can steal sensitive information, leading to privacy issues.
• Service Disruption: Some cyberattacks (like DDoS) can cause websites or businesses to shut
down temporarily.
• Avoid Suspicious Emails or Links: Be careful of emails asking for personal information or
offering deals that seem too good to be true.
• Install Security Software: Antivirus programs and firewalls can protect against malware and
unauthorized access.
• Keep Software Updated: Regularly update your computer’s operating system and apps to
protect against the latest threats.
1. Hacking
• What is it?
• Hacking is unauthorized access to someone’s computer or network to steal data, cause harm,
or disrupt systems.
• Real-Life Example:
• Yahoo Data Breach (2013-2014): Hackers broke into Yahoo’s database, stealing information
from over 3 billion user accounts, including email addresses, security questions, and
passwords. It became one of the largest data breaches in history.
2. Phishing
• What is it?
• Phishing is sending fake emails or messages to trick individuals into providing sensitive
information like passwords, credit card numbers, or bank details.
• Real-Life Example:
• Target Email Scam (2013): Hackers sent phishing emails to Target employees, which led to a
data breach affecting 40 million credit and debit card numbers of customers. The criminals
installed malware on Target's payment systems to steal data.
3. Identity Theft
• What is it?
• Stealing someone’s personal information (like Social Security numbers or financial
information) to impersonate them, often leading to financial fraud.
• Real-Life Example:
• Equifax Data Breach (2017): Hackers stole the personal information of 147 million people
from the credit reporting agency Equifax. The breach exposed Social Security numbers, birth
dates, addresses, and driver's license numbers, which could be used for identity theft.
4. Online Scams
• What is it?
• Fraudulent schemes that trick people into giving money, personal information, or credit card
details, often through fake websites or emails.
• Real-Life Example:
• Nigerian Prince Scam: This is a long-running scam where someone pretending to be royalty
from Nigeria (or another country) asks for help to transfer money and promises a share of
the fortune. The victim sends money upfront for fees or taxes, but the "prince" never
delivers.
• What is it?
• Real-Life Example:
• WannaCry Ransomware Attack (2017): WannaCry was a massive global cyberattack that
infected over 200,000 computers across 150 countries. It encrypted user data and
demanded ransom payments in Bitcoin to unlock the files. The attack disrupted hospitals,
businesses, and government services worldwide.
6. Cyberbullying
• What is it?
• Using the internet or social media to harass, threaten, or harm someone emotionally or
mentally through harmful comments, messages, or spreading false information.
• Real-Life Example:
• Amanda Todd Case (2012): A 15-year-old girl from Canada, Amanda Todd, was a victim of
cyberbullying after an individual tricked her into sharing explicit images. These images were
later shared online, leading to severe bullying at school and online harassment. Amanda
tragically took her own life, bringing attention to the dangers of cyberbullying.
• What is it?
• These attacks flood a website or server with so much traffic that it crashes and becomes
unavailable for users. DDoS attacks involve multiple systems overwhelming the target at
once.
• Real-Life Example:
• GitHub Attack (2018): GitHub, a popular software development platform, experienced the
largest DDoS attack at the time, with incoming traffic peaking at 1.35 terabits per second.
Despite the attack, GitHub’s defenses managed to recover in less than 10 minutes.
• What is it?
• Criminals use the internet to exploit children through harmful content, child pornography, or
grooming (building a relationship to exploit a child).
• Real-Life Example:
• Operation Dark Web (2020): Law enforcement agencies, including the FBI, dismantled
several dark web child exploitation websites. In one case, the Welcome to Video website
was shut down. It was one of the largest child pornography websites on the dark web, and
over 300 people were arrested.
• What is it?
• Stealing credit card information through phishing, hacking, or data breaches to make
unauthorized purchases.
• Real-Life Example:
• TJX Breach (2007): Hackers stole 45 million credit and debit card numbers from the TJX
Companies (parent company of T.J. Maxx and Marshalls). The hackers infiltrated the system
by exploiting weaknesses in the company’s Wi-Fi networks, making it one of the largest cases
of credit card fraud.
10. Cryptojacking
• What is it?
• This involves using someone’s computer or device without their knowledge to mine
cryptocurrency (like Bitcoin). It consumes the victim’s computer resources, slowing it down.
• Real-Life Example:
• Tesla Cryptojacking (2018): Hackers gained access to Tesla’s cloud computing resources and
used them to mine cryptocurrency. They exploited an unprotected administrative console,
leading to unauthorized cryptocurrency mining.
1. What is a Cybercriminal?
• Cybercriminals are people who break the law by using technology, usually computers or the
internet. They commit various crimes, like stealing personal information, hacking into
systems, or spreading viruses.
2. Types of Cybercriminals
There are different types of cybercriminals based on their motives and the types of crimes they
commit:
a. Hackers
• Example: A hacker might break into a company’s network to steal customer information or
install malware (harmful software).
b. Script Kiddies
o They are amateur hackers who use ready-made tools or codes written by more
experienced hackers. They don’t have advanced skills but can still cause damage.
• Example: A script kiddie might download a hacking tool to attack a website for fun, without
fully understanding how the tool works.
c. Phishers
• Example: A phisher might send an email pretending to be from a bank, asking you to "verify"
your account information.
d. Spammers
• Example: Spammers might send you messages about fake job offers or lottery wins.
e. Cyberterrorists
o These are people who use cyberattacks to create fear, cause disruption, or damage
critical systems like government networks, power grids, or transportation systems.
• Example: A cyberterrorist might try to bring down a country’s banking system or hack into a
power plant.
f. Cyberstalkers
o Cyberstalkers use the internet to harass or intimidate others. They might send
threatening messages or track someone’s online activities to cause fear.
• Example: A cyberstalker might constantly send someone threatening emails or track them on
social media.
o Insiders are employees or former employees of a company who misuse their access
to company systems to steal data or sabotage operations.
o These are large, professional groups of criminals who work together to carry out
large-scale cybercrimes, often for financial gain. They can be very sophisticated and
difficult to catch.
• Example: Organized crime groups might run massive phishing campaigns or ransomware
attacks that target businesses or governments.
3. Motives of Cybercriminals
Cybercriminals have different reasons for committing crimes:
a. Financial Gain
• Goal: Steal money, credit card numbers, or personal data that can be sold for profit.
• Example: Hackers might steal credit card information to make illegal purchases or sell the
data to other criminals.
b. Revenge
• Goal: Some cybercriminals attack individuals or companies to get back at them for perceived
wrongs.
• Example: An employee fired from a company might hack into its system to delete important
files or cause damage.
c. Fun or Challenge
• Goal: Some hackers break into systems just for the thrill of it, to prove they can do it, or to
gain a reputation in the hacker community.
• Example: A hacker might attack a famous company’s website just to show off their skills.
• Goal: Hackers who commit cybercrimes for political or social causes are called hacktivists.
They want to spread a message or bring attention to their cause.
e. Terrorism
• Goal: Cyberterrorists attack systems that are crucial to national security, like defense or
infrastructure, to create chaos or fear.
• Example: A cyberterrorist group might try to shut down a country’s electricity grid or disrupt
transportation systems.
• Motives range from financial gain, revenge, and fun, to political or social activism, and even
terrorism.
• Cybercriminals can operate from anywhere in the world, making it hard to catch them, but
law enforcement agencies use various techniques to track and stop them.
• Cybercriminals use tactics like hacking, phishing, identity theft, and malware to steal
information, money, or disrupt services.
• Netizens, or internet users, are potential targets, so it's crucial to stay aware and take action
to protect yourself.
• Malware: Harmful software, like viruses or ransomware, that can damage your system or
steal data.
• Identity Theft: Cybercriminals steal personal details like Social Security numbers or bank info
to impersonate you.
• Online Scams: Fraudulent schemes aimed at tricking you into sending money or giving
sensitive information.
1 Precaution
2 Protection
3 Prevention
4 Perseverance
5 Preservation
• What to do: Use a different, strong password for every online account. A strong password
should include a mix of letters (upper and lower case), numbers, and symbols.
• Why it matters: If a cybercriminal gets hold of one of your passwords, they can’t access your
other accounts.
• Tip: Use a password manager to store and generate strong passwords easily.
• What to do: Activate 2FA on all accounts that offer it. This adds an extra layer of security by
requiring a second form of verification (e.g., a code sent to your phone) in addition to your
password.
• Why it matters: Even if someone steals your password, they won’t be able to log in without
the second verification step.
• What to do: Be skeptical of unexpected emails, messages, or pop-ups asking for personal
information. Don't click on links or download attachments unless you're sure they’re
legitimate.
• Why it matters: Cybercriminals use phishing attacks to trick you into giving away your
information or installing malware on your device.
• Tip: Verify the sender's email address and be cautious of links asking for sensitive data.
• Why it matters: Updates often include security patches that fix vulnerabilities that hackers
could exploit.
• Tip: Turn on automatic updates to make sure you’re always protected with the latest security
features.
• Why it matters: These tools can detect and block malicious software or threats before they
can harm your system.
• Why it matters: Unprotected Wi-Fi networks can be an easy entry point for hackers.
• Why it matters: Cybercriminals can intercept your data over public networks.
• Tip: Use a Virtual Private Network (VPN) when you need to use public Wi-Fi for better
security.
• Why it matters: In case of a ransomware attack or system crash, you won’t lose your
valuable data if you have backups.
• Tip: Automate your backups to ensure they happen regularly without needing to remember.
• Tip: Set up alerts with your bank or financial institutions to notify you of any unusual activity.
• What to do: Keep learning about new threats and security practices by reading reliable
cybersecurity news or blogs.
• Why it matters: Cybercriminals are always coming up with new tricks, so staying updated
helps you defend against the latest threats.
• Tip: Follow trustworthy cybersecurity sites or government agencies that release security
advice.
• Why it matters: Cybercriminals can use the information you share on social media to target
you for scams, identity theft, or phishing.
• Tip: Limit friend requests to people you know and avoid oversharing personal information
online.
5. Be Aware of Online Scams
• What to do: Always be cautious of deals, offers, or messages that seem too good to be true,
like winning a lottery you never entered or a job offer without applying.
• Why it matters: Cybercriminals often use scams to trick people into sending money or
sharing personal information.
• Tip: Research companies or offers before making any payments or sharing personal details.
• Why it matters: Many cyberattacks succeed because people aren’t aware of the risks or how
to protect themselves.
• Tip: Encourage others to use strong passwords, enable 2FA, and stay cautious online.
• Report the Incident: Contact the authorities or relevant organizations, like your bank, to
report the cybercrime immediately.
• Change Passwords: If your account is hacked, change the passwords for all your online
accounts, starting with the most important ones (bank, email, social media).
• Monitor Your Accounts: Keep a close eye on your accounts for any signs of suspicious
activity.
• Restore Backups: If your data is compromised, restore it from the backup you have.
1. Antivirus
• What it does:
• An antivirus is designed to detect, prevent, and remove viruses (malicious programs that can
damage or disrupt your system).
• How it works:
• It scans your computer for known viruses based on a virus database and either quarantines
or deletes them.
• Best for:
• Protecting your computer from known threats like viruses, worms, and Trojans.
• Limitations:
• Antivirus may not be effective against all forms of modern malware or new, unknown
threats.
2. Anti-Malware
• What it does:
• How it works:
• It focuses on newer, more sophisticated forms of malware and uses heuristic analysis to
detect unknown or emerging threats.
• Best for:
• Defending against a wide array of threats, especially newly developed malware that
traditional antivirus programs may not detect.
• Limitations:
• It might not always protect against the simpler, more common viruses that are already
covered by antivirus programs.
3. Firewall
• What it does:
• A firewall monitors and controls incoming and outgoing network traffic based on
predetermined security rules. It acts as a barrier between your internal network (or device)
and external threats (internet).
• How it works:
• A firewall inspects data packets coming in and going out, blocking or allowing them based on
your security settings.
• Best for:
• Preventing unauthorized access to your system from the outside (e.g., hackers or malicious
software trying to connect remotely).
• Limitations:
• Firewalls don't protect against malware that's already inside the system or prevent the
execution of harmful files.
• Botmasters control these bots without the users knowing. The computers look normal but
are secretly doing harmful activities.
• Command and Control (C&C): Once infected, the computer connects to a server controlled
by the hacker. The hacker can then send commands to the bots from this server.
• Spamming: Hackers use botnets to send massive amounts of spam emails, often containing
malicious links or scams.
• Click Fraud: Botnets generate fake clicks on online ads, earning money for the hacker by
pretending real people are clicking the ads.
• Data Theft: Botnets can steal sensitive data from infected computers, such as passwords,
credit card numbers, or other personal information.
• Cryptojacking: Some botnets use the processing power of infected computers to mine
cryptocurrency without the owner’s consent.
• Decentralized (P2P): Bots communicate with each other in a peer-to-peer network, making it
harder to shut down.
• Stealth: Most people don’t know their computers are infected, so botnets can go unnoticed
for long periods.
• Global Reach: Botnets can operate worldwide, affecting victims anywhere in the world.
• Anonymity: Hackers hide their identities by routing their attacks through infected bots.
How to Protect Against Botnets
• Install Antivirus Software: Regularly update and scan your system to detect malware.
• Be Cautious with Emails and Links: Don’t click on suspicious links or download attachments
from unknown sources.
• Keep Software Updated: Security patches fix vulnerabilities that hackers could exploit.
• Details:
• The 15-year-old hacker known as Mafiaboy took down several high-profile websites,
including CNN, Dell, and eBay, using a DDoS attack with a botnet of 1,500 computers.
• This attack was one of the first to gain widespread media attention, highlighting the
vulnerabilities of major online services.
2. MyDoom (2004)
• Details:
• MyDoom became one of the fastest-spreading email worms, creating a botnet estimated to
be between 100,000 and 1 million infected computers.
• It initiated a DDoS attack against the website of the recording industry association, along
with spamming activities.
• Details:
• The Storm Worm spread through malicious email attachments, forming a botnet that peaked
at over 1.5 million infected computers.
• It was used to launch DDoS attacks and send spam emails. The botnet was notable for its use
of peer-to-peer technology to make it resilient to takedowns.
4. Conficker (2008)
• Details:
• Conficker spread rapidly, infecting millions of computers globally. Estimates of its botnet size
reached up to 15 million.
• It exploited Windows vulnerabilities and was capable of downloading additional malware
and launching attacks, but its full intentions were never realized.
5. Zeus (2007-2010)
• Details:
• Zeus is a notorious banking Trojan that created a botnet primarily used for stealing banking
credentials.
• It led to the loss of hundreds of millions of dollars. The Zeus botnet was taken down in 2010
after a large-scale operation by law enforcement agencies.
• Date: 2012
• Details:
• This botnet was created by researchers studying the internet and consisted of more than
420,000 devices, mostly insecure Internet of Things (IoT) devices.
• Details:
• The Mirai botnet targeted IoT devices, infecting over 600,000 devices, including cameras and
routers.
• It launched one of the largest DDoS attacks in history, taking down the DNS provider Dyn,
which disrupted major services like Netflix, Twitter, and GitHub.
• Details:
• Also known as IoT_reaper, this botnet exploited various vulnerabilities in IoT devices.
• It reportedly reached over 1 million devices and was capable of launching massive DDoS
attacks.
• Details:
• An offshoot of Mirai, Satori used different exploits to infect devices, including some that
were previously unaffected by Mirai.
• The botnet was used to perform DDoS attacks, reaching 1.5 Gbps.
10. Emotet (2018-2021)
• Details:
• Emotet initially started as a banking Trojan but evolved into a powerful botnet used for
distributing other malware, including ransomware.
• In January 2021, a global law enforcement coalition took down the infrastructure of Emotet,
disrupting its operations.
• Details:
• Kinsing is primarily targeting Linux servers and cloud environments, often used for
cryptojacking.
• Details:
• Qbot, also known as QakBot, has been used to create extensive botnets for stealing sensitive
information and distributing ransomware.
• It has evolved over the years, adopting new techniques for evasion and persistence.
• A cybercafe (also known as an Internet café) is a public space where individuals can access
computers and the internet for a fee.
• Services Offered:
• Internet browsing
• Emailing
• Gaming
• Target Audience: Cybercafes primarily cater to individuals who lack personal internet access,
such as students, travelers, and professionals.
• Shared Computers: Multiple users share the same computers, which increases the risk of:
• Data Theft: Sensitive information can be compromised, including login credentials and
personal documents.
• Lack of Monitoring: Many cybercafes do not monitor user activities closely, making it easier
for criminals to engage in illicit activities without being detected.
• Usage of Public Wi-Fi: Cybercafes typically offer free Wi-Fi, which can expose users to
security risks. Cybercriminals may use unsecured networks to launch attacks or steal data.
• Identity Theft: Criminals can use public computers to access personal information and
impersonate victims.
• Phishing Attacks: Cybercriminals may use cybercafes to conduct phishing campaigns, sending
fake emails to steal credentials from unsuspecting users.
• Fraudulent Activities: Criminals can conduct scams, such as fake auctions or counterfeit
transactions, taking advantage of the anonymity that cybercafes provide.
• Cyberbullying and Harassment: Users can engage in bullying or harassment without the fear
of being identified, using anonymous accounts.
• A series of identity thefts were traced back to a cybercafe in South Korea where hackers used
malware to steal personal information from users.
• The cybercafe lacked proper security measures, making it easy for criminals to install
malicious software.
• Many Nigerian cyber scams (often referred to as "419 scams") have been traced back to
cybercafes, where scammers use public computers to send fraudulent emails and conduct
scams without revealing their identities.
5. Mitigation Strategies
• User Education: Cybercafes should educate users about the risks associated with public
internet access and encourage safe online practices (e.g., avoiding entering sensitive
information).
• Security Measures:
• Monitoring and Logging: Cybercafes can implement monitoring systems to keep track of
user activities, helping to deter criminal behavior.
• User Registration: Requiring users to register or provide identification before using services
can help trace malicious activities back to individuals.
• Promote Security Awareness: Cybercafes should promote awareness about phishing attacks
and safe online behaviors among their customers.
• Fraudulent emails or messages that appear to be from legitimate sources, tricking users into
providing personal information (e.g., passwords, credit card numbers).
• Spear Phishing:
• A targeted form of phishing that focuses on a specific individual or organization, often using
personalized information to appear more credible.
• Pretexting:
• The attacker creates a fabricated scenario to obtain information from the victim. For
example, posing as a bank representative to ask for account details.
• Baiting:
• An attacker offers something enticing (like free software or a USB drive) to lure victims into
revealing personal information or installing malware.
• Quizzing:
• The attacker conducts a series of seemingly innocuous questions to gather information,
which can be used for identity theft or to bypass security protocols.
• Vishing:
• Voice phishing, where attackers use phone calls to trick victims into providing sensitive
information, often pretending to be from banks or technical support.
• Psychological Principles:
• Trust: Social engineers often exploit the victim’s trust in authority figures or familiar brands.
• Fear: They may create a sense of urgency, making victims act quickly without thinking.
• Curiosity: Attackers may present intriguing offers or information to engage the target.
• Scarcity: Implying limited availability can pressure victims into quick decision-making.
• Prevention Measures:
• Education and Training: Regularly educate employees and users about social engineering
tactics and warning signs.
• Verify Requests: Always verify requests for sensitive information through official channels
before responding.
• Use Multi-Factor Authentication (MFA): MFA adds an additional layer of security, making it
harder for attackers to gain access even if they have stolen credentials.
• Regular Updates: Keep software and systems updated to protect against vulnerabilities.
2. Cyber Stalking
• Definition: Cyber stalking is the use of the internet or electronic means to harass or
intimidate an individual. It often involves repeated, unwanted attention or threats through
online platforms.
• Harassment:
• Sending threatening, abusive, or humiliating messages through email, social media, or text
messages.
• Monitoring:
• Using technology to track the victim's online activities, including social media posts,
locations, and interactions.
• Impersonation:
• Creating fake accounts or profiles to impersonate the victim, potentially damaging their
reputation or relationships.
• Doxxing:
• Publishing private or personal information about the victim online, such as home addresses
or phone numbers, to incite harassment.
• Spreading False Information:
• Using threats to instill fear in the victim, which can lead to emotional distress.
• Impact on Victims:
• Emotional Distress: Victims often experience anxiety, depression, and fear due to the
constant harassment.
• Physical Safety Concerns: Stalking can escalate, leading victims to fear for their safety in the
real world.
• Disruption of Daily Life: The stress and anxiety can interfere with work, school, and personal
relationships.
• Isolation: Victims may withdraw from social interactions due to fear or embarrassment.
• Legal Considerations:
• Many countries have laws against stalking, including cyberstalking. Victims can report
incidents to law enforcement and seek protective orders.
• Gather Evidence: Victims should keep records of all harassment, including screenshots,
emails, and messages, as evidence for legal actions.
Prevention Measures:
• Privacy Settings: Utilize privacy settings on social media to control who can see personal
information and posts.
• Block and Report: Use blocking features on platforms to prevent stalkers from contacting
you, and report harassment to the platform.
• Avoid Sharing Personal Information: Be cautious about sharing personal details online that
could be used against you.
• Seek Support: Victims should reach out to friends, family, or professionals for support and
guidance in handling the situation.
Attack Vector:
• Definition
• An attack vector is a method or pathway through which a cybercriminal can gain access to a
computer system, network, or data to carry out malicious activities. Understanding attack
vectors is essential for developing effective cybersecurity measures, as they highlight the
potential vulnerabilities that can be exploited by attackers.
• Malware:
• Description: Malicious software designed to harm, exploit, or otherwise compromise
computer systems.
• Examples:
• Trojans: Disguise themselves as legitimate software to trick users into installing them.
• Phishing:
• Examples:
• Social Engineering:
• Examples:
• Baiting: Offering something enticing to lure victims into providing sensitive information or
downloading malware.
• Exploiting Vulnerabilities:
• Examples:
• Zero-Day Exploits: Attacks that target vulnerabilities not yet known to the software vendor.
• SQL Injection: Inserting malicious SQL code into input fields to manipulate databases.
• Network Attacks:
• Examples:
• Insider Threats:
• Description: Employees or contractors who exploit their access to harm the organization
intentionally or unintentionally.
• Examples:
• Physical Attacks:
• Examples:
• Theft of Devices: Stealing laptops, USB drives, or other devices containing sensitive
information.
• Unauthorized Access: Entering secure areas to tamper with equipment or steal data.
• Complexity: The complexity of an attack vector can vary. Some methods require advanced
technical skills, while others rely on basic social manipulation.
• Effectiveness: The effectiveness of an attack vector depends on the target’s security posture
and awareness. A well-informed user may recognize and avoid phishing attempts, while a
less aware user might fall victim.
• Adaptability: Attack vectors are constantly evolving as technology and security measures
improve. Attackers often adapt their methods to bypass existing defenses.
• Incident Response: Knowing the potential attack vectors allows organizations to develop a
robust incident response plan, reducing the impact of successful attacks.
• Mitigation Strategies
• Regular Software Updates: Keeping systems and applications updated to patch known
vulnerabilities.
• User Education: Training employees to recognize phishing attempts and practice good
security hygiene.
• Network Security: Implementing firewalls, intrusion detection systems (IDS), and secure
access controls to protect against network-based attacks.
• Multi-Factor Authentication (MFA): Adding an extra layer of security beyond just usernames
and passwords to protect sensitive accounts.
• Data Encryption: Encrypting sensitive data to protect it from unauthorized access, even if an
attacker gains access to the system.
Criminals begin by gathering information about their target. This can involve:
• Researching: They may study the target’s online presence, including social media, websites,
and public records.
• Scanning: Using tools to identify open ports, services, and vulnerabilities in the target’s
network.
Example:
• Target Breach (2013): The attackers conducted reconnaissance on Target’s network and
identified third-party vendors with access to Target’s systems. They exploited these
connections to gain entry.
2. Weaponization
• Creating Malware: Developing a virus, worm, or Trojan horse tailored to the target’s
weaknesses.
• Phishing Kits: Designing fake websites or emails that look legitimate to trick users into
revealing sensitive information.
Example:
3. Delivery
The next step is delivering the weaponized payload to the target. Common delivery methods
include:
• Email Phishing: Sending fraudulent emails that contain malicious attachments or links.
Example:
• Google Docs Phishing Attack (2017): Attackers sent phishing emails that appeared to be
invitations to collaborate on Google Docs. When users clicked the link, they were directed to
a fake Google login page, where their credentials were captured.
4. Exploitation
Once the payload is delivered, attackers exploit vulnerabilities to gain access to the system or
network. This can include:
• Executing Malware: Running the malicious software on the target’s system to create
backdoors or steal data.
Example:
5. Installation
After successfully exploiting the target, attackers install additional malware or tools to
maintain access. This may involve:
• Installing Backdoors: Creating hidden access points that allow attackers to return to the
system.
• Downloading Additional Malware: Pulling in other tools for data exfiltration, monitoring, or
further attacks.
Example:
• APT29 (Cozy Bear): This advanced persistent threat group, believed to be linked to Russian
intelligence, used various techniques to gain access to U.S. government networks, including
installing backdoors to maintain long-term access.
Criminals establish communication with the compromised system to control it remotely. This
may involve:
• C2 Servers: Setting up servers to send commands or receive data from infected machines.
• Using Encrypted Channels: Ensuring communications are secure and difficult to detect.
Example:
• Mirai Botnet: The Mirai botnet used IoT devices to create a massive botnet controlled by C2
servers. Attackers launched DDoS attacks against various targets, exploiting weak credentials
in unsecured devices.
7. Actions on Objectives
Finally, attackers carry out their main objectives, which could include:
• Data Theft: Exfiltrating sensitive data, such as personal information, financial data, or
intellectual property.
• Ransomware Deployment: Encrypting data and demanding ransom payments from victims.
• Disruption: Taking down services or infrastructure, such as launching DDoS attacks to
overwhelm servers.
Example:
8. Covering Tracks
After achieving their goals, attackers often attempt to hide their activities to avoid detection.
This can involve:
• Deleting Logs: Erasing any evidence of their presence or actions on the compromised
systems.
• Using Anonymity Tools: Leveraging proxies or VPNs to obscure their IP addresses and
locations.
Example:
• Sony PlayStation Network Breach (2011): After infiltrating the network, attackers accessed
user data and deleted logs to cover their tracks, making it difficult for investigators to
determine the extent of
The End