
eBook - ePub
Targeted Cyber Attacks
Multi-staged Attacks Driven by Exploits and Malware
- 158 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
eBook - ePub
Targeted Cyber Attacks
Multi-staged Attacks Driven by Exploits and Malware
About this book
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
- A well-structured introduction into the world of targeted cyber-attacks
- Includes analysis of real-world attacks
- Written by cyber-security researchers and experts
Frequently asked questions
Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weāve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere ā even offline. Perfect for commutes or when youāre on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Targeted Cyber Attacks by Aditya Sood,Richard Enbody in PDF and/or ePUB format, as well as other popular books in Computer Science & Cyber Security. We have over one million books available in our catalogue for you to explore.
Information
Chapter 1
Introduction
This chapter introduces the topic of targeted attacks explaining the complete model and purpose of these attacks. This chapter lays the foundation of different phases required for successful execution of targeted attacks. Basically, the readers will get an idea of the basic model of targeted attack covering the overall idea of intelligence gathering, infecting targets, system exploitation, data exfiltration and maintaining control over the target network. This chapter also unveils the difference between targeted attacks and advanced persistent threats.
Keywords
Targeted Cyber Attacks; Advanced Persistent Threats; Cyber Crime; Cyber Espionage; Zero-day Exploits and Vulnerabilities
The exploitation of networks and technologies for gathering information is now commonplace on the Internet, and targeted cyber attacks are a common weapon for subverting the integrity of Internet operations. These attacks steal intellectual property, conduct cyber espionage, damage critical infrastructure and create uncertainty among users. They can achieve both tactical and strategic goals across the Internet without requiring any physical encroachment. It is clear that targeted attacks provide a tactical advantage that can play a significant role in future cyber wars.
Today, the majority of nation states are developing cyber war capabilities. Zero-day exploits (exploits that are designed for unknown vulnerabilities for which vendors have no awareness and no patches are available) in critical software are now considered to be attack weapons that can be used to either disrupt or gain control of an opponentās network infrastructure. Government security agencies are spending millions of dollars for unknown zero-day exploits. The US government is one of the biggest buyers of these cyber weapons [1]. In fact, legitimate security companies find vulnerabilities, write zero-day exploits and sell them to governments for large amounts of money. The result is that the nation states are well equipped to launch targeted cyber attacks. In addition, even with a zero-day exploit in hand, launching a well-crafted targeted cyber attack is not cheap as substantial effort is expended in building multilayer model of attack vectors and adapting them to the target networkās environment. However, targeted attacks are nation state independent and can be initiated by independent attackers around the globe.
It is easy to underestimate the impact and capabilities of targeted cyber attacks. They are capable enough to produce a kinetic effect in which command execution from a remote attacker can disrupt the physical infrastructure of a target. Examples already exist such as the Stuxnet worm [2] that targeted Industrial Control Systems (ICSs). Basically, ICS is a control system that manages and commands the behavior of a machine (equipment) used in production industries (critical infrastructure) comprising of oil, gas, water, and electricity. A well-designed cyber attack can act as a parasite that leeches critical information from the target. The value of a targeted cyber attack is directly proportional to its ability to persist and remain undetected in the target network. To succeed in the hostile environment of network resilience and counter strategies, targeted attacks require multistage attack vectors to build a cumulative attack model. On the other side, automatic breach prevention technologies are required to have the capability to assess and map the probability and effect of targeted cyber attacks.
There exists several definitions of targeted cyber attacks. We adhere to a basic definition based on the naming conventionāa targeted attack is a class of dedicated attacks that aim at a specific user, company, or organization to gain access to the critical data in a stealthy manner. Targeted attacks should not be confused with broad-based attacks that are random in nature and focus on infecting and compromising large groups of users. Targeted attacks have a characteristic of discrimination and are not random in nature. It means attackers involved in targeted attacks differentiate the targets (systems/users/organizations) and wait for the appropriate opportunity to execute the attack plan. However, the term ātargeted attackā is overused. We believe that the best model of a targeted attack is composed of different elements to perform insidious operations in five different phases: intelligence gathering, infecting targets, system exploitation, data exfiltration, and maintaining control. The intelligence-gathering phase consists of different information-gathering tactics used by attackers to extract data about targets. The infecting-the-target phase reveals how the targets are infected with malware through infection carriers. The system-exploitation phase shows how the target systems are fully compromised using exploits. The data-exfiltration phase is all about extracting information from the compromised systems. The maintaining-control phase shows how the attackers become persistent and remain stealthy in the network while at the same time gain access to additional number of systems in the target environment.
Some important characteristics of targeted attacks are as follows:
⢠Zero-day exploits against unknown vulnerabilities are used to compromise target systems so that the attacks are not easily detectable.
⢠Sophisticated malware families (custom coded) are used, which go unnoticed despite the presence of security solutions installed on the network and end-user systems.
⢠Real identity behind the attack is hidden to keep a low profile to avoid any legal problems.
⢠Systems having no value in the attack campaign are not infected and compromised. This in turn lowers the exposure of the attack and makes it stealthier.
⢠Attack is made persistent for a long period of time and operations are executed in a hidden manner.
Next is the need to understand the purpose of targeted attacks. The attackersā intentions behind launching targeted attacks are important, but targeted attacks are primarily used for earning financial gain, conducting industrial espionage, stealing intellectual property, disrupting business processes, making political statements, and subverting the operations of a nationās critical infrastructure.
Overall, targeted attacks are complex in nature because attackers have to invest substantial amount of time in selecting targets, preparing attack models and discovering zero-day vulnerabilities (known vulnerabilities can also be used). Attackers behind the targeted attacks are experts in technology, and are highly motivated to pursue intrusion campaigns. All these factors collectively provide an environment to launch targeted attacks.
A recent study on the elements of targeted attacks has shown that a sophisticated targeted attack can result in millions of dollars in losses for large organizations [3]. For Small and Medium Enterprises (SMEs), a single-targeted attack could be worth many thousands of dollars. A study conducted by Symantec [4] observed that there has been a significant increase in targeted attacks showing a jump of 42% in 2012. This number indicates that hundreds of targeted cyber attacks are happening routinely. On a similar note, Anderson et al. [5] conducted a study on measuring the cost of cyber crime, in which a framework for calculating the cyber crime cost was designed. The framework segregated the cost of cyber crime into four elements: direct costs, indirect costs, defense costs, and cost to the society. The study estimated that global law-enforcement expenditures are close to 400 million dollars worldwide to defend against cyber crime. These figures provide a glimpse of the ever increasing insecurity on the Internet.
There are other variants of targeted attacks known as Advanced Persistent Threats (APTs) [6] that exist on the Internet. Targeted attacks can be considered to be a superset of APTs [7]. Generally, APTs are highly advanced, targeted threats that use multiple attack vectors, persist (easily adaptable) in the wild and can exist undetected (stealth execution) for a long period of time. A number of researchers believe that APTs are primarily state sponsored [8], but we believe that definition to be too restrictiveāan APT need not be spons...
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- A Few Words About Targeted Cyber Attacks
- Acknowledgments
- About the Authors
- Overview
- Chapter 1. Introduction
- Chapter 2. Intelligence Gathering
- Chapter 3. Infecting the Target
- Chapter 4. System Exploitation
- Chapter 5. Data Exfiltration Mechanisms
- Chapter 6. Maintaining Control and Lateral Movement
- Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?
- Chapter 8. Challenges and Countermeasures
- Chapter 9. Conclusion
- Abbreviations