Unit 2
Unit 2
Unit 2
Technology is a “double-edged sword” as it can be used for both good and bad purposes.
People with the tendency to cause damages or carrying out illegal activities will use it for
bad purpose.
Computers and tools available in IT are also used as either target of offense.
In today’s world of Internet and computer networks, a criminal activity can be carried out
across national borders.
Chapter 1 provided an overview of hacking, cyberterrorism, network intrusions,
password sniffing, computer viruses, etc. They are the most commonly occurring crimes
that target the computer.
Cybercriminal use the World Wide Web and Internet to an optimum level for all illegal
activities to store data, contacts, account information, etc.
The criminals take advantage of the widespread lack of awareness about cybercrimes and
cyberlaws among the people who are constantly using the IT infrastructure for official
and personal purposes.
People who commit cybercrimes are known as “Crackers” (Box 2.1).
An attacker would look to exploit the vulnerabilities in the networks, most often so because
the networks are not adequately protected.
The categories of vulnerabilities that hackers typically search for are the following:
1. Inadequate border protection (border as in the sense of network periphery);
2. remote access servers (RASs) with weak access controls;
3. application servers with well-known exploits;
4. misconfigured systems and systems with default configurations.
To help the reader understand the network attack scenario, Fig. 2.2 illustrates a small
network highlighting specific occurrences of several vulnerabilities described above.
4
A black hat is also called a “cracker” or “dark side hacker.” Such a person is a malicious or
criminal hacker. Typically, the term “cracker” is used within the security industry. However,
the general public uses the term hacker to refer to the same thing. In computer terminology, the
meaning of “hacker” can be much broader. The name comes from the opposite of “white hat
hackers.”
A white hat hacker is considered an ethical hacker. In the realm of IT, a “white hat hacker”
is a person who is ethically opposed to the abuse of computer systems. It is said that the term is
derived from American western movies, where the protagonist typically wore a white cowboy
hat and the antagonist typically wore a black one. As a simplified explanation, a “white hat”
generally focuses on securing IT systems, whereas a “black hat” (the opposite) would like to
break into them, so this sounds like an age-old game of a thief and a police.
A brown hat hacker is one who thinks before acting or committing a malice or non-malice
deed. A grey hat commonly refers to a hacker who releases information about any exploits or
security holes he/she finds openly to the public. He/she does so without concern for how the
information is used in the end (whether for patching or exploiting).
4. Single event of cybercrime: It is the single event from the perspective of the victim. For
example, unknowingly open an attachment that may contain virus that will infect the
system (PC/laptop). This is known as hacking or fraud.
5. Series of events: This involves attacker interacting with the victims repetitively. For
example, attacker interacts with the victim on the phone and/or via chat rooms to
establish relationship first and then they exploit that relationship to commit the sexual
assault.
5. Going through the job postings in particular job profiles for technical persons can provide
information about type of technology, that is, servers or infrastructure devices a company
maybe using on its network.
1. Fake E-Mails:
The attacker sends fake E-Mails (see Box 2.7) to users in such that the user finds it as a
real e-mail.
This activity is also called “Phishing”.
It is an attempt to attract the Internet users (netizens) to reveal their personal information,
such as usernames, passwords and credit card details by impersonating as a
trustworthy and legitimate organization or an individual.
Banks, financial institutes and payment gateways are the common targets.
Phishing is typically carried out through E-Mails or instant messaging and often directs
users to enter details at a website, usually designed by the attacker with abiding the look
and feel of the original website.
Thus, Phishing is also an example of social engineering techniques used to fool netizens.
The term “Phishing” has been evolved from the analogy that Internet scammers are using
E-Mails attract to fish for passwords and financial data from the sea of Internet users (i.e.,
netizens).
The term was coined in 1996 by hackers who were stealing AOL Internet accounts by
scamming passwords without the knowledge of AOL users.
As hackers have a tendency of replacing “f” with “ph,” the term “Phishing” came into
being.
2. E-Mail attachments:
E-Mail attachments are used to send malicious code to a victim’s system, which will
automatically (e.g., keylogger utility to capture passwords) get executed.
Viruses, Trojans, and worms can be included cleverly into the attachments to entice a
victim to open the attachment.
3. Pop-up windows:
Pop-up windows are also used, in a similar manner to E-Mail attachments. Pop-up
windows with special offers or free stuff can encourage a user to unintentionally install
malicious software.
11
2.4 Cyberstalking
The dictionary meaning of “stalking” is an “act or process of following prey stealthily –
trying to approach somebody or something.”
Cyberstalking has been defined as the use of information and communications technology,
particularly the Internet, by an individual or group of individuals to harass another
individual, group of individuals, or organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft,
damage to data or equipment, solicitation of minors for sexual purposes, and gathering
information for harassment purposes.
Cyberstalking refers to the use of Internet and/or other electronic communications devices to
stalk another person.
It involves harassing or threatening behavior that an individual will conduct
repeatedly, for example, following a person, visiting a person’s home and/or at business
place, making phone calls, leaving written messages, or vandalizing against the person’s
property. As the Internet has become an integral part of our personal and professional lives,
cyberstalkers take advantage of ease of communication and an increased access to personal
information available with a few mouse clicks or keystrokes.
2. Offline stalkers:
The stalker may begin the attack using traditional methods such as following the
victim, watching the daily routine of the victim, etc.
Searching on message boards/newsgroups, personal websites, and people finding
services or websites are most common ways to gather information about the victim
using the Internet.
The victim is not aware that the Internet has been used to perpetuate an attack against
them.
The practice of cyberbullying is not limited to children and, while the behavior is identified by
the same definition in adults, the distinction in age groups is referred to as cyberstalking or
cyberharassment when perpetrated by adults toward adults.[4]
Source: http://en.wikipedia.org/wiki/Cyber-bullying (2 April 2009).
14
down. Not having the AMC is a risk from cybercrime perspective because a cybercriminal
can install a Malicious Code on a computer and conduct criminal activities without any
interruption.
5. Pornographic websites and other similar websites with indecent contents are not blocked.
6. Cybercafe owners have very less awareness about IT Security and IT Governance.
7. Government/ISPs/State Police (cyber cell wing) do not seem to provide IT Governance
guidelines to cybercafe owners.
8. Cybercafe association or State Police (cyber cell wing) do not seem to conduct periodic
visits to cybercafes – one of the cybercafe owners whom we interviewed expressed a view
that the police will not visit a cybercafe unless criminal activity is registered by filing an First
Information Report (FIR). Cybercafe owners feel that police either have a very little
knowledge about the technical aspects involved in cybercrimes and/or about conceptual
understanding of IT security. There are thousands of cybercafes across India.
In the event that a central agency takes up the responsibility for monitoring cybercafes, an
individual should take care while visiting and/or operating from cybercafe.
Here are a few tips for safety and security while using the computer in a cybercafe:
1. Always logout:
2. Stay with the computer:
3. Clear history and temporary fi les:
4. Be alert:
5. Avoid online financial transactions:
6. Change passwords:
7. Use Virtual keyboard:
8. Security warnings:
Botnet is a term used for collection of software robots, or Bots, that run autonomously and
automatically.
The term is often associated with malicious software but can also refer to the network of
computers using distributed computing software.
In simple terms, a Bot is simply an automated computer program One can gain the control of
computer by infecting them with a virus or other Malicious Code that gives the access.
Computer system maybe a part of a Botnet even though it appears to be operating normally.
Botnets are often used to conduct a range of activities, from distributing Spam and viruses to
conducting denial-of-service (DoS) attacks
A Botnet (also called as zombie network) is a network of computers infected with a
malicious program that allows cybercriminals to control the infected machines remotely
without the users’ knowledge.
“Zombie networks” have become a source of income for entire groups of cybercriminals.
16
The invariably low cost of maintaining a Botnet and the ever diminishing degree of
knowledge required to manage one are conducive to the growth in popularity and,
consequently, the number of Botnets.
If someone wants to start a “business” and has no programming skills, there are plenty of
“Bot for sale” offers on forums.
‘encryption of these programs’ code can also be ordered in the same way to protect them
from detection by antivirus tools.
Another option is to steal an existing Botnet. Figure 2.8 explains how Botnets create
business.
One can reduce the chances of becoming part of a Bot by limiting access into the system.
Leaving your Internet connection ON and unprotected is just like leaving the front door of
the house wide open.
One can ensure following to secure the system:
1. Use antivirus and anti-Spyware software and keep it up-to-date:
2. Set the OS to download and install security patches automatically:
3. Use a firewall to protect the system from hacking attacks while it is connected on the
Internet:
A firewall is a software and/or hardware that is designed to block unauthorized access
while permitting authorized communications.
4. Disconnect from the Internet when you are away from your computer:
5. Downloading the freeware only from websites that are known and trustworthy:
6. Check regularly the folders in the mail box – “sent items” or “outgoing” – for those
messages you did not send:
7. Take an immediate action if your system is infected:
The attack vectors described here are how most of them are launched.
1. Attack by E-Mail: The content is either embedded in the message or linked to by the
message. Sometimes attacks combine the two vectors, so that if the message does not get you,
the attachment will. Spam is almost always carrier for scams, fraud, dirty tricks, or malicious
action of some kind. Any link that offers something “free” or tempting is a suspect.
2. Attachments (and other files): Malicious attachments install malicious computer code. The
code could be a virus, Trojan Horse, Spyware, or any other kind of malware. Attachments
attempt to install their payload as soon as you open them.
3. Attack by deception: Deception is aimed at the user/operator as a vulnerable entry point. It is
not just malicious computer code that one needs to monitor. Fraud, scams, and to some extent
Spam, not to mention viruses, worms and such require the unwitting cooperation of the
computer’s operator to succeed. Social engineering are other forms of deception that are often an
attack vector too.
4. Hackers: Hackers/crackers are a formidable attack vector because, unlike ordinary Malicious
Code, people are flexible and they can improvise. Hackers/crackers use a variety of hacking
tools, heuristics, Cyberoffenses: How and social engineering to gain access to computers and
online accounts. They often install a Trojan Horse to commandeer the computer for their own
use.
18
5. Heedless guests (attack by webpage): Counterfeit websites are used to extract personal
information. Such websites look very much like the genuine websites they imitate. One may
think he/she is doing business with someone you trust. However, he/she is really giving their
personal information, like address, credit card number, and expiration date. They are often used
in conjunction with Spam, which gets you there in the first place. Pop-up webpages may install
Spyware, Adware or Trojans.
6. Attack of the worms: Many worms are delivered as E-Mail attachments, but network worms
use holes in network protocols directly. Any remote access service, like file sharing, is likely to
be vulnerable to this sort of worm. In most cases, a firewall will block system worms. Many of
these system worms install Trojan Horses.
7. Malicious macros: Microsoft Word and Microsoft Excel are some of the examples that allow
macros. A macro does something like automating a spreadsheet, for example. Macros can also be
used for malicious purposes. All Internet services like instant messaging, Internet Relay Chart
(IRC), and P2P fi le-sharing networks rely on cozy connections between the computer and the
other computers on the Internet. If one is using P2P software then his/her system is more
vulnerable to hostile exploits.
8. Foistware (sneakware): Foistware is the software that adds hidden components to the
system with cunning nature. Spyware is the most common form of foistware. Foistware is
partial- legal software bundled with some attractive software. Sneak software often hijacks your
browser and diverts you to some “revenue opportunity” that the foistware has set up.
9. Viruses: These are malicious computer codes that hitch a ride and make the payload.
Nowadays, virus vectors include E-Mail attachments, downloaded files, worms, etc.
Box 2.10 | Zero-Day Attack
A zero-day (or zero-hour) attack[17] is a computer threat which attempts to exploit computer
application vulnerabilities that are unknown to anybody in the world (i.e., undisclosed to the
software vendor and software users) and/or for which no patch (i.e., security fi x) is available.
Zero-day exploits are used or shared by attackers before the software vendor knows about the
vulnerability.
Sometimes software vendors discover the vulnerability but developing a patch can take time.
Alternatively, software vendors can also hold releasing the patch reason to avoid the flooding the
customers with numerous individual updates. A “zero-day” attack is launched just on or before
the first or “zeroth” day of vendor awareness, reason being the vendor should not get any
opportunity to communicate/distribute a security fi x to users of such software. If the
vulnerability is not particularly dangerous, software vendors prefer to hold until multiple updates
(i.e., security fi xes commonly known as patches) are collected and then release them together as
a package. Malware writers are able to exploit zero-day vulnerabilities through several different
attack vectors.
Zero-day emergency response team (ZERT): This is a group of software engineers who work
to release non-vendor patches for zero-day exploits. Nevada is attempting to provide support
with the Zeroday Project at www.zerodayproject.com, which purports to provide information on
upcoming attacks and provide support to vulnerable systems. Also visit the weblink
http://www.isotf.org/zert to get more information about it.
19
3. Software-as-a-service (SaaS): It is the broadest market. In this case, the provider allows the
customer only to use its applications. The software interacts with the user through a user
interface. These applications can be anything from Web-based E-Mail to applications such as
Twitter or Last.fm.