You are on page 1of 7

ETHICAL HACKING

Differentiate among the following with respect to


Mode of Operation
One Popular Instance (Year Workflow Damaged Caused)

Sr. Name Definition Mode of Year Workflow Damage caused


No. Operation

1 Virus Virus spread from host Attached with any file and MyDoom, 2004 This email-transmitted virus, It caused slowdowns of internet
to host and has the document and lie dormant first identified on January traffic worldwide. Kaspersky
ability to replicate until its code is execute. 26, quickly spread by estimated that 600,000 to 700,000
itself. Reproduce with Once it effect a system, appearing to be an error computers were infected with the
the help of files and may effect there system message with an worm. 13% were in the US, while
documents. on same network. Harming attachment that, when 1% were in Russia. The
the system software by opened, emailed copies of comparative lack of infections in
corrupting or destroying the virus to addresses in the Russia was attributed to better
data. Access to e-mails victims address book, and security practices in Russia.
and often interrupts the also propagated itself
process of net surfing. through the Kazaa file-
sharing service.
2 Worm An independent piece Due to its replication Morris It worked by exploiting The U.S. Government
of malicious programs nature it takes a lot of worm or Internet known vulnerabilities Accountability Office put the cost
that make copies of space in the hard drive worm of November 2, in Unix sendmail, finger, of the damage at $100,000
themselves again and and consumes more cpu 1988 and rsh/rexec, as well 10,000,000. According to a survey
again on the local uses which in turn makes as weak passwords. that two thousand computers were
drive, network shares, the pc too slow also infected within fifteen hours. It is
etc. Worms spread by consumes more network usually reported that around 6,000
exploiting bandwidth. major UNIX machines were
vulnerabilities in infected by the Morris worm.
operating systems.
3 Trojan A Trojan Horse is a Trojans often are spread Shedun 2015 Shedun malware is known It affecting roughly 20,000 popular
type of virus that via an infected email It target android OS for targeting the Android Android applications. This attacks
pretends to be attachment or a download known as Ghost Push, Accessibility Service as well detected to cause approximately
something useful, that hides in free games, Humming Bad, as for downloading and 1500-2000 infections per day.
helpful, or fun while applications, movies or Hummer, installing arbitrary
actually causing harm greeting cards. The AndroidOS_libskin, as applications without
or stealing data. It do purpose is to steal useful well as by the name of permission.
not replicate private information. the malicious
themselves but they Android .APK
can be just as executable file itself,
destructive which is right_core.
4 Backdoor Backdoor is the This can compromise files DSL Backdoor It allow an attacker to send More than 20 popular models sold
method to bypass and capture confidential commands to the router worldwide have been found to
authentication in any information stored on the according to TCP port 32 possess the vulnerability. Once
system. It enter in infected machine. They 764 from a command shell remotely in control of the router
system and open the also allow hackers to run without any authentication via a compromised port, the
ports for compromise malicious software from of network hacker can gain root shell access
the system the computer's Internet administrators and reset the and send malicious commands to
connection to launch other routers configuration and the device.
attacks. gain access to the
administrative control panel.
The attack, confirmed to
work on several Linksys and
Netgear DSL modems,
exploits an open port
accessible over the wireless
local network.
5 Malware Malware is a piece of Malware attaches itself to Bank Hackers Steal The banks internal Then the group impersonated bank
software use to harm the components of a web Millions via Malware in computers, used by officers, not only turning on
a legitimate user page, pop-up 2013 employees who process various cash machines, but also
system like disrupt, advertisements, toolbars, daily transfers and conduct transferring millions of dollars from
gaining access and free stuff that you bookkeeping, had been banks in Russia, Japan,
stealing information. download, and games, to penetrated by malware that Switzerland, the United States and
name a few. When you allowed cybercriminals to the Netherlands into dummy
click on these components, record their every move. accounts set up in other countries.
malware sneaks into your The malicious software
computer. Once malware is lurked for months, sending
in your computer it can back video feeds and
steal anything from your images that told a criminal
music lists to more serious group including Russians,
information like your login Chinese and Europeans how
passwords, bank account the bank conducted its daily
numbers, and personal routines, according to the
information. investigators.

6 spyware Spyware is a software Spyware does not usually Lenovo has caught Michael Horowitz from It invades the privacy of customers
that install in our self-replicate. . Once it installing spyware on Computerworld by learning their Internet browsing
system accidentally. install it steal our personal its laptops and has discovered a software habits, a class action claims.
information and provide it workstations without program, called "Lenovo
to its creator. Steal the user's permission Customer Feedback Program
personal information like or knowledge. 64," that operates daily on
credit card number, these systems and can be
passwords, important files categorized as Spyware. The
and many other personal purpose of this program is
stuff, emails ect. to send customers' feedback
data to Lenovo servers.
According to Horowitz, the
company has mentioned
this in its EULA, but
he "cannot recall ever being
asked [for] a Customer
Feedback program" while
ever setting up his Lenovo
PC.
7 rootkit Set of tools enable Rootkit is installed at the Sony BMG copy Sony-BMG has been using One of the programs installed,
administrator-level root level of the operating protection rootkit copy-protection technology even if the user refused its end-
access to a computer system, which ultimately scandal in 2005 called XCP in its recent CDs. user license agreement (EULA),
or computer network. enables it to operate in You insert your CD into your would still "phone home" with
stealth mode. Cracker Windows PC, click "agree" in reports on the user's private
installs a rootkit on a the pop up window, and the listening habits; the other was not
computer after first CD automatically installs mentioned in the EULA at all,
obtaining user-level software that uses rootkit contained code from several
access, either by techniques to cloak itself pieces of open-source software in
exploiting a known from you. an apparent infringement of
vulnerability or cracking a copyright, and configured the
password. It direct harm to operating system to hide the
the target machine, software's existence, leading to
enables continual access. both programs being classified
For example, it may steal as rootkits.
data or gain complete
control of the system, all
without the user or even
administrators noticing a
thing.
8 Ransom- Ransomware stops Prevent you from Hacktivism in Latin It enters through spams and Hospital systems are on notice for
ware you from using your accessing Windows. America encrypt files and ransomware attacking their health
PC. It holds your PC or Encrypt files so you can't documents. Once it enter it IT systems after three hospital
files for ransom. It is use them. Stop certain sends a message to systems are reported to be victims
done for ransom apps from running (like desktops with instructions of computer viruses. In response,
either they lock the your web browser). about how users can pay to one hospital system paid almost
victims data or Ransomware will demand have files decrypt. $17,000 in Bitcoin to retrieve their
threaten to publish it. EHR, while the other two hospital
that you pay money (a
systems worked off paper records
ransom) to get access to and backup systems for a few days
your PC or files. We have while their main IT systems were
taken down to flush out the virus.
also seen them make you
complete surveys. There is
no guarantee that paying
the fine or doing what the
ransomware tells you will
give access to your PC or
files again.

9 Crime The software tools There are a number of Hacktivists throughout the region
ware used in cybercrime is Crime ware can redirect a Hacktivism in Latin methods used, ranging from tend to target government
sometimes referred to user's Web browser to a America website defacementwhen websites. The group Anonymous
as crime ware. counterfeit website hackers change the defaced Chiles Ministry of
Its purpose of controlled by the thief. It appearance of a siteto a Education site in support of
conducting malicious can enable remote access denial-of-service attack, student protests, and
and illegal activities of applications, allowing which makes a website slow also hacked the websites of
online. It refers to criminals to break into or inaccessible. Argentine President Cristina
programs that are networks and steal Fernndez de Kirchner and
meant to automate passwords cached on a Nicaraguan President Daniel
the theft of user's system. It can also Ortega. Hackers defaced the
information, allowing install keystroke loggers to Honduran police website,
the thief to gain collect data, such as and attacked numerous
access to a persons password and login government sites in Guatemala
financial accounts information for online bank including the presidency and
online. accounts. congressional homepagesover
the past two years.
10 Scare Scare ware is design Scareware, which Police in the United States The suspects involved in the
to trick victims into generates pop-ups that FBI targets two and seven other countries scheme, who were not identified,
ware "scareware" rings in
purchasing and resemble Windows system seized computers and planted "scareware" on the
downloading useless messages, usually U.S., Europe servers used to run a computers of 960,000 victims. The
and potentially purports to be antivirus or "scareware" scheme that scareware would pretend to find
dangerous software. antispyware software, a has netted more than $72 malicious software on a computer.
firewall application or million from victims tricked The goal is to persuade the victim
a registry cleaner. They into buying fake anti-virus to voluntarily hand over credit card
said that they have find a software. information, paying to resolve a
infect files in your system, non-existent problem
to clean your system
purchase their software to
perform that task but
actually it doesnt
happened.
11 Adware Adware is a software The advertisements Lenovo pre-installs This is a pre-install adware This could effectively allow the
application in which usually run in a small adware on its injects ads when users software to perform a man-in-the-
advertising banners section of the software systems, which could browse the web, with middle attack on your private
are displayed while interface or as a pop-up also steal your private Google searches being a data. Internet Explorer and
any program is ad box on your desktop. data. Despite that, primary target. It also Chrome could be affected by this,
running. Adware can When you stop running the Lenovo claims its installs its own security while Firefox is currently safe
automatically get software, the ads should useful software that certificate which shares its thanks to its independent
downloaded to your disappear. This allows helps users discover private key. This allows any certificate repository. And the
system while consumers to try the products visually. software that uses that key security certificate itself doesn't
browsing any website software before they buy to fool the device into get removed alongside the
and can be viewed and you always have the thinking its legitimate program so users could still be
through pop-up option of disabling the ads Microsoft software. It would vulnerable even if they get rid of
windows or through a by purchasing a then be able to decode Superfish.
bar that appears on a registration key. encrypted data such as the
computer screen one sent between you and
automatically. Adware your bank.
are used by
companies for
marketing purpose.
12 APT A network attack in Titan Rain (2003) It can spread by infected It is a state level attack .Once
which an An APT attacker uses spear Sykipot Attacks (2006) USB hard drives. APTs attacker gain target machine
unauthorized person fishing, to gain access to GhostNet (2009) select their targets based control he can use machine by his
gains access to a the network through Stuxnet Worm (2010) on specific intelligence will. He will steal secret of state to
network and stays legitimate means. Once Deep Panda (2015) gathering or system use them.
there undetected for a access has been achieved, disruption objectives.
long period of time to the attacker establishes Once the APT has its
steal data rather than a back door. And steal marching orders from the
to cause damage to credential records. command and control (C&C)
the network. server, it begins to spread
through your network,
calling home with
interesting data, and hiding
itself from detection.

Bibliography
https://en.wikipedia.org/wiki/Sony_BMG_copy_protection_rootkit_scandal
http://thehackernews.com/2015/09/lenovo-laptop-virus.html
https://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html?_r=0
https://www.symantec.com/connect/articles/what-are-malware-viruses-spyware-and-cookies-and-what-differentiates-them
http://www.webopedia.com/DidYouKnow/Internet/spyware.asp
http://searchsecurity.techtarget.com/definition/advanced-persistent-threat-APT
https://www.getsafeonline.org/business-blog/five-notable-examples-of-advanced-persistent-threat-apt-attacks/
https://en.wikipedia.org/wiki/Ransomware
http://www.natlawreview.com/article/ransomware-scandals-rock-hospital-systems-hhs-proposed-rule-may-help
https://heimdalsecurity.com/blog/what-is-ransomware-protection/
https://en.wikipedia.org/wiki/Crimeware
http://www.infoworld.com/article/2606776/hacking/155947-Biggest-baddest-boldest-software-backdoors-of-all-
time.html#slide3
https://www.schneier.com/blog/archives/2005/11/sonys_drm_rootk.html
http://blog.trendmicro.com/backdoor-attacks-work-protect/
http://www.infoworld.com/article/2606776/hacking/155947-Biggest-baddest-boldest-software-backdoors-of-all-
time.html#slide3

You might also like