---
title: 'Lecture 02 System Security I'
disqus: hackmd
---
Lecture 02 System Security I
===
:::info
ST1004 Infocomm Security
:::
<style>
img{
/* border: 2px solid red; */
margin-left: auto;
margin-right: auto;
width: 80%;
display: block;
}
</style>
## Table of Contents
[TOC]
Malware
---
__Attacks using Malware__
- malicious software (malware)
- enters pc system w/o owner's knowledge/consent
- uses threat vector to deliver malicious "payload" that performs harmful function once invoked
- malware - general term for damaging/annoying software
- can be classified using primary trait of malware
- __circulation__ - spreading rapidly to other systems to impact large number of users
- 2 types have this primary trait
- viruses
- worms
- __infection__ - how it embeds itself into a system
- __concealment__ - avoid detection by concealing presence from scanners
- __payload capabilities__ - what actions malware performs
Circulation Malware
---
### Virus
- __computer virus__ - malicious computer code that reproduces itself on same computer
- __program virus__ - infects exe file
- __macro__ - series of instructions that can be grouped tgt as single command
- common data file is __macro virus__ written in script known as macro
- virus infection method
- __appender infection__ - virus appends itself to end of file
- easily detected by virus scanners
- 
- __armored virus__ - go to great lengths to avoid detection
- armored virus techniques
- __swiss cheese infection__ - inject themselves into exe code
- virus code scrambled to make it more difficult to detect
- 
- __split infection__ - virus splits into several parts
- parts placed at random pos in host program
- parts may contain unnecessary "garbage" to mask true purpose
- 
- __mutation__ - virus may mutate/change
- __oligomorphic virus__ changes internal code to 1 of a set of number of predefined mutations whenever executed
- based on some num they do sth
- __polymorhic virus__ completely changes from original form when executed
- __metamorphic virus__ can rewrite own code & appear diff ea time executed
__What do they do?__
- performs 2 actions
- unloads payload to perform malicious action
- reproduces itself by inserting code into another file on same computer
- Eg. of virus actions
- cause computer to repeatedly crash
- erase files from/reformat hard drive
- turn of computer's security settings
- viruses cannot auto spread to another computer
- relies on user action to spread
- attached to files
- spread by transferring infected files
### Worms
- worm - malicious program that uses computer network to replicate
- sends copies of itself to other network devices
- worms may
- consume resources
- leave behind payload to harm infected systems
- Eg. actions
- deleting computer files
- allowing remote control of computer by attacker

Infection Malware
---
### Trojan
- trojan - exe program that does sth other than advertised
- contain hidden code that launches attack
- sometimes made to appear as data file
- Eg
- user downloads "free calendar program"
- program scans system for credit card numbers & passwords
- transmit info to attacker through network
- special type of trojan
- __Remote Access Trojan (RAT)__ - gives threat actor unauthorised remote access to victim's computer by specially configured comm protocols
### Ransomware
- ransomware - prevents user's device from properly operating until fee paid
- highly profitable
- variation of ransomware displays a fictitious warning that software license expired or there's problem & users must purchase additional software online to fix problem
### Crypto-Malware
- crypto-malware - more malicious form of ransomware where threat actors encrypt all files on device so none can be opened
- once infected,
- software connects to threat actors __command & control (C&C)__ server to receive instructed/updated data
- locking key generated for encrypted files & key is encrypted with another key downloaded from the C&C
- 2nd key sent to victims once they pay ransom
Concealment Malware
---
### Rootkits
- rootkit - software tools used by attacker to hide actions/presence of other types of malicious software
- hide/remove traces of log-in records, log entries
- may alter/replace OS files with modified versions specifically designed to ignore malicious activity
- users can't trust computer that contains rootkit
- rootkit in charge & hides what's occuring in computer

Payload Capabilities
---
- destructive power of malware found in its payload capabilities
### Collect Data
- collect important data from target
- type of malwares
- __spyware__ - gathers info w/o user consent
- uses pc resources for collecting & distributing personal/sensitive
- can be hardware device/software program
- hardware device inserted into pc
- software installed on pc & silently capture
- advantage - don't need physical access to user's computer
- often installed as trojan/virus, can send captured info back to attacker via internet
- __keylogger__ - captures & stores ea keystroke user types on pc keyboard
- attacker searches captured text for useful info (Eg. passwords, etc)
- 
- 
- __adware__ - program that delivers ad content unexpectedly & unwantedly
- typically displays ad banners & pop-up ads
- may open random new browser windows
- disapproved as
- can display objectionable content
- frequent popup ads can interfere with productivity
- popups can slow computer/cause crashes/loss of data
- unwanted ads are nuisance
### Delete Data
- payload deletes data on pc
- types of malware
- __logic bomb__ - program that lies dormant until triggered by specific logic event
- difficult to detect before triggered
- often embedded in large computer programs that's not routinely scanned
### Modify System Security
- __backdoor__ - give access to pc, program or service that circumvents normal security to give program access
- when installed, they allow computer to return at later time & bypass security settings
### Launch Attacks
- __bot/zombie__ - infected computer under remote control of attacker
- groups of zombie computers gathered into logical computer network called __botnet__ under control of attacker __(bot herder)__
- infected zombie computers wait for instructions through __command & control (C&C)__ structure from bot herders
- common C&C mechanism used today is HTTP - more difficult to detect & block
- 
Social Engineering Attacks
---
- social engineering - means of gathering info for attack by relying on weakness of individuals
- can involve psychological approaches/physical procedures
### Psychological Approaches
- goal - persuade victim to provide info/take action
- attackers use variety of techniques to gain trust w/o moving quickly
- provide reason
- project confidence
- use evasion & diversion
- make them laugh
- often involve
- impersonation, phishing, spam, hoaxes & watering hole attacks
__Impersonation__
- attacker pretends to be someone else
- often impersonate person with authority as victims generally resist saying "no" to anyone in power
__Phishing__
- sending email claiming to be from legit source
- tries to trick user into giving private info
- emails & fake websites difficult to distinguish from those that are legit
- variations on phishing attacks
- __spear phishing__ - targets specific users
- __whaling__ - targets "big fish"
- __vishing__ - use call instead of emails
- about 97% of all attacks start with phishing
__Spam__
- unsolicited email
- primary vehicles for distribution of malwares
- sending spam is a lucrative business
- costs spammers very little to send millions of spam messages
- filters look for specific words & block email
- __image spam__ - use graphical images of text to circumvent text-based filters
- often contains nonsense text so appears legit
__Hoaxes__
- false warninng, usually claiming to come from IT department
- attackers try to get victims to change config settings on their pc that will allow attacker to compromise system
- attackers may also provide telephone number for victim to call for help, which will put them in direct contact with attacker
__Watering Hole Attack__
- malicious attack directed towards small group of specific individuals who visit same website
- Eg.
- major executives working for manufacturing company may visit common website, such as parts supplier to manufacturer
### Physical Procedures
__Dumpster Diving__
- digging through trash for useful info
- electronic variation - google search for documents & data online
- called __google dorking__
__Tailgating__
- follow behind authorised individual through access door
- employee could conspire with unauthorised person to allow him to walk in with him (called __piggybacking__)
- watching authorised user enter security code on keypad - __shoulder surfing__
Chapter Summary
---


###### tags: `ISEC` `DISM` `School` `Notes`