There are three types of attacks against computer systems: Physical, Syntactic and Semantic. A physical attack uses conventional weapons, such as bombs or even fire to destroy. A syntactic attack uses virus-type software to disrupt or damage a computer system or network. A semantic attack is a more subtle approach. Its goal is to attack users’ confidence by causing a computer system to produce errors and unpredictable results.
Syntactic attacks are sometimes grouped under the term “malicious software” or “malware”. These attacks may include viruses, worms, and Trojan horses. One common vehicle of delivery formal ware is email.
Semantic attacks involve the modification of information or dissemination of incorrect information. Modification of information has been perpetrated even without the aid of computers, but computers and networks have provided new opportunities to achieve this. Also, the dissemination of incorrect information to large numbers of people quickly is facilitated by such mechanisms as email, message boards, and websites
Hacking tricks can be divided into different categories elaborated below:
1. Trojan programs that share files via instant messenger.
3. Fake Websites.
6. Electronic Bulletin Boards
7. Information Brokers
8. Internet Public Records
9. Trojan Horses
10. Wormhole Attack
Trojan programs that share files via instant messenger
Instant messaging allows file sharing on a computer. All present popular instant messengers have file-sharing abilities, or allow users to have the above functionality by installing patches or plug-ins; this is also a major threat to present information security. This type of communication software also makes it difficult for existing anti-virus software designed to prevent hacking to be successful. Hackers use instant communication software like this to plant Trojan programs into an unsuspected program; the planted program is a remotely controlled hacking tool that can conceal itself o n a d e v i c e and is unauthorized. The Trojan program is unknowingly executed, controlling the
infected computer; it can read, delete, move and execute any file on the computer. The advantages of a hacker replacing remotely installed backdoor Trojan programs with instant messengers to access files are: When the victim gets online, the hacker will be informed. Thus, a hacker can track and access the infected computer, and incessantly steal user information.
A hacker needs not open a new port to perform transmissions; he can perform his operations through the already opened instant messenger port. Even if a computer uses dynamic IP addresses, its screen name doesn’t change.
Hijacking and Impersonation
There are various ways through which a hacker can impersonate other users. The most commonly used method is eavesdropping on unsuspecting users to retrieve user accounts, passwords and other user related information.
The theft of user account number and related information is a very serious problem in any instant messenger. For instance, a hacker after stealing a user’s information can impersonate the user; the user’s contacts not knowing that the user’s account has been hacked will believe that the person they’re talking to is the user, and then can be persuaded to execute certain programs or reveal confidential information. Hence, theft of user identity not only endangers a user but also surrounding users. Guarding against Internet security problems is presently the focus of future research; because without good protection, a computer can be easily attacked, causing major losses.
Hackers wishing to obtain user accounts may do so with the help of Trojans designed to steal passwords. If an instant messenger client stores his/her password on his/her computer, then a hacker can send a Trojan program to the unsuspecting user. When the user executes the program, the program shall search for the user’s password and send it to the hacker. There are several ways through which a Trojan program can send messages back to the hacker. The methods include instant messenger, IRC, emails, etc. Currently, the four most popular instant messengers are Facebook, Yahoo! Messenger, ICQ, and MSN Messenger, none of which encrypts its flow. Therefore,
a hacker can use a man-in-the-middle attack to hijack a connection, then impersonate the hijacked user and participate in a chat session.
Denial of Service
There are many ways through which a hacker can launch a denial of service (DoS) attack on an instant messenger user. A Partial DoS attack will cause a user end to hang, or use up a large portion of CPU resources causing the system to become unstable.
There are many ways in which a hacker can cause a denial of service on an instant messenger client. One common type of attack is flooding a particular user with a large number of messages. The popular instant messaging clients contain protection against flood-attacks by allowing the victim to ignore certain users. However, there are many tools that allow the hacker to use many accounts simultaneously, or automatically create a large number of accounts to accomplish the flood-attack. Adding to this is the fact that once, the flood-attack has started and the victim realizes what has happened, the computer may become unresponsive. Therefore, adding the attacking user accounts to the ignore list of the instant messenger client may be very difficult DoS attacks are very easy to generate and very difficult to detect, and hence are attractive weapons for hackers. In a typical DoS attack, the attacker node spoofs its IP address and uses multiple intermediate nodes to overwhelm other nodes with traffic. DoS attacks are typically used to take important servers out of action for a few hours, resulting in DoS for all users served by the server. It can also be used to disrupt the services of intermediate routers.
The word phishing comes from the analogy that Internet scammers are using email lures to fish for passwords and financial data from the sea of Internet users. The term was coined in 1996 by hackers who were stealing AOL Internet accounts by scamming passwords from unsuspecting AOL users. Since hackers have a tendency to replace “f’” with “ph” the term phishing was derived.
Phishing is a method that exploits people’s sympathy in the form of aid-seeking emails; the e-mail act as bait. These e-mails usually request their readers to visit a link that seemingly links to some charitable organization’s website, but in truth links the readers to a website that will install a Trojan program into the reader’s computer.
Therefore, users should not forward unauthenticated charity emails, or click on unfamiliar links in an e-mail. Sometimes, the link could be a very familiar link or an often frequented website, but still, it would be safer if you’d type in the address yourself so as to avoid being linked to a fraudulent website. Phisher deludes people by using similar e-mails mailed by well-known enterprises or banks; these e-mails often ask users to provide personal information, or result in losing their personal rights; they usually contain a counterfeit URL which links to a website where the users can fill in the required information. People are often trapped by phishing due to inattention.
Phishing techniques can be divided into different categories, some of which are explained below:
Most methods of phishing use some form of technical deception designed to make a link in an email (and the spoofed website it leads to) appear to belong to the spoofed organization. Misspelled URLs or the use of subdomains are common tricks used by phishers, such as this example URL, http://www.yourbank.com.example.com/. Another common trick is to make the anchor text for a link appear to be valid, when the link actually goes to the phishers’ site.
An old method of spoofing used links containing the ‘@’ symbol, originally intended as a way to include a username and password (contrary to the standard). For example, the link http://email@example.com/might deceive a casual observer into believing that it will open a page on www.google.com. Whereas it actually directs the browser to a page on members.tripod.com, using a username of www.google.com: the page opens normally, regardless of the username supplied. Such URLs were disabled in Internet Explorer, while the Mozilla and Opera web browsers opted to present a warning message and give the option of continuing to the site or canceling.
A further problem with URLs has been found in the handling of Internationalized domain names (lDN) in web browsers, that might allow visually identical web addresses to lead to different, possibly malicious, websites. Despite the publicity surrounding the flaw, known as IDN spoofing or a homograph attack, no known phishing attacks have yet taken advantage of it. Phishers have taken advantage of a similar risk, using open URL redirectors on the websites of trusted organizations to disguise malicious URLs with a trusted domain.
Phishers have often used images instead of text to make it harder for anti-phishing filters to detect text commonly used in phishing emails.
An attacker can even use flaws in a trusted website’s own script against the victim. These types of attacks (known as cross-site scripting) are particularly problematic because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, although it is very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against Pay Pal.
A Universal Man-in-the-middle Phishing Kit, discovered by RSA Security, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site.
Not all phishing attacks require a fake website. Messages that claimed to be from a bank told users to dial a phone number regarding problems with their bank accounts. Once the phone number (owned by the phisher, and provided by a voice over IP service) was dialed, prompts told users to enter their account numbers and PIN. Voice phishing sometimes uses fake caller-ID data to give the appearance that calls come from a trusted organization.
One strategy for combating phishing is to train people to recognize phishing attempts, and to deal with them. Education can be promising, especially where training provides direct feedback.
People can take steps to avoid phishing attempts by slightly modifying their browsing habits. When contacted about an account needing to be “verified” (or any other topic used by phishers), it is a sensible precaution to contact the company from which the email apparently originates to check that the email is legitimate.
Alternatively, the address that the individual knows is the company’s genuine website can be typed into the address bar of the browser, rather than trusting any hyperlinks in the suspected phishing message.
Anti-phishing measures have been implemented as features embedded in browsers, as extensions or toolbars for browsers, and as part of website login procedures. The following are some of the main approaches to the problem.
Helping to identify legitimate sites
Since phishing is based on impersonation, preventing it depends on some reliable way to determine a website’s real identity. For example, some anti-phishing toolbars display the domain name for the visited website. The pet-name extension for Firefox lets users type in their own labels for websites, so they can later recognize when they have returned to the site. If the site is suspect, then the software may either warn the user or block the site outright.
Fake bank websites stealing account numbers and passwords have become increasingly common with the growth of online financial transactions. Hence, when using online banking, we should take precautions like using a secure encrypted customer’s certificate, surf the net following the correct procedure, etc.
First, the scammers create a similar website homepage; then they send out e-mails with enticing messages to attract visitors. They may also use fake links to link internet surfers to their website. Next, the fake website tricks the visitors into entering their personal information, credit card information or online banking account number and passwords. After obtaining a user’s information, the scammers can use the information to drain the bank accounts, shop online or create fake credit cards and other similar crimes.
Usually, there will be a quick search option on these fake websites, luring users to enter their account number and password. When a user enters their account number and password, the website will respond with a message stating that the server is under maintenance. Hence, we must observe the following when using online banking:
Observe the correct procedure for entering a banking website. Do not use links resulting from searches or links on other websites.
Online banking certifications are currently the most effective security safeguard measure.
Do not easily trust e-mails, phone calls, and short messages, etc. that asks for your account number and passwords.
Phishers often impost a well-known enterprise while sending their e-mails by changing the sender’s e-mail address to that of the well known enterprise, in order to gain people’s trust. The ‘From’ column of an e-mail is set by the mail software and can be easily changed by the web administrator. Then, the Phisher creates a fake information input website, and send out e-mails containing a link to this fake website to lure e-mail recipients into visiting his fake website. Most Phishers create imitations of well-known enterprises websites to lure users into using their fake websites.
Internet Explorer 9 and Firefox both have sophisticated filters that can detect most fake websites.
Here are some other clues that might give away a fake:
• Look for evidence of a real-world presence: an address, a phone number, an email contact. If in doubt, send an email, make a phone call or write a letter to establish whether they really exist.
• The website’s address is different from what you are used to, perhaps there are extra characters or words in it or it uses a completely different name or no name at all, just numbers.
• Right-clicking on a hyperlink and selecting “Properties” should reveal a link’s true destination – beware if this is different from what is displayed in the email.
• Even though you are asked to enter private information there is NO padlock in the browser window or ‘https://’ at the beginning of the web address to signify that it is using a secure link and that the site is what it says it is.
• A request for personal information such as username, password or other security details IN FULL, when you are normally only asked for some of them.
• Although rare, it is possible for your computer to be corrupted by viruses in such a way that you can type a legitimate website address into your browser and still end up at a fake site. This problem is known as ‘pharming’. Check the address in your browser’s address bar after you arrive at a website to make sure it matches the address you typed. Subtle changes (‘eebay’ instead of ‘ebay’ for example) may indicate that your computer is a victim of a pharming attack.
Similar in nature to phishing, Pharming (pronounced farming) is a Hacker’s attack aiming to redirect a website’s traffic to another, bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of a vulnerability in DNS server software. DNS servers are computers responsible for resolving Internet names into their real addresses – they are the “signposts” of the Internet. Compromised DNS servers are sometimes referred to as “poisoned”. The term pharming is a word play on farming and phishing. The term phishing refers to social engineering attacks to obtain access credentials such as user names and passwords. In recent years pharming has been used to steal identity information. Pharming has become of major concern to businesses hosting ecommerce and online banking websites.
A technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host. To engage in IP spoofing, a hacker must first use a variety of techniques to find an IP address of a trusted host and then modify the packet headers so that it appears that the packets are coming from that host.
A closely interconnected and often confused term with phishing and pharming is spoofing. A “spoofer”, in Internet terms, is defined generally as the “cracker” who alters, or “forges”, an e-mail address, pretending to originate a message from a different source address than that which he or she truly has. There are many ways an attacker may do this, and there are many types of attacks. The attacker may do this to gain access to a secured site that would accept the “hijacked” address as one of few permissible addresses, or more maliciously, the reason may be to hide the source of any type of attack. Email spoofing is often an attempt to trick the user into making a damaging statement or releasing sensitive information (such as passwords).
Spoofing Attacks Techniques
Spoofing attacks can be divided into different categories, some of which are elaborated below:
Man-in-the-middle attack and Internet protocol spoofing
An example from cryptography is the man-in-the-middle attack, in which an attacker spoofs Alice into believing they’re Bob, and spoofs Bob into believing they’re Alice, thus gaining access to all messages in both directions without the trouble of any.
Spyware is computer software that can be used to gather and remove confidential information from any computer without the knowledge of the owner. Everything the surfer does online, including his passwords, may be vulnerable to spyware. Spyware can put anyone in great danger of becoming a victim of identity theft. Moreover, some forms of spyware can be installed on the computer from a remote location without the identity thief ever having physical access to the victim’s computer.
While the term spyware suggests software that secretly monitors the user’s behavior, the functions of spyware extend well beyond simple monitoring. Spyware programs can collect various types of personal information, but can also interfere with user control of the computer in other ways, such as installing additional software, redirecting Web browser activity, accessing websites blindly that will cause more harmful viruses, or diverting advertising revenue to a third party. Spyware can even change computer settings, resulting in slow connection speeds, different home pages, and loss of Internet or other programs. In an attempt to increase the understanding of spyware, a more formal classification of its included software types is captured under the term privacy-invasive software.
In response to the emergence of spyware, a small industry has sprung up dealing with anti-spyware software. Running anti-spyware software has become a widely recognized element of computer security best practices for Microsoft Windows desktop computers. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user’s computer.
Routes of infection
Spyware does not directly spread in the manner of a computer virus or worm: generally, an infected system does not attempt to transmit the infection to other computers. Instead, spyware gets on a system through deception of the user or through an exploitation of software vulnerabilities.
Most spyware is installed without users’ knowledge. Since they tend not to install software if they know that it will disrupt their working environment and compromise their privacy, spyware deceives users, either by piggybacking on a piece of desirable software such as Kazaa or Limewire, tricking them into installing it (the Trojan horse method). Some “rogue” anti-spyware programs masquerade as security software, while being spyware themselves. The distributor of spyware usually presents the program as a useful utility – for instance as a “Web accelerator” or as a helpful software agent. Users download and install the software without immediately suspecting that it could cause harm.
Spyware can also come bundled with shareware or other downloadable software, as well as music CDs. The user downloads a program and installs it, and the installer additionally installs the spyware. Although the desirable software itself may do no harm, the bundled spyware does. In some cases, spyware authors have paid shareware authors to bundle spyware with their software. In other cases, spyware authors have repackaged desirable free software with installers that add spyware.
A third way of distributing spyware involves tricking users by manipulating security features designed to prevent unwanted installations. Internet Explorer prevents web sites from initiating an unwanted download. Instead, it requires a user action, such as clicking on a link. However, links can prove deceptive: for instance, a pop-up ad may appear like a standard Windows dialog box. The box contains a message such as “Would you like to optimize your Internet access?” with links which look like buttons reading Yes and No. No matter which “button” the user presses, a download starts, placing the spyware on the user’s system. Later versions of Internet Explorer offer fewer avenues for this
Bhardwaj, M. (2011). Types of Hacking Attacks. Retrieved from International Journal of Education Planning and Administration on November 1st, 2014
McAfee, J. (2014). Methods of Hacking Personal Information. Retrieved from McAfee Institute on November 1st, 2014.