Thursday, May 25, 2017

Cyber-Combat


Challenging cybersecurity monitoring. Pre-existing use cases or rule-based conditions are not sufficient to capture the new model threat actors. A smart threat hunter is more important than the tools. The attacker scenarios have been changing from attack to attack. The reason I believed vast coding or free tools available on the web. It is much more challenging in the future.


Upatre:  The Trojan propagates through spam emails. The attackes may include links to the malware in the emails. embed the malware into attached files, or the malware in attached password-protected archives. The malware usually disguises itself using the icon of a legitimate file, such as Adobe Acrobat or Reader.

DDoS Attack on  DNS Provider disrupts Okta, Twitter, Pinterest, Reddit, CNN, Others

Brief  but Widespread attack illuminated vulnerabilit of the internets (Domain Name Syster)DNS infrastructure. A major distributed Denial of Service (DDoS) attack on Internet Domain Service provider Dyne in the early morning hours on the East Coast today disrupted major websites -including okta, cnn and provided a grim reminder of the vulnerability of a key element of the internet's infrastructure.

Sinkhole Attack on Wireless Sensors Network(WSN):Sinkhole attack is a type of attack were compromised node tries to attract network traffic by advertise its fake routing update. One of the impacts of sinkhole attack is that, it can be used to launch other attacks like selective forwarding attack, acknowledge spoofing attack and drops or altered routing information.

   Attack on Mint Routing Protocol. A data node has called neibhor. A compromised node metrix hope count is always low. Ask other nodes to let go through the traffic I Am idle.

MintRoute protocol is a type of protocol which is commonly used in wireless sensor network. It was designed purposly  for the wireless sensor network. It is light and suitable for sensor nodes which have minimum storage capacity, low computation power and limited power supply. MintpRoute Protocol uses link quality as a metric to choose the best route to send packet to the Base Station.

  Insider attack and outsider attack are two categories of attack in wireless sensor network. Outside attack is when intruder is not part of network. In inside attack the intruder compromised one of the legitimate node through node temperating or through  weakness in its system software then compromised node inject false information in network after listen to secret information. Inside attack can disrupt  the network by modifying routing packet. Through compromised node sinkhole attack attract nearly all the traffic from particular area after making that compromised node attractive to other nodes.  

  The fact is that compromised node possesses adequate  access privilege in the network  and has acknowledge pertaining to valuable information about the network topology this created challenges in detecting. Base to that situation even cryptographic cannot defend against insider attack although it provides integrity, confidentiality and authentation. Therefore the internal attack has more serious impact on victim system compared to outsider attack.


https://arxiv.org/ftp/arxiv/papers/1505/1505.01941.pdf

IntSight Isreal: It is a cyber security awarens news and actions moreever focused on Incident Investigation rather than Incident Research. As per wikileaks CIA hacking tool is Vault7

No comments:

Post a Comment