Page 63 - Cyber Warnings
P. 63
• In addition, preventative and detective security controls are extremely important and can be
implemented with real-time alerts on password access and approval workflows.
Threat 6: Malware Attack
• A malware attack uses software to disrupt a computer system by stealing sensitive
information, spying on computer users, displaying unwanted advertisements and gaining
access to private systems. These attacks can also be used to extort money and even harm
a system.
• 97 percent of public and private companies surveyed by Ponemon in 2015 reported to be
victims of a malware attack.
Threat 7: Privilege Escalation Attack (EoP)
• In a privilege escalation attack, otherwise known as an EoP, an attacker creates a bug that
tricks the system into believing that they have legitimate administrative privileges. In turn,
the hacker can gain access to protected resources, open files, change user accounts,
destroy an Active Directory and more.
Threat 8: IP Attack
• In an IP attack, the attacker overloads targets with traffic from multiple spoofed addresses,
sending the system more data than it can handle. IP attacks can also transmit a packet to
the sender when another machine receives a packet, flooding the target’s IP address.
Combat: Defeat Malware, IP and EoP Attacks
• One of the most useful features to combat malware, IP and privilege escalation attacks is a
context-rich audit trail, which investigators can use to monitor AD users and actions.
It juxtaposes important information (such as the admin actions on the account, the account’s
remote access from an unfamiliar IP, and the account lockout) to differentiate related
security events and expose insider jobs.
Threat 9: Botnet Attacks
• A botnet attack consists of a group of compromised computers that are remotely controlled
by a hacker who attempts to infect and control machines by hitting them with malware and
sending spam emails, viruses, etc. Usually a botnet cybercriminal controls the machines
through a covert channel, such as Internet Relay Chat.
63 Cyber Warnings E-Magazine – May 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide