Mod 333
Mod 333
1
2
Phishing
3
4
Phishing - Types
●Email Phishing
● Also called “deception phishing”
●HTTPS Phishing
●Spear Phishing
●Whaling/CEO fraud
●Vishing
●Smishing
●Angler Phishing
●Pharming
●Pop-up Phishing
● newer version of pop-up phishing uses the web browser’s “notifications” feature
●Clone Phishing
●Evil Twin-(fake wifi network)
●Watering hole Phishing
5
Phishing - Types
● Email Phishing
● Also called “deception phishing”
Phishing is a type of online
scam that targets consumers
by sending them an e-mail that
appears to be from a well-
known source – an internet
service provider, a bank, or a
mortgage company, for
example.
6
As an example, the scenario usually plays out as follows:
An individual receives an email from his or her bank (for example, Chase).
The email appears to be sent from Chase, with the Chase logo embedded in the
email.
The email explains how there is an urgent issue with the individual's account,
instructing her to click on a link to address the matter right now.
Once the individual clicks on the link, she is brought to a webpage which mimics
that of Chase.
Unknowingly, the individual enters her username and password to enter the
website.
7
Phishing - Types
●Email Phishing
● Also called “deception phishing”
8
Phishing - Types
9
Phishing - Types
●Spear Phishing
10
11
12
Phishing - Types
● Whaling (CEO Fraud) :-A whaling attack is a type of phishing attack that targets high-level
executives, such as the CEO or CFO, to steal sensitive information from a company
13
14
Phishing - Types
● Vishing:- Vishing (voice or VoIP phishing) is a type of cyber attack that uses voice and
telephony technologies to trick targeted individuals into revealing sensitive data to
unauthorized entities.
15
Phishing - Types
16
Phishing - Types
● Angler Phishing:-Angler phishing is a type of phishing attack that targets social media users.
17
Phishing - Types
●Pharming:-Pharming is online fraud that involves the use of malicious code to direct victims
to spoofed websites in an attempt to steal their credentials and data.
18
Phishing - Types
●Pop-up Phishing:-Pop-up phishing is a scam in which pop-up ads trick users into installing
malware on their computers or convince them to purchase antivirus protection they don't
need. These pop-up ads sometimes use scare tactics.
19
Phishing - Types
20
Phishing - Types
21
Phishing - Types
●Watering Hole Phishing:-A watering hole attack is a form of cyberattack that targets groups
of users by infecting websites that they commonly visit
22
Real-Life Examples of Angler Phishing Attacks
Angler phishing attacks often surge during tax season, with cybercriminals impersonating tax authorities or
financial institutions. Victims may receive emails claiming issues with their tax returns and prompting them
to click on malicious links.
Cybercriminals may impersonate company executives in Angler Phishing attacks targeting finance
departments. The attackers request urgent payments or financial transactions, leading to unauthorized fund
transfers.
Angler Phishing attacks have exploited global events, such as the COVID-19 pandemic. Cybercriminals send
emails claiming to provide pandemic-related information, tricking users into clicking on malicious links and
revealing login credentials.
23
24
Phishing - Satistics
25
Phishing - Satistics
26
Phishing - Satistics
27
Phishing - Satistics
28
29
Phishing - Satistics
30
Phishing - Satistics
31
Phishing - Satistics
35
Password Cracking - Password Strength
36
Password Cracking - Password Strength
37
Password Cracking - Techniques
●Social Engineering
● Successful social engineering attacks can be incredibly convincing and
highly lucrative
● The CEO of a UK-based energy company lost £201,000 to hackers after
they tricked him with an AI tool that mimicked his assistant’s voice.
●Phishing
● Tricks the user into entering their login credentials into a bogus site
●Spidering
● Describes the process of a hacker getting to know their target, to the
extent that they’re able to get credentials based on their activity.
● Many organizations use passwords that relate to their business which
Hackers are able to study in order to build a list of possible word
combinations
39
Password Cracking - Techniques
●Malware
● Keyloggers, screen scrapers, and a host of other malicious tools
●Network analyzers
● Hackers monitors and intercept data packets sent over a network and lift
the plain text passwords contained within
●Shoulder surfing
● Look over the shoulders of employees or grab sensitive documents with
potential passwords.
●Guessing
● If all else fails, a hacker can always try and guess your password.
40
Password Cracking - Tools
42
RainbowCrack is a computer program which generates rainbow tables to be
used in password cracking.
RainbowCrack differs from "conventional" brute force crackers in that it uses
large pre-computed tables called rainbow tables to reduce the length of time
needed to crack a password drastically.
A rainbow table is a database containing precomputed hashed outputs for
various passwords, utilizing a time/memory tradeoff to efficiently store and
retrieve password/hash combinations.
43
Start with password strength. Follow a few rules:
Do make your password long. Aim for about eight characters, if not more.
Don't use common passwords like "password" or "1,2,3,4."
Do use special characters like $ and * to replace recognizable letters.
Don't make your password so complicated that you'll never remember it.
Do get creative and innovative when you write.
Don't include details, like your pet's name or your address, that people can
discover on social media.
44
45
What does this mean?
46
47
Key Logger
48
Key Logger
●As such programs are extensively used by cyber criminals, detecting them is a
priority for antivirus companies.
●Kaspersky Lab’s malware classification system has a dedicated category for
malicious programs with keylogging functionality: Trojan-Spy.
● Trojan-Spy programs, as the name suggests, track user activity, save the
information to the user’s hard disk and then forward it to the author or
‘master’ of the Trojan.
● The information collected includes keystrokes and
screen-shots, used in the theft of banking data to
support online fraud.
49
50
Types of Key Loggers
●Software Keyloggers
● programs that plan to monitor your PC’s working framework.
● Allow access to locally recorded data from a remote location.
● This communication can happen by using one of the following methods:
● Uploading data to a website, database or FTP server.
● Periodically emailing data to a predefined email address.
● Wirelessly transmitting data through an attached hardware
● Software enabling remote login to your local machine.
51
Types of Key Loggers
●Software Keyloggers
● Additional features include:
● Clipboard logging
Anything that can be copied to the clipboard is captured.
● Screen logging
Randomly timed screenshots of your screen are logged.
● Activity tracking
Recording of which folders, programs and windows are opened and
also possibly screenshots of each.
● Recording
Recording of search engine queries, instant message conversations,
FTP downloads along with any other internet activities.
52
Types of Key Loggers
●Hardware Keyloggers
● Keyboard hardware
● Piece of hardware inserted somewhere between the
computer keyboard and the computer, typically along the keyboard's
cable connection.
● Wireless keyboard sniffers
● Signals sent from a wireless keyboard is intercepted
● Keyboard overlays
● Popular in ATM theft cases where thieves capture user's PIN number
53
Types of Key Loggers
●Acoustics Keyloggers
● Acoustic keylogger monitors the sound created by each individual keystroke
● Uses the subtly different acoustic signature that each key emits to analyze
and determine what the target computer’s user is typing.
54
Key Logger - Mitigation
55
Individuals can use a firewall to help protect against a keylogger. Since
keyloggers transmit data back and forth from the victim to the attacker, the
firewall could discover and prevent that data transfer.
Password managers that automatically fill in username and password fields may
also help protect against keyloggers. Monitoring software and antivirus
software can also keep track of a system's health and prevent keyloggers.
System cages that prevent access to or tampering with usb and ps/2 ports can
be added to the user's desktop setup. Extra precautions include using a
security token as part of two-factor authentication (2FA) to ensure an
attacker cannot use a stolen password alone to log in to a user's account, or
using an onscreen keyboard and voice-to-text software to circumvent using a
physical keyboard.
Application allow listing can also be used to allow only documented, authorized
programs to run on a system. It is also always a good idea to keep any
system up to date. 56
57
58
59
Spyware
60
Types of Spyware
●Adware. This type of spyware tracks your browser history and downloads, with the intent of
predicting what products or services you’re interested in. The adware will display
advertisements for the same or related products or services to entice you to click or make a
purchase.
●Trojan. This kind of malicious software disguises itself as legitimate software. For example,
Trojans may appear to be a Java or Flash Player update upon download. Trojan malware is
controlled by third parties. It can be used to access sensitive information such as Social
Security numbers and credit card information.
●Tracking cookies. These track the user’s web activities, such as searches, history, and
downloads, for marketing purposes.
●System monitors. This type of spyware can capture just about everything you do on your
computer. System monitors can record all keystrokes, emails, chat-room dialogs, websites
visited, and programs run. System monitors are often disguised as freeware.
61
Spyware Infecting Techniques
●Security vulnerabilities
●Phishing and spoofing
●Misleading marketing
●Software bundles
●Trojans
●Mobile device spyware
62
Spyware Infecting Techniques
●Whatever way spyware manages to get on your PC, the method of operation is
generally the same
●It runs quietly in the background, maintaining a secret presence, collecting
information or monitoring your activities in order to trigger malicious activities
related to your computer and how you use it.
●And even if you discover its unwelcome presence on your system, Spyware does
not come with an easy uninstall feature.
63
Top 11 Spyware
●Pegasus
●CoolWebSearch
●Bzub
●Trojan.Gen
●Trojan Agent.Gen
●2nd Thought
●Zlob
●Trojan Ace X
●MatCash
●Areses
●Trojan Poolsy:
64
Top 10 Spyware Mitigating tools
65
Spyware Mitigating Techniques
●The best defense against spyware, as with most malware, starts with your
behavior.
●Follow these basics of good cyber self-defense.
● Keep your antivirus running in the background with web security and
periodic scan enabled
● Don’t open emails from unknown senders.
● Don’t download files unless they come from a trusted source.
● Enable the firewall.
● Mouse-over links before clicking on them and make sure you’re being sent
to the right webpage.
● Do not click of pop-ups on that redirect you to a random website
● Use a reputable cybersecurity program to counter advanced spyware.
66
67
Virus
68
Virus
69
Virus
70
Types of Virus
●Overwrite Virus
●Append Virus
●Macro Virus
●Boot Virus
●Resident Virus
●Multipartite Virus
●Polymorphic Virus
●Rabbit Virus ●CMOS Virus
●File Infector Virus ●Companion Virus
●Trojan Horse ●Encrypted Virus
●Cavity virus ●Executable Virus
●Stealth Virus
71
Symptoms of Virus
72
Virus - Mitigation
73
Worms
74
Worms - History
●The first Internet infection that required no human intervention to propagate was
the Morris Worm, discovered in 1988 and released by Robert Morris.
● used multiple exploits including buffer overflows, debugging routines in
mail components, password sniffing, and other streams of execution to
improve its ability to attack other computers.
●Modern Worms: Code Red
● exploited a buffer flow condition in the Microsoft IIS (Internet Information
Server).
● It was able to propagate quickly because of the "always on" nature of IIS
and many versions of the Windows operating system.
● Code Red was also equipped with scanning capabilities that improved its
throughput and gave it the ability to elude numerous IP address security
features.
75
Worms
●Email Worms
●Instant Messaging worms
●Internet Worms
●Internet Relay Chat worms
●File sharing worms
76
Worms
●If you suspect your devices are infected with a computer worm, run a virus scan
immediately.
●Even if the scan comes up negative, continue to be proactive by following these
steps.
● Keep an eye on your hard drive space
● Monitor speed and performance
● Be on the lookout for missing or new files
77
Virus vs Worms
78
Which is more dangerous?
79
Module 3
Tools and Methods Used in Cybercrime
[06 hours]
15-20 marks
80
81
Steganography
Steganos
Graph
Used to conceal the message inside another larger
message
82
Steganography
●It is a form of covert communication and can involve the use of any medium to
hide messages.
●It’s not a form of cryptography, because it doesn’t involve scrambling data or
using a key.
●Where cryptography is a science that largely enables privacy, steganography is a
practice that enables secrecy – and deceit.
83
STEGANOGRAPHY CRYPTOGRAPHY
Failure Once the presence of a secret message If you possess the decryption
is discovered, anyone can use the secret key, then you can figure out
data original message from the
ciphertext
84
Steganography
Plain text
Cover text
Stego text
85
Steganography
Plain text
Cipher text
Cover text
Stego text
86
Steganography
87
Steganography
88
Steganography Techniques
Video Steganography
Image Steganography
Text Steganography Network Steganography
Audio Steganography
89
Steganography Techniques
Text Steganography
Hiding information inside the text files
Changing format of existing text, changing words within a text,
generating random character sequences or using context-free
grammars to generate readable texts.
90
Steganography Techniques
Image Steganography
● Least Significant Bit Insertion
91
Steganography Techniques
Image Steganography
● Least Significant Bit Insertion
● Masking and Filtering
92
Steganography Techniques
Image Steganography
● Least Significant Bit Insertion
● Masking and Filtering
● Redundant Pattern Encoding
93
Steganography Techniques
Image Steganography
● Least Significant Bit Insertion
● Masking and Filtering
● Redundant Pattern Encoding
94
Steganography Techniques
Image Steganography
● Least Significant Bit Insertion
● Masking and Filtering
● Redundant Pattern Encoding
95
Steganography Techniques
96
Steganography Techniques
97
Steganography Techniques
98
Steganography Techniques
99
Steganography Techniques
Network Steganography
100
Steganography Techniques
Network Steganography
Packet Modification
101
Steganography Tools
•Stegosuite
Free steganography tool which is written in Java. With Stegosuite you can easily hide
confidential information in image files.
•Steghide
Open source Steganography software that lets you hide a secret file in image or audio file.
•Xiao Steganography
Free software that can be used to hide data in BMP images or in WAV files.
•SSuite Picsel
Free portable application to hide text inside an image file but it takes a different approach
when compared to other tools.
•OpenPuff
Professional steganographic tool where you can store files in image, audio, video or flash
files
102
Steganography and Cybercrime
103
Steganography and Cybercrime
● Now that encryption is relatively easy to detect, saboteurs increasingly hide their
malevolence in plain sight—embedded in banner ads, text messages, or images. This is
steganography, and it’s described as the digital equivalent of invisible ink.
● Detecting the hidden data is like finding a needle in a haystack. The technique makes it
easy for criminals to transmit data-stealing malware.
● The threat is so serious that researchers formed a Criminal Use of Information Hiding
(CUIng) Initiative, gathering experts from all over the world to learn ways to detect and
disable information-hiding activity.
● “A recent trend involves exploiting various information-hiding techniques to empower
malware—for example, to bypass mobile device security frameworks or to exfiltrate
sensitive data,” say the CUIng researchers and authors of “The New Threats of
Information Hiding: The Road Ahead. ”
104
Steganography and Cybercrime
105
Steganography and Cybercrime
“Such a stealth method makes it harder for security products to detect and protect
against the threats that use them. Antivirus products do not usually scan for non-
executable file headers (such as sound files, images)”
106
Summary:
●Phishing, Password Cracking, Key loggers and Spywares,
●Virus and Worms, Steganography
107