Cyber Attacks
Types of cyber threats:
- Unauthorised Access: An attacker gains unauthorised access to a network or specific systems, often exploiting vulnerabilities in software or weak authentication mechanisms
- Malware Attacks: Malicious software, such as viruses, worms, Trojans, or ransomware, can infiltrate networks and infect devices to cause harm or steal sensitive information
- DoS and DDoS Attacks: These attacks overwhelm network resources or services, rendering them unavailable to legitimate users
- Insider Threats: Malicious or negligent actions by authorized individuals within an organization can lead to network breaches
- Zero-day attacks: These attacks exploit vulnerabilities that are unknown to the software vendor or the victim
Unauthorised access
Unauthorised access is a type of network intrusion where an individual or entity gains unauthorised entry into a computer system, network, or specific resources without proper authorisation.
This breach of security can lead to various consequences, such as data theft, data manipulation, service disruption, and potential harm to an organisation’s reputation.
Methods of unauthorised access
- Exploiting Vulnerabilities: Attackers may exploit software or hardware vulnerabilities in the target system. These vulnerabilities could be in the operating system, applications, or network devices.
- Social Engineering: Social engineering involves manipulating individuals into revealing sensitive information or performing actions that compromise security. This could be through phishing emails, phone calls, or physical impersonation. Some examples can be found at: https://www.tessian.com/blog/examples-of-social-engineering-attacks
- Default or Weak Credentials: Many devices and systems come with default usernames and passwords that users often fail to change, providing an easy entry point for attackers (https://grahamcluley.com/mirai-botnet-password/).
- Password Cracking: Attackers may use password-cracking techniques to discover weak or poorly encrypted passwords to gain unauthorised access. It is usually carried out by using automated tools or scripts that try various combinations of usernames and passwords until a successful match is found. Common methods for password-cracking include: brute-force, dictionary attacks, hybrid attacks, phishing**.**
- Insider Threats: Employees or individuals with authorised access to the network may abuse their privileges to gain unauthorised access to resources they are not supposed to access. E.g., a dissatisfied employee decides to use his/her elevated privileges to gain unauthorised access to sensitive data and resources within the organisation.
Detection of unauthorised access
Unauthorised access can be prevented by combining various techniques, such as: access control policies, two-factor authentication, network segmentation, etc.
network intrusion and anomaly detection can be employed to monitor network traffic for suspicious activity to identify deviations from typical network behaviour, which can indicate unauthorised access attempts
Malware attacks
Malware, short for “malicious software”, refers to any software intentionally designed to harm, exploit, or compromise computer systems, networks, or user devices. These attacks can have severe consequences, including data breaches, financial losses, and compromised privacy
Analysing memory dumps and binary files can provide valuable insights into various types of malware (e.g., signature-based methods)
We will focus on types of malicious software that can be detected by inspecting the network traffic they generate
Types of Malware
- Spyware and keyloggers are designed to monitor user activities by tracking browsing habits, capturing keystrokes, and stealing sensitive information such as passwords and personal data.
- They generate network traffic to send the stolen information to C&C servers controlled by the attackers. Monitoring network traffic can detect unusual data transmissions or communications with known malicious destinations
- Worms are self-replicating malware that spread through networks without needing user interaction.
- They often generate significant network traffic as they scan for and attempt to exploit vulnerabilities in other systems to infect them
- Trojan Horses (Trojans) masquerade as legitimate software, enticing users to download and install them. Once inside a system, Trojans create backdoors, allowing unauthorised access and control for attackers.
- This involves establishing communication with a remote server or a C&C server to receive commands or exfiltrate stolen data
- Ransomware is a particularly destructive type of malware that encrypts the victim’s data, rendering it inaccessible until a ransom is paid to the attackers. It often spreads through phishing emails or malicious downloads
- Ransomware generates network traffic during the infection process and when communicating with the C&C server (if it uses one). It may also attempt to communicate with remote servers to obtain encryption keys or to exfiltrate sensitive data before encryption
- Botnets consist of a large number of infected computers (bots) under the control of a single attacker (botmaster)
- These bots can be remotely commanded to perform various tasks, such as launching distributed denial-of-service (DDoS) attacks, sending spam emails, or spreading malware to other systems
Botnets
- Botnets are the most relevant type of Malware in the context of network intrusion. Botnets are a significant threat on the internet, and they are used for various malicious activities, as the collective power of multiple bots allows attackers to perform large-scale and coordinated attacks. Botnet phases can be classified as follows:
- Infection (email attachments, infected web sites, sw vulnerabilities, weak credentials)
- Command and Control (C&C): After a computer is infected and joins the botnet, it establishes communication with the botmaster’s C&C server
- Attack Phase: Once the botnet is established and under the botmaster’s control, it can be used to carry out various malicious activities, including but not limited to: DoS/DDoS attacks, spam and phishing campaigns, brute-force attacks, etc.
Detection of malware and botnets
Monitor and record network traffic during typical operations to understand what is considered normal for your network. This baseline will serve as a reference point for identifying anomalies and potential malware activities
- Monitor DNS (Domain Name System) traffic for suspicious domain name requests. Some malware uses domain generation algorithms (DGAs) to generate pseudo-random domains for C&C communication
- DGAs make it difficult for security researchers and defenders to predict and block the domains used for C&C communication by malware
- Implement behaviour-based analysis to identify anomalies in network traffic. For instance, if a device suddenly starts generating excessive login attempts, it could be indicative of a brute-force attack or a compromised account
DoS/DDoS attacks
DoS and DDoS attacks are two types of cyberattacks aimed at disrupting the normal functioning of a target system or network. These attacks overload the target with an excessive amount of traffic, making it difficult or impossible for legitimate users to access the resources or services provided by the target.
A DDoS is a type of DoS attack that involves multiple connected online devices (botnet) which are used to overwhelm a target host or network.
- DoS attacks can be broadly categorised into two main types based on the methods they use to overwhelm the target: Bandwidth-based and resourcebased
Bandwidth-based (volumetric) DoS attacks
Name | Type | Description | |
---|---|---|---|
Flood Attacks | Volumetric | Attack built with high rates of ICMP, SYN, HTTP, and UDP packets with the aim to consume the victim’s network resources. |
|
DNS, NTP, SSDP, SNMP, LDAP, NetBIOS and TFTP |
Volumetric (reflection) |
DDoS attacks exploit a specific UDP-based network service to overwhelm the victim with responses to queries sent by the attacker to UDP servers (reflectors) using the spoofed victim’s IP address. |
Source: cloudflare.com |
Resource-based DoS attacks
Application Layer Attacks: These attacks target vulnerabilities in the application layer of a system. Instead of overwhelming the network with traffic, they exploit the application’s weaknesses to consume server resources or cause it to crash.
Name | Description | |
---|---|---|
Slowloris | Attack based on partial HTTP requests against a Web server and on keeping those connections open as long as it can. This type of attack uses a low amount of bandwidth, with requests that mimic regular traffic |
|
HTTP POST attacks (Cross-site scripting (XSS)) |
In an XSS attack, the attacker injects malicious scripts into data sent via an HTTP POST request. When the server processes this data and displays it back to other users, the injected script is executed in the context of their browsers (e.g., to steal browsing cookies to hijack the user’s session and take over the account) |
|
HTTP POST attacks (SQL injection) |
The attacker manipulates the data sent via an HTTP POST request to inject malicious SQL code into the backend database query. If the application does not properly validate and sanitise user inputs before constructing database queries, the injected SQL code can lead to unauthorised access, data leakage, or even complete control of the database |
|
HTTP DoS attacks | HTTP Flood attacks use legitimate HTTP GET or POST requests to force the HTTP server to allocate all its resources, overloading the server and causing it to become unresponsive or crash. These attacks can lead to service disruption or resource exhaustion |
|
Buffer overflow | These attacks occur when a program writes data into a buffer, but the data exceeds the buffer’s allocated size. When the program processes the malicious input, it writes data beyond the boundaries of the buffer. As a result, the overflowed data corrupts adjacent memory locations, which may include data structures, control flow pointers, or even executable code |
Protocol Exploitation: Exploiting flaws in network protocols to overload the target
Name | Description | |
---|---|---|
Syn Flood | The attacker sends a large number of SYN packets (the initial synchronisation request) with spoofed IPs. Since the attacker does not complete the handshake, the target system is left waiting for the connection to be established, preventing legitimate users from establishing connections. |
|
TCP SYN ACK Reflection |
The attacker sends SYN packets with a spoofed source IP address (the victim’s IP address) to various systems, which then send SYN-ACK packets to the victim. This causes a flood of traffic, leading to a DoS condition for the victim. |
Source: cloudflare.com |
Ping of Death | The attacker sends oversized packets to the victim machine, i.e. packets larger than the maximum IPv4 packet size (65535 bytes), causing it to become unresponsive or crash. Ping of Death attack itself is not a significant threat today |
15 |
Detection of DoS/DDoS attacks
- Monitor your network traffic continuously to identify any sudden spikes or abnormal patterns (volumetric attacks)
- Track the number of incoming connections per second. A significant increase in connection rates from specific IP addresses or subnets could be an indication of a DoS/DDoS attack
- Observe the distribution of traffic across various services, ports, and protocols. A sudden shift in traffic patterns can be a sign of a DoS/DDoS attack
- Inspect the TCP flags in TCP packets to detect SYN flood attacks or TCP-based DoS attacks. Analyse the size of individual packets
- DDoS attacks, especially those involving amplification techniques, may produce packets significantly larger than normal traffic
Trend of DDoS attacks
Insider Cyber Threats
Definition: An insider cyber threat refers to a security risk posed to an organisation’s information systems and data by individuals who have authorised access to the organization’s resources
These individuals can be current or former employees, contractors, partners, or anyone else with legitimate access privileges. The danger arises from the fact that these insiders have high knowledge of the organisation’s systems, making them potentially more dangerous than external attackers
Categories of Insider Cyber Threats
- Malicious Insiders: These are individuals who deliberately and knowingly exploit their access privileges to carry out harmful activities. Their motivations may vary, ranging from financial gain and revenge to ideological reasons. Examples of malicious insider actions include stealing sensitive data, selling proprietary information to competitors, intentionally causing data breaches, or disrupting critical systems.
- Unintentional Insiders: These individuals inadvertently pose a threat due to carelessness, lack of awareness, or negligence. They might fall victim to phishing attacks, download malware unknowingly, or accidentally disclose sensitive information.
Detection of insider attacks
- Track and log user actions across the network. This includes monitoring file access, login attempts, data transfers, and changes to sensitive files. Unusual or unauthorised activities could be indicative of an insider threat
- Utilise anomaly detection methods to identify abnormal behaviour in real-time. These tools can establish a baseline of normal behaviour for each user and raise alerts when deviations occur
Zero-day attacks
Definition: Zero-day network attacks target undisclosed and unpatched vulnerabilities in software, operating systems, or network infrastructure, for which no security patches or fixes are available
The term “zero-day” refers to the fact that from the moment a vulnerability is discovered (or zero days after), the clock starts ticking for the targeted organisation to find a way to defend against the attack. Since there is no prior knowledge of the flaw, victims have zero days to prepare or protect themselves
Examples of zero-day attacks
- Stuxnet (discussed earlier) is perhaps one of the most infamous zero-day attacks in history. Stuxnet exploited multiple zero-day vulnerabilities in Windows and Siemens industrial software to propagate and manipulate centrifuges, causing physical damage to Iran’s uranium enrichment facilities.
- WhatsApp Zero-Day Vulnerability (2019). In 2019, a zero-day vulnerability was discovered in WhatsApp, a popular messaging application owned by Facebook. The vulnerability allowed attackers to install spyware on targeted devices by exploiting a bug in the app’s voice call feature. The spyware could collect sensitive data and even turn on the device’s camera and microphone without the user’s knowledge.
Detection of zero-day attacks
Zero-day attacks are particularly challenging for traditional signaturebased security solutions because there are no known patterns or signatures for these exploits. Machine learning, on the other hand, has the potential to analyse large amounts of data, detect anomalies, and identify previously unknown attack patterns, making it better suited for zero-day attack detection
- Anomaly Detection: Machine learning algorithms can be trained on normal network behaviour, allowing them to identify deviations from the expected patterns. When an attack occurs, the behaviour is likely to differ from the norm, triggering an alert
ML-based detection of zero-day attacks
To maximize the benefits of machine learning for zero-day attack detection, a comprehensive approach that combines multiple cybersecurity techniques, including:
- human expertise
- traditional security measures (e.g., signatures, rules and heuristics)
- staying up-to-date with the latest security research