CISCO
CISCO
Mute
Current Time
0:15
/
Duration
0:36
1x
Playback Rate
Captions
Picture-in-Picture
Fullscreen
SkipView transcript
Describer: A computer screen displaying @Apollo’s website. A flashing red siren
appears on the top of the monitor and a skull and crossbones on the webpage.
Describer: Six red triangles with exclamation marks pop up around the skull and
crossbones on @Apollo’s website.
Describer: A hooded hacker character, working at a laptop with skull and crossbones
on the front, enters the bottom of the screen. Thought bubbles appear around the
hacker character’s head. They contain three icons; a magnifying glass with an
exclamation mark icon, an eye icon with a line through it and a horizontal bar
chart icon.
Narrator: We need you to investigate the different ways that hackers try to
infiltrate an organization…
Describer: The three thought bubbles merge into one with a locked padlock icon. The
video zooms into the padlock icon which moves to full and center screen.
Narrator: ...so that we can do everything we can to stop them from getting through.
Describer: The padlock opens and spins, transforming into a stop clock. The hand on
the clock face starts ticking.
Describer: The screen scrolls down to reveal a knowledge check activity from Module
2, entitled ‘Wi-Fi Password Cracking.’ A cursor clicks on the correct answer, then
the ‘Submit’ button. The broken, red defender shield pops up, then changes to the
shiny, blue shield that appears when all of the knowledge check questions have been
answered correctly.
Narrator: Answer the questions correctly as you work through and help build our
defenses.
The health gauge reflects your performance during the course You now have 0% health
2.1 Analyzing a Cyber Attack
Scroll to begin
Select the headings to find out more about some of the most common malware.
Spyware
Designed to track and spy on you, spyware monitors your online activity and can log
every key you press on your keyboard, as well as capture almost any of your data,
including sensitive personal information such as your online banking details.
Spyware does this by modifying the security settings on your devices.
Adware
Adware is often installed with some versions of software and is designed to
automatically deliver advertisements to a user, most often on a web browser. You
know it when you see it! It’s hard to ignore when you’re faced with constant pop-up
ads on your screen.
Backdoor
This type of malware is used to gain unauthorized access by bypassing the normal
authentication procedures to access a system. As a result, hackers can gain remote
access to resources within an application and issue remote system commands.
Ransomware
This malware is designed to hold a computer system or the data it contains captive
until a payment is made. Ransomware usually works by encrypting your data so that
you can’t access it.
Scareware
This is a type of malware that uses 'scare’ tactics to trick you into taking a
specific action. Scareware mainly consists of operating system style windows that
pop up to warn you that your system is at risk and needs to run a specific program
for it to return to normal operation.
If you agree to execute the specific program, your system will become infected with
malware.
Rootkit
This malware is designed to modify the operating system to create a backdoor, which
attackers can then use to access your computer remotely. Most rootkits take
advantage of software vulnerabilities to gain access to resources that normally
shouldn’t be accessible (privilege escalation) and modify system files.
Rootkits can also modify system forensics and monitoring tools, making them very
hard to detect. In most cases, a computer infected by a rootkit has to be wiped and
any required software reinstalled.
Virus
A virus is a type of computer program that, when executed, replicates and attaches
itself to other executable files, such as a document, by inserting its own code.
Most viruses require end-user interaction to initiate activation and can be written
to act on a specific date or time.
Viruses can be relatively harmless, such as those that display a funny image. Or
they can be destructive, such as those that modify or delete data.
Viruses can also be programmed to mutate in order to avoid detection. Most viruses
are spread by USB drives, optical disks, network shares or email.
Trojan horse
This malware carries out malicious operations by masking its true intent. It might
appear legitimate but is, in fact, very dangerous. Trojans exploit your user
privileges and are most often found in image files, audio files or games.
Unlike viruses, Trojans do not self-replicate but act as a decoy to sneak malicious
software past unsuspecting users.
Worms
This is a type of malware that replicates itself in order to spread from one
computer to another. Unlike a virus, which requires a host program to run, worms
can run by themselves. Other than the initial infection of the host, they do not
require user participation and can spread very quickly over the network.
Worms share similar patterns: They exploit system vulnerabilities, they have a way
to propagate themselves, and they all contain malicious code (payload) to cause
damage to computer systems or networks.
Worms are responsible for some of the most devastating attacks on the Internet. In
2001, the Code Red worm had infected over 300,000 servers in just 19 hours.
An laptop with a face and a thermometer in its mouth, with various colored viruses
around it
Regardless of the type of malware a system has been infected with, there are some
common symptoms to look out for. These include:
an increase in central processing unit (CPU) usage, which slows down your device
your computer freezing or crashing often
a decrease in your web browsing speed
unexplainable problems with your network connections
modified or deleted files
the presence of unknown files, programs or desktop icons
unknown processes running
programs turning off or reconfiguring themselves
emails being sent without your knowledge or consent.
Guru
This is exactly what could be happening at @Apollo!
Based on what you now know, do you think you could spot the different types of
malware from their descriptions?
Let’s see!
Malware designed to track your online activity and capture your data
Hardware vulnerabilities are most often the result of hardware design flaws. For
example, the type of memory called RAM basically consists of lots of capacitors (a
component which can hold an electrical charge) installed very close to one another.
However, it was soon discovered that, due to their close proximity, changes applied
to one of these capacitors could influence neighbor capacitors. Based on this
design flaw, an exploit called Rowhammer was created. By repeatedly accessing
(hammering) a row of memory, the Rowhammer exploit triggers electrical
interferences that eventually corrupt the data stored inside the RAM.
Attackers exploiting these vulnerabilities can read all memory from a given system
(Meltdown), as well as data handled by other applications (Spectre). The Meltdown
and Spectre vulnerability exploitations are referred to as side-channel attacks
(information is gained from the implementation of a computer system). They have the
ability to compromise large amounts of memory data because the attacks can be run
multiple times on a system with very little possibility of a crash or other error.
Hardware vulnerabilities are specific to device models and are not generally
exploited through random compromising attempts. While hardware exploits are more
common in highly targeted attacks, traditional malware protection and good physical
security are sufficient protection for the everyday user.
This vulnerability was introduced into the system when an altered IOS version was
installed on the routers. To avoid this, you should always verify the integrity of
the downloaded IOS image and limit the physical access of such equipment to
authorized personnel only.
Buffer overflow
Buffers are memory areas allocated to an application. A vulnerability occurs when
data is written beyond the limits of a buffer. By changing data beyond the
boundaries of a buffer, the application can access memory allocated to other
processes. This can lead to a system crash or data compromise, or provide
escalation of privileges.
Non-validated input
Programs often require data input, but this incoming data could have malicious
content, designed to force the program to behave in an unintended way.
For example, consider a program that receives an image for processing. A malicious
user could craft an image file with invalid image dimensions. The maliciously
crafted dimensions could force the program to allocate buffers of incorrect and
unexpected sizes.
Race Conditions
This vulnerability describes a situation where the output of an event depends on
ordered or timed outputs. A race condition becomes a source of vulnerability when
the required ordered or timed events do not occur in the correct order or at the
proper time.
Nearly all access controls and security practices can be overcome if an attacker
has physical access to target equipment. For example, no matter the permission
settings on a file, a hacker can bypass the operating system and read the data
directly off the disk. Therefore, to protect the machine and the data it contains,
physical access must be restricted, and encryption techniques must be used to
protect data from being stolen or corrupted.
Despite the fact that organizations put a lot of effort into finding and patching
software vulnerabilities, new vulnerabilities are discovered regularly. That’s why
some organizations use third party security researchers who specialize in finding
vulnerabilities in software, or actually invest in their own penetration testing
teams dedicated to search, find and patch software vulnerabilities before they can
get exploited.
This has made you think about some of the vulnerabilities that may exist at
@Apollo. After some investigation you’ve noted some potential issues.
Can you identify what category each of these vulnerabilities falls into? You have a
chance to earn some defender points here and further safeguard @Apollo, so take
your time.
2.4.1 Cryptocurrency
Cryptocurrency is digital money that can be used to buy goods and services, using
strong encryption techniques to secure online transactions. Banks, governments and
even companies like Microsoft and AT&T are very aware of its importance and are
jumping on the cryptocurrency bandwagon!
These transactions are then verified through a technical and highly complex process
known as ‘mining.’ This step typically involves an army of ‘miners’ working on
high-end PCs to solve mathematical puzzles and authenticate transactions.
Once verified, the ledger is updated and electronically copied and disseminated
worldwide to anyone belonging to the blockchain network, effectively completing a
transaction.
2.4.2 Cryptojacking
Many victims of cryptojacking didn’t even know they’d been hacked until it was too
late!
Show feedback
Complete Next Up...Next Up...
There are many different malware types that pose a threat to your organization but
how can cybercriminals get into your networks and systems in the first place? They
have many means at their disposal.
Select the arrows to find out more about some common types of social engineering
attacks.
Pretexting
This is when an attacker calls an individual and lies to them in an attempt to gain
access to privileged data.
Tailgating
This is when an attacker quickly follows an authorized person into a secure,
physical location.
2.2.2 Denial-of-Service
This component is a flipcard comprised of flippable cards containing display image.
Select the front face image to flip to the back face of these card to display
associated text.
Denial-of-Service (DoS) attacks are a type of network attack that is relatively
simple to carry out, even by an unskilled attacker. A DoS attack results in some
sort of interruption of network service to users, devices or applications.
Select the images to find out more about the two main types of DoS attacks.
s of DoS attacks.
2.2.4 Botnet
A bot computer is typically infected by visiting an unsafe website or opening an
infected email attachment or infected media file. A botnet is a group of bots,
connected through the Internet, that can be controlled by a malicious individual or
group. It can have tens of thousands, or even hundreds of thousands, of bots that
are typically controlled through a command and control server.
These bots can be activated to distribute malware, launch DDoS attacks, distribute
spam email, or execute brute-force password attacks. Cybercriminals will often rent
out botnets to third parties for nefarious purposes.
Many organizations. like Cisco, force network activities through botnet traffic
filters to identify any botnet locations.
Infected bots try to communicate with a command and control host on the Internet.
The Cisco Firewall botnet filter is a feature that detects traffic coming from
devices infected with the malicious botnet code.
The cloud-based Cisco Security Intelligence Operations (SIO) service pushes down
updated filters to the firewall that match traffic from new known botnets.
Alerts go out to Cisco’s internal security team to notify them about the infected
devices that are generating malicious traffic so that they can prevent, mitigate
and remedy these.
A MitM attack happens when a cybercriminal takes control of a device without the
user’s knowledge. With this level of access, an attacker can intercept and capture
user information before it is sent to its intended destination. These types of
attacks are often used to steal financial information.
There are many types of malware that possess MitM attack capabilities.
An attacker builds a network (botnet) of infected hosts called zombies, which are
controlled by handler systems.
The zombie computers will constantly scan and infect more hosts, creating more and
more zombies.
When ready, the hacker will instruct the handler systems to make the botnet of
zombies carry out a DDoS attack.
You’ve probably heard of search engine optimization or SEO which, in simple terms,
is about improving an organization’s website so that it gains greater visibility in
search engine results.
Search engines such as Google work by presenting a list of web pages to users based
on their search query. These web pages are ranked according to the relevancy of
their content.
The most common goal of SEO poisoning is to increase traffic to malicious sites
that may host malware or attempt social engineering.
You’re enjoying your lunch in the canteen when a colleague approaches you. They
seem distressed.
They explain that they can’t seem to connect to the public Wi-Fi on their phone and
ask if you have the private Wi-Fi password to hand so that they can check that
their phone is working.
Entering a username and password is one of the most popular forms of authenticating
to a web site. Therefore, uncovering your password is an easy way for
cybercriminals to gain access to your most valuable information.
Password Spraying
This technique attempts to gain access to a system by ‘spraying’ a few commonly
used passwords across a large number of accounts. For example, a cybercriminal uses
'Password123' with many usernames before trying again with a second commonly-used
password, such as ‘qwerty.’
This technique allows the perpetrator to remain undetected as they avoid frequent
account lockouts.
Dictionary Attacks
A hacker systematically tries every word in a dictionary or a list of commonly used
words as a password in an attempt to break into a password-protected account.
Brute-Force Attacks
The simplest and most commonly used way of gaining access to a password-protected
site, brute-force attacks see an attacker using all possible combinations of
letters, numbers and symbols in the password space until they get it right.
Rainbow attacks
Passwords in a computer system are not stored as plain text, but as hashed values
(numerical values that uniquely identify data). A rainbow table is a large
dictionary of precomputed hashes and the passwords from which they were calculated.
Unlike a brute-force attack that has to calculate each hash, a rainbow attack
compares the hash of a password with those stored in the rainbow table. When an
attacker finds a match, they identify the password used to create the hash.
Traffic Interception
Plain text or unencrypted passwords can be easily read by other humans and machines
by intercepting communications.
If you store a password in clear, readable text, anyone who has access to your
account or device, whether authorized or unauthorized, can read it.
It looks as if the hackers are trying everything to crack @Apollo’s private Wi-Fi
password. We have to make sure that the password is strong enough to withstand
their attack!
Take a look at the following passwords. Click the numbers to put them in the
correct order according to how long you think it would take an attacker to crack
each one using brute-force, where 1 is the shortest amount of time and 4, the
highest.
Due to the complexity and the skill level required to carry out such an attack, an
APT is usually well-funded and typically targets organizations or nations for
business or political reasons.
Its main purpose is to deploy customized malware on one or more of the target’s
systems and remain there undetected.
Phew! That’s a lot to take in and hackers certainly have a lot of tools at their
disposal. It is important that you know what these are so that you can protect
yourself and @Apollo.
You think back to some of the suspicious activities that you’ve seen recently in
the organization. Based on what you have learned in this topic, what type of attack
could each of these scenarios be? Take your time with this one. You have a chance
to earn some much-needed defender points.