Page 27 - CyberSecurityEssentialsEnglish
P. 27

✓  It starts with infecting a targeted PC through an exploit;
           ✓  This infection enables the attackers to access the victim's PC to encrypt his data;
           ✓  After getting paid the hackers may decrypt the data but usually, they don't do this.
           ✓
























                                             Figure 14 Ransomware infection scenario
       Email Spoofing attacks trick recipients into believing they are speaking with someone they know. For instance, the
       hacker might fake an employee's email address to gain crucial data. Figure 15 shows a spoofing attack scenario where:

           ✓  Maha got infected with malware
           ✓  The malware collects the email addresses of her colleagues.
           ✓  Then the malware sends an email from one account to another asking for private information.






















                                               Figure 15 Spoofing attack scenario


       Exploit kit injection is a toolkit to attack system weaknesses so they can spread malware or carry out other unwanted
       actions. It has a four-stage execution process (figure 16) that begins with:

           ✓  Contact: the attacker typically sends spam emails and uses social engineering techniques to persuade people
               to click on a link to their exploit service kit.
           ✓  Redirecting: the exploit kit generator starts searching for victims with specified criteria.
           ✓  Exploit: once the victims open the page with the exploit kit, it leverages the vulnerabilities then the attack
               starts.
           ✓  Infect: in this step, the attacker can run malware on the victim's computer


          25
   22   23   24   25   26   27   28   29   30   31   32