Cyber Attacks Flashcards
(42 cards)
What are 4 possible victims of Money Theft?
End Users, Enterprises, Financial Institutions, New Trends
What sort of virus is Zeus?
Banking Trojan Horse
Which of the possibe victims is Zeus used on?
End Users
What OS does Zeus target?
Windows
What is Zeus’ attack method?
Man-in-the-browser attack
What does Zeus infect in Man-in-the-browser attack?
Infected browser with Malware
Zeus infects browser with Malware. What does it gain from doing this?
You type in unencrypted information into your browser. Infecting the browser means Zeus can now access this information.
What do attackers want to achieve via Zeus attack?
Capture Credentials
Having done Man-in-the-browser, what 2 things do attackers use to gather credentials?
Keylogging, Form Grabbing
What does BEC stand for?
Business Email Compromise
What happens in a BEC attack?
Pretend to be a CEO/Senior Manager, request large sum of money
What is BEC reliant on?
That the vicitm (employee) and the person being impersonated are not together
What two things can be created in BEC?
Spoofed emails, hijacked legitimate invoices with scammer’s account number
What 2 aspects of cryptocurrency can be hacked for money?
Wallets, Exchanges
What happens in Personal Document Ransom?
Ransomware encrypts specific files
What are 2 ways ransomeware can be spread?
Phishing email (macro on attachment downloads and executes payload)
How does decryption happen after a Personal Document Ransom attack?
Victim pays the ransom or a security firms releases a decryptor
How did WannaCry spread?
As a worm, infects local network and random machines on the Internet
What allowed WannaCry to execute ransomware?
EternalBlue exploit
What is are the three levels of Personal Document Ransom?
Original, Double Extortion, Triple Extortion
What happens in the Original Extortion?
Enrypt the data
What happens in Double Extortion?
Exfiltrate data and threaten to disclose in ransom not paid quickly
What happens in Triple Extortion?
Threaten to leak data unless paid
What may randomware groups also search for?
Local servers that contain data backups, and delete/encrypt these