Malicious Attacks Christine Jung, Max Park, Steven Ko, Ying Lin, Monica Tong What are Malicious Attacks? A malicious attack is an attempt to forcefully abuse or take advantage of someone's computer, whether through computer viruses, social engineering, phishing, or other types of social engineering. This can be done with the intent of stealing personal information (such as in social engineering) or to reduce the functionality of a target computer. In July 2009, average of 89% of email messages were spam. U.S is the top country for malicious activity in 2008 U.S is ranked first for malicious code, phishing website hosts, and originating attacks. Where does Malicious Code Hide? 1. Email 2. Web Content 3. Legitimate Sites 4. File Downloads Types of Malicious Attacks Malware ◦ Adware ◦ Spyware ◦ Trojan Horse ◦ Crimeware ◦ Viruses ◦ Worms Social Engineering ◦ Phishing ◦ Baiting ◦ Spam Who is the Target? How malicious hackers attack By Roger A. Grimes | InfoWorld 1. Log-on credential or password guessing/cracking 2. Buffer overflow 3. Application or OS vulnerability 4. Application or OS misconfiguration 5. Data malformation -- SQL injection, XSS, and so on 6. Sniffing/eavesdropping 7. Client-side attack 8. Social engineering Twitter site disabled after hackers launch malicious online attack | Technology | The Guardian Attack targets Sony 'rootkit' fix - CNET News Why •Cyber vandalism •To cause harm or data loss •Corrupting other people’s hardware •Profit motive •As a prank •To take control of users' computers for black-market exploitation •To help in profit for spyware where programs are designed to monitor users' web browsing, display unsolicited advertisements, or redirect affiliate marketing revenues to the spyware creator. Prevention “A detection system may detect suspicious activ ity, but where is the protection from fast acting attacks? A prevention system must identify and stop ma licious attacks before they do damage and have a chance to infect a system.” Preventing Malicious Attacks on the Internet Along with intrusion prevention, a useful tool for the home us er is to become familiar with some of the tricks and technique s that hackers use to break into systems. -scanning systems for weak spots, like an operating system t hat has not been upgraded or recently patched -the use of malware to record important information from the computer (e.g., passwords or financial information). Remember that a system may not always be attacked to steal information; it may also be attacked to be used as a storage s ite for illegal content (such as pirated movie downloads) or a system could be recruited into an online 'bot army.' Preventing Malicious Attacks on the Internet To increase security of the home computer, the home user can take a few relatively simple steps. -One of the first steps in computer hacking prevention is to make sure that all of your software is up-to-date. -Another measure that any home user may take is to install a firew all. The firewall’s purpose is to stop unauthorized contact or entry onto the system. -Different applications on the market will scan and remove malicious code that has found its way onto a hard drive. Running various virus software applications yields benefits as well. Works Cited 1. Metalib: search “attacks on the internet”: Burch, Hal. “A sercuirty study of the internet: an analysis of firewall behavior and anonymous DNS.” Cameo: 2004 2. Databases A-Z: Web of Science: Chu HC, Deng DJ, Chao HC, et al. “Next Generation of Terrorism: Ubiquitous Cyber Terrorism with the Accumulation of all Intangible Fears.” Journal of Universal Computer Science V. 15 I. 12: 2009 3. eJournal A-Z: ECO Electronic Collections Online: Search Attacks on the Internet: Radosavljevic, Vladan;Belojevic,Goran. A New Model of Bioterrorism Risk Assessment. Bio security and Bioterrorism 7, no. 4: 443451, 2009 4. http://www.infoworld.com/d/security-central/howmalicious-hackers-attack-447