Module 3 Threats and Attacks On Endpoints
Module 3 Threats and Attacks On Endpoints
Module 3 Threats and Attacks On Endpoints
to Network Security
Fundamentals, 7th Edition
Module 3: Threats and Attacks
on Endpoints
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. A
ll Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in
Module Objectives
By the end of this module, you should be able to:
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attacks Using Malware
• Malware is software that enters a computer system without the user’s knowledge or
consent and then performs an unwanted and harmful action
• Malware is most often used as the general term that refers to a wide variety of damaging
software programs
• Malware is continually evolving to avoid detection by improved security measures
• One attempt at classifying the diverse types of malware can be to examine the primary
action that the malware performs:
• Imprison
• Launch
• Snoop
• Deceive
• Evade
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Imprison (1 of 4)
• Some types of malware attempt to take away the freedom of the user to do what they want
• Types of malware that imprisons are ransomware and cryptomalware
• Ransomware
• Ransomware prevents a user’s endpoint device from properly and fully functioning until
a fee is paid
• Some ransomware pretends to come from a law enforcement agency while others
pretend to come from a software vendor and displays a fictitious warning that a license
has expired
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Imprison (2 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Imprison (3 of 4)
• Cryptomalware
• Cryptomalware is a type of malware that imprisons users and encrypts all files on the
device so that none of them can be opened
• The cost for the key to unlock the cryptomalware increases every few hours or days
• New variants of cryptomalware encrypt all files on any network or attached device
connected to that computer
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Imprison (4 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Launch (1 of 5)
• Malware that infects a computer to launch attacks on other computers includes a virus,
worm, and bot
• Virus
• There are two types of viruses: a file-based virus and a fileless virus
• A file-based virus is malicious code that is attached to a file that reproduces itself on the
same computer without any human intervention
• An armored file-based virus goes to great lengths to avoid detection
• Techniques include split infection and mutation
• The virus first unloads a payload to perform a malicious action, then the virus replicates
itself by inserting its code into another file (on the same computer)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Launch (2 of 5)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Launch (3 of 5)
• A fileless virus does not attach itself to a file but instead takes advantage of native services
and processes that are part of the OS to avoid detection and carry out its attacks
• It does not infect a file, instead the code is loaded directly in the computer’s random
access memory (RAM)
• Advantages of a fileless virus over a file-based virus:
• Easy to infect
• Extensive control
• Persistent
• Difficult to detect
• Difficult to defend against
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Launch (4 of 5)
• Worm
• A worm is a malicious program that uses a computer network to replicate (sometimes
called a network virus)
• Designed to enter a computer through the network and then take advantage of a
vulnerability in an application or an OS on the host computer
• Today’s worms can leave behind a payload on the systems they infect and cause harm,
much like a virus
• Actions that worms have performed include deleting files on the computer or allowing the
computer to be remotely controlled by an attacker
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Launch (5 of 5)
• Bot
• Another type of malware allows the infected computer to be placed under the remote
control of an attacker for the purpose of launching attacks
• The infected robot computer is known as a bot or zombie
• When hundreds, thousands, or even millions of bot computers are gathered into a logical
computer network, they create a botnet under the control of a bot herder
• Infected bot computers receive instructions through a command and control (C&C)
structure from the bot herders
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Snoop (1 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Snoop (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Deceive (1 of 2)
• Some malware attempts to deceive the user and hide its true intentions
• Examples include potentially unwanted programs (PUPs), Trojans, and remote access
Trojans (RATs)
• Potentially Unwanted Program (PUP)
• A PUP is software that the user does not want on their computer
• Examples of PUPs:
• Advertising that obstructs content or interferes with web browsing, pop-up windows,
pop-under windows, search engine hijacking, home page hijacking, etc
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Deceive (2 of 2)
• Trojan
• A computer Trojan is an executable program that masquerades as performing a benign
activity but also does something malicious
• Remote Access Trojan (RAT)
• A RAT has the basic functionality of a Trojan but also gives the threat agent unauthorized
remote access to the victim’s computer by using specially configured communication
protocols
• This creates an opening to the victim’s computer allowing the threat agent unrestricted
access
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Evade
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 1: Answer
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Application Attacks
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Scripting
• In a cross-site scripting (XSS) attack, a website that accepts user input without validating
it and uses that input in a response can be exploited
• An attacker can take advantage in an XSS attack by tricking a valid website into feeding a
malicious script to another user’s web browser
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Injection
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Request Forgery (1 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Request Forgery (2 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Request Forgery (3 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Request Forgery (4 of 4)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Replay
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attacks on Software (1 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attacks on Software (2 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Attacks on Software (3 of 3)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 2: Answer
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Adversarial Artificial Intelligence Attacks
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
What Are Artificial Intelligence (AI) and Machine
Learning (ML)?
• The definitions of AI vary, but AI may be defined as technology that imitates human abilities
• A recognized subset of AI is machine learning (ML)
• ML is defined as “teaching” a technology device to “learn” by itself without the continual
instructions of a computer programmer
• ML also involves learning through repeated experience
• If something attempted does not work, then it determines how it could be changed to
make it work
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Uses in Cybersecurity (1 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Uses in Cybersecurity (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Risks in Using AI and ML in Cybersecurity
• Risks associated with using AI and ML are called adversarial artificial intelligence
• The first risk is the security of ML algorithms
• These could be attacked and compromised, allowing threat actors to alter algorithms to
ignore attacks
• Another risk is tainted training data for machine learning
• Attackers can attempt to alter the training data that is used by ML in order to produce
false negatives to cloak themselves
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Knowledge Check Activity 3: Answer
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Self-Assessment
1. Use the knowledge about malware you gained from this module to answer the following
question: With the trend towards employees working from home, which type of malware do
you think presents the most risk for organizations and their employees? Why? What are
some things that can be done to mitigate the risks?
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (1 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
Summary (2 of 2)
Mark Ciampa, CompTIA Security+ Guide to Network Security Fundamentals, 7th Edition. © 2022 Cengage. All Rights
Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.