Cyber Attacks Flashcards

(42 cards)

1
Q

What are 4 possible victims of Money Theft?

A

End Users, Enterprises, Financial Institutions, New Trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What sort of virus is Zeus?

A

Banking Trojan Horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the possibe victims is Zeus used on?

A

End Users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What OS does Zeus target?

A

Windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Zeus’ attack method?

A

Man-in-the-browser attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Zeus infect in Man-in-the-browser attack?

A

Infected browser with Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Zeus infects browser with Malware. What does it gain from doing this?

A

You type in unencrypted information into your browser. Infecting the browser means Zeus can now access this information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do attackers want to achieve via Zeus attack?

A

Capture Credentials

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Having done Man-in-the-browser, what 2 things do attackers use to gather credentials?

A

Keylogging, Form Grabbing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does BEC stand for?

A

Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What happens in a BEC attack?

A

Pretend to be a CEO/Senior Manager, request large sum of money

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is BEC reliant on?

A

That the vicitm (employee) and the person being impersonated are not together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What two things can be created in BEC?

A

Spoofed emails, hijacked legitimate invoices with scammer’s account number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What 2 aspects of cryptocurrency can be hacked for money?

A

Wallets, Exchanges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens in Personal Document Ransom?

A

Ransomware encrypts specific files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are 2 ways ransomeware can be spread?

A

Phishing email (macro on attachment downloads and executes payload)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How does decryption happen after a Personal Document Ransom attack?

A

Victim pays the ransom or a security firms releases a decryptor

18
Q

How did WannaCry spread?

A

As a worm, infects local network and random machines on the Internet

19
Q

What allowed WannaCry to execute ransomware?

A

EternalBlue exploit

20
Q

What is are the three levels of Personal Document Ransom?

A

Original, Double Extortion, Triple Extortion

21
Q

What happens in the Original Extortion?

A

Enrypt the data

22
Q

What happens in Double Extortion?

A

Exfiltrate data and threaten to disclose in ransom not paid quickly

23
Q

What happens in Triple Extortion?

A

Threaten to leak data unless paid

24
Q

What may randomware groups also search for?

A

Local servers that contain data backups, and delete/encrypt these

25
What is Cryptojacking?
Malicious Cryptomining, using someone else's processing power
26
How does Cryptojacking stay hidden?
Mine data while computer is idle
27
In dat breaches, what 3 things may happen to stolen data?
Public Disclosure, Private Intelligence, Sold on Black Market
28
What is the aim of an DoS attack?
Make service unavilable to users
29
How does DoS usually accomplish its aim?
Overload service's resources
30
How does DoS overloading occur?
Service request flooding
31
What makes DoS a DDoS attack?
Flooding traffic generated by many different sources
32
Describe what botnets are in DDoS attacks?
Groups of computers networked together to cause DDoS attack
33
What are botnet groups built from?
Vulnerable systems, with no concern for who owners are
34
How are botnets controlled?
Command and Control Infrastructure
35
What is botnet as a service?
Owners of botnets may rent them to other attacks to make money
36
What are 3 reasons why IoT devices are being used for botnets?
IoTs have poor practices, like using open ports. IoTs have no built in auto-firmware update system, so vulnerabilites left unpatches. IoT devices are not looked at much once installed, so owners don't know when devices are used maliciously.
37
What does Mirai do?
Scans internet for vulnerable IoT devices
38
What are Influence Campaigns?
Attacks and releasing info, aimed to influence people's opinions
39
How are botnets used on social media platforms?
Each bot is an account taking actions to spread information
40
What is web defacement?
Changing the appearance of a website
41
What are 2 criteria that are used to choose targets for web defacement?
How easy the target is to hack, Expected media attention
42
What happens in a supply chain attack?
The attakcer compromises the weakest link in the supply chain, and reaches the target from there