Cyber Attacks #1 Flashcards

(14 cards)

1
Q

What are 4 possible victims of Money Theft?

A

End Users, Enterprises, Financial Institutions, New Trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What sort of virus is Zeus?

A

Banking Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the possibe victims is Zeus used on?

A

End Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What OS does Zeus target?

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Zeus’ attack method?

A

Man-in-the-browser attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Zeus infect in Man-in-the-browser attack?

A

Infected browser with Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zeus infects browser with Malware. What does it gain from doing this?

A

You type in unencrypted information into your browser. Infecting the browser means Zeus can now access this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do attackers want to achieve via Zeus attack?

A

Capture Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Having done Man-in-the-browser, what 2 things do attackers use to gather credentials?

A

Keylogging, Form Grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does BEC stand for?

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in a BEC attack?

A

Pretend to be a CEO/Senior Manager, request large sum of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is BEC reliant on?

A

That the vicitm (employee) and the person being impersonated are not together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What two things can be created in BEC?

A

Spoofed emails, hijacked legitimate invoices with scammer’s account number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 2 aspects of cryptocurrency can be hacked for money?

A

Wallets, Exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly