UNIT-2 Information Security & Cryptography
UNIT-2 Information Security & Cryptography
UNIT - 2
Cyber Offenses & Cybercrime
Cyber offenses & Cybercrime: How criminal plan the attacks, Social Engg, Cyber
stalking, Cybercafé and Cybercrimes, Botnets, Attack vector, Cloud computing, Credit
Card Frauds.
Cracker
A cracker is a person who breaks into computers. Crackers should not be
confused with hackers. The term cracker is usually connected to computer criminals.
Cracking
It is the act of breaking into computers. Cracking is popular, growing subject
on the internet. Many sites are devoted to supplying crackers with programs that
allow them to crack computers.
Cracker Tools
These are programs used to break into computers. Cracker tools are widely
distributed on the internet. They include password crackers, Trojans, worms, viruses etc.
Phreaking
This is the notorious art of breaking into communication system. Phreaking
sites are popular among crackers and other criminals.
War dialer
It is a program that automatically dials phone numbers looking for computers
on the other end. It catalogs numbers so that hackers can call back and try to break
it.
Categories of Cybercrime
Cybercrime categorized based on following:
1. The target of the crime
2. The crime occurs as a single event or a series of events
A. Crimes targeted at individuals
The goal is to exploit human weakness such as greed. These crimes include financial
frauds, Sale of nonexistent or stolen items, Child pornography, Copyright violation
and Harassment.
B. Crimes targeted at property
This includes Stealing mobile phones, laptop, PDAs, removable devices;
transmitting harmful programs that can disrupt functions of the systems or can wipe
out data from hard disk.
C. Crimes targeted at organizations
Cyber Terrorism is one of the crimes against organizations. Attacker uses computer
tools and Internet to usually terrorize the citizens of a particular country by stealing
the private information and also damage the programs and files or plant programs to
get control of network or system.
D. Single event of cybercrime
It is single event from perspective of the victim. For example, unknowingly open an
attachment that may contain virus that will infect the system.
E. Series of events
This involves attacker interacting with the victims respectively. For example,
attacker interacts with the victim on the phone and then they exploit that relationship
to commit the sexual assault.
Phase 1 Reconnaissance
The meaning of Reconnaissance is an act of reconnoitering–explore, often with
the goal of finding something or somebody (especially to gain information about
an enemy or potential enemy). Reconnaissance phase begins with “Foot
printing”. Foot printing is the preparation toward pre attack phase.
It involves accumulating data about the target’s environment and computer
architecture to find ways to intrude into that environment.
The objectives of this phase is to understand the system, its networking ports and
services and any other aspects of its security.
An attacker attempts to gather information in two phases:
1. Passive attack
2. Active attack
1. Passive Attack
A passive attack involves gathering information about a target without his/her
knowledge. Information can be gathered from:
a. Google or Yahoo Search: Use Google Earth to locate information about
employees.
b. Surfing online community groups like orkut /Facebook will prove useful to
gain the information about an individual.
c. Organization’s website may provide a personnel directory or information about key
employees.
d. Blogs, newsgroups, press releases, etc. are generally used as the mediums to
gain information about the company or employee.
e. Going through the job postings in particular job profiles for technical persons.
● Network sniffing is another means of passive attack to yield useful information
such as IP, hidden servers or networks and other available services on the system
or network.
Domain Name To perform searches for domain names (ex: website names) using
Confirmation multiple keywords.
Nslookup (name Used on Unix and windows, gives information about DNS and IP
server lookup) address.
eMailTrackerPro Analyses email header and provides IP address of the system that sent
the mail.
Website Watcher Keep track of favorite website for an update when website undergoes
an update change, this tool automatically detect them and saves last
two version.
2. Active Attack
An active attack involves probing of network to discover individual hosts to confirm
the information gathered in passive attack phase. It involves the risk of detection and
is called “Rattling of door knobs” or “Active reconnaissance”. It can provide
confirmation to attacker about security measures.
Dig Used to perform detailed queries about DNS records and zones,
extracting configuration about network or domain.
DNStracer Used to determine the data source for a given DNS server and
follow the chain of DNS server back to the authoritative sources.
Nmap This is port scanner, OS finger printer, used to rapidly scan large
networks
Arping This tool broadcasts ARP packets and receives replies similar to
ping.
Port Scanning:
⚫ The act of systematically scanning a computer's ports.
⚫ Since a port is a place where information goes into and out of a computer,
port scanning identifies open doors to a computer.
⚫ It is similar to a thief going through your neighborhood and checking every
door and window on each house to see which ones are open and which ones
are locked.
⚫ There is no way to stop someone from port scanning your computer while you
are on the Internet because accessing an Internet server opens a port, which
opens a door to your computer.
⚫ There are, however, software products that can stop a port scanner from doing
any damage to your system.
⚫ TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are
two of the protocols that make up the TCP/IP protocol suite which is used
universally to communicate on the Internet.
⚫ Each of these has ports 0 through 65535 available so essentially there are more
than 65,000 doors to lock.
⚫ The first 1024 TCP ports are called the Well-Known Ports and are associated
with standard services such as FTP, HTTP, SMTP or DNS.
⚫ Some of the addresses over 1023 also have commonly associated services, but
the majority of these ports are not associated with any service and are
available for a program or application
Prof. Satish Malayi | KLE’s SSMS BCA Athani P a g e 5 | 19
Cyber offenses & Cybercrime
Social Engineering
Definitions:
Social engineering is art of extracting sensitive information from people.
OR
Social engineering is the “technique to influence” people to obtain the
information.
It is generally observed that people are the weak link in security and this principle
makes social engineering possible.
A social engineer usually uses telecommunication (i.e. telephone and /or cell
phone) or Internet to get them to do something that is against the security
practices and/or policies of the organization.
Social engineering involves gaining sensitive information or unauthorized access
privileges by building in appropriate trust relationships with insiders.
The goal of a social engineer is to fool someone into providing valuable
information or access to that information.
Social engineer studies the human behavior so that people will help because of
the desire to be helpful, the attitude to trust people and fear of getting in to trouble.
An example is calling a user and pretending to someone from the service desk
working on a network issue; the attacker then proceeds to ask questions about
what the user is working on, what file shares he/her uses, what is/her password
and so on.
Classification of Social Engineering
4. Calling technical support: Help desk and technical support personnel are
trained to help users. Here social engineers or attackers pretends or acts as a
technical support executive and tries to get information from user over a phone
call.
1. Fake Emails: The attacker sends fake E-mails to numerous users and users
believe it as a legitimate mail. This activity called as “Phishing”. It is an attempt
to attract the Internet users to reveal their personal information such as user
names, passwords and credit card details. Banks, financial institutes and payment
gateways are the common targets. Phishing is typically carried out through E-
mails or instant messaging and often directs users to enter details at a website,
usually designed by the attacker with same look and feel of the original website.
Cyberstalking
Stalking is an “act or process of following victim silently – trying to approach
somebody or something”.
Cyberstalking has been defined as the use of information and communications
technology of individuals to harass another individual, group of individuals or
organizations.
Cyberstalking refers to the use of Internet and/or other electronic communications
devices to stalk another person. It involves harassing or threatening behavior that an
individual conduct repeatedly, for example, following person, visiting person at his
home or business place, making phone calls.
Types of Stalkers
1. Online stalkers 2. Offline stalkers
1. Online stalkers:
They aim to start the interaction with the victim directly with the help of the
internet (email/Chat Room).
The stalker makes sure that the victim recognizes the attack attempted on
him/her.
The stalker can make use of a third party to harass the victim
2. Offline stalkers:
The stalker may begin the attack using traditional methods such as following
victim, watching the daily routine of the victim, etc.
For ex. Use of community sites, newsgroups, social websites, personal
websites.
The victim is not aware that the Internet has been used to achieve an attack
against them.
4. Annual Maintenance Contract (AMC) was not found for servicing of the
computer. Not having the AMC is a risk from cybercrime perspective because
a cybercriminal can install a malicious code on a computer and conduct
criminal activities without any interruption.
Botnet
The meaning of bot is “an automated program for doing some particular task, over a
network”. Botnet term is used for collection of software that run autonomously and
automatically. The term often associated with malicious software but can also refer to
the network of computers using distributed computing software.
A Bot is simply a automated computer program. A cybercriminal can gain control of
system by infecting them with virus other malicious code that gives the access.
A Botnet (also called Zombie network) is a network of computers infected with a
malicious program that allows cybercriminals to control infected machines remotely
without the user’s knowledge. Zombie networks have become source of income for
entire groups of cybercriminals.
If someone wants to start a “business” and has no programming skills, there are plenty
of “Bot for sale”.
How a botnet is created and used
1. A botnet operator sends out viruses or worms, infecting ordinary users' computers,
whose payload is a malicious application—the bot.
2. The bot on the infected PC logs into a particular C&C server (often an IRC server,
but, in some cases a webserver).
4. The spammer provides the spam messages to the operator, who instructs the
compromised machines via the IRC server, causing them to send out spam messages.
The following figure explains how botnets create business and how they are used for
gainful purposes.
Attack Vector
An attack vector is a path by which an attacker can gain access to a computer or to
a network server to deliver a payload.
Attack vectors enable attackers to exploit system vulnerability.
Attack vectors include viruses, e-mail attachments, WebPages, pop-up
windows,instant messages, and chat rooms.
The most common malicious payloads are viruses, Trojan horses, worms and
spyware.
Payload means the malicious activity that the attack performs.
How attack launched?
Attack by Email: The hostile content is either embedded in the message or linked
to the message. Sometimes attacks combine the two vectors, so that if the message
does not get you, the attachment will. Spam is almost always carrier for scams,
frauds, dirty tricks or malicious actions.
Attachments: Malicious attachments install malicious computer code. The code
could be a virus, Trojan horse, Spyware and other kind of malware. Attachments
attempt to install their payload as soon as you open them.
Attack by deception: social engineering and hoaxes are other forms of deception.
Deception is aimed as the user/operator as a vulnerable entry point.
Hackers: They will use variety of hacking tools and social engineering to gain
access to computers and online accounts. They often install a Trojan horse to hijack
the computer for their own use.
Heedless guests: (attack by webpage) Counterfeit web sites are used extract
personal information. Such websites look very much like the genuine websites they
imitate. He/she thinks that you are doing business with someone you trust.
However, he/she really gives her personal information, like address, credit card
number and expiration date. Popups in webpages may install spyware, adware
Trojans.
Attack of worms: Many worms are delivered as Email attachments, but network
worms use holes in network protocols directly. In most cases, a firewall will block
system worms. In most cases, a firewall will block system worms. Many of these
system worms install Trojan Horses. Next they begin scanning the Internet from
the computer they have just infected, and start looking for other computers to
infect. If the worm is successful, it propagates rapidly.
Malicious macros: MS word and MS Excel are examples for macros. These
macros used for malicious purposes.
Viruses: These are malicious computer codes. Viruses include Email attachments,
downloaded files, worms etc.
Foistware (Sneakware): It is software that adds hidden components to the system
on the sly. Spyware is the most common form of foistware.
Cloud computing means storing and accessing the data and programs on remote
servers that are hosted on the internet instead of the computer’s hard drive or local
server. Cloud computing is also referred to as Internet-based computing, it is a
technology where the resource is provided as a service through the Internet to the user.
The data which is stored can be files, images, documents, or any other storable
document.
Some operations which can be performed with cloud computing are –
Storage, backup, and recovery of data
Delivery of software on demand
Development of new applications and services
Streaming videos and audios
A cloud service has 3 distinct characteristics compared to traditional hosting.
1. It is sold on demand. Cloud computing provides on demand delivery of IT
resources like software, hardware over internet.
2. It is elastic in terms of usage- a user can have as much or as little of a service
as he/she wants at any given time. Cloud computing will adopt to workload
changes.
3. The services is fully managed by the provider - a user just need PC and Internet
connection.
Types of Services
Elevated User Any data processed outside the Customer should obtain as much
access organization brings with it an information as he/she can about the
inherent level of risk. service provider.
Location of The organizations that are obtaining Organization should ensure that the
Data cloud computing services may not be service provider is committed to obey
aware about where the data is hosted local privacy requirements on behalf
and may not even know in which of the organization to store and
country it is hosted. process the data in the specific
jurisdictions.
Segregation As the data will be stored under Organization should be aware of the
of Data stored environment, encryption arrangements made by the service
mechanism should be strong enough provider about segregation of the
to segregate (separate) the data from data. The service provider should
another organization, whose data are display encryption schemes.
also stored under the sameserver.
Recovery of the Business continuity in case ofany Service provider have to provide
data disaster. complete restoration of data within
minimum time frame.
Long term In case of any major change in the Organization should ensure getting
viability cloud computing service provider, their data in case of such major event
the service provided is at the stake.
These are new trends in cybercrime that are coming up with mobile computing:
mobile commerce (M-commerce) and mobile banking (M-banking).
Mobile credit card transactions are now very common. Ever increasing power and
ever reducing prices of mobile hand held devices results in easy availability of
these gadgets.
Wireless credit card processing is a relatively new service that will allow person
to process credit cards electronically, virtually anywhere. Wireless credit card
processing is a very desirable system, because it allows business to process
transactions from mobile locations quickly, efficiently and professionally.
Traditional Techniques
The traditional credit card fraud is paper based fraud, Application fraud,
wherein a criminal uses stolen or fake documents such as utility bills and bank
statements that can build up useful Personally Identifiable Information (PII) to
open an accountin someone else’s name.
Illegal use of lost and stolen cards is another form of traditional technique.
Modern Techniques
Skimming
Site cloning and false merchant sites on the internet are becoming a popular
method of fraud and to direct the users to such fake sites is called phishing.
Triangulation
Triangulation: It is another method of credit card fraud.
The criminal offers the goods with heavy discounted rates through a
website hosted by him.
The customer registers on this website with his/her name and other
valid details like credit card number.
The criminal orders the goods from website with the help of stolen
credit card details
The criminal keeps on purchasing other goods with the card.
The above fig shows the basic flow of transactions involved in purchases done
using credit cards.
Credit card companies give some security tips for consumers,
Do’s
Put your signature on the card immediately upon its receipt.
Make the photocopy of both the sides of your card and preserve it at a safe
place.
Change the PIN before doing any transaction.
Always carry the details about contact number of bank.
Keep an eye on your card during the transaction.
Preserve all the receipts to compare with credit card invoice.
Destroy all the receipt after reconcile.
Report the loss of the card immediately.
Don’ts
Store your card number and PIN in your cell.
Lend your cards to anyone.
Leave cards or transaction receipt lying around.
Step 1: Call your credit card company and let them know about the incident
Step 2: Meanwhile, reset your PINs and passwords
Step 3: File a General Diary at your nearest police station
Step 4: Keep an eye on your credit card statements
Step 5: Monitor your e-commerce websites for any unauthorized purchase
Situations like this are very difficult, but losing your temper is not the solution. As
you have to perform a series of procedures to report the incident. Here are some things
to remember when reporting a scam.
Take screenshots of the SMS/ email you get after reporting to the bank.
Ask the bank to provide a complaint reference number.
Record your conversation with the bank.
Follow up the call with an email mentioning the reference number.
Being a victim of any kind of credit card scam is very common these days. Hence it is
necessary to keep yourself updated with the process of reporting such crimes.