SlideShare a Scribd company logo
1 of 14
Download to read offline
Page title appears here

Anatomy of a cyber-attack

This is placeholder body copy. Ebit doloreici te quo
invendit maio. Eolesequi se debis dici simi olum
volupta denestoria verem del erumquidit, sumquia
voluptate laborem sitatia qui invendit maio. Et
nulparum num sandites es as exeratur sum aliqui
porectiatur, cum evendi dest faceat raest, a poritis
doluptionsed ea cum and toolsant cyber-criminals—and how to stop themeicabor umquam ipsanda ntotasi
dem quo qui re
The strategies quiae et of dis alit, et perum
fuga. It pel ipsunt mo quunt.
quiae vere adi reces etur suntionsequi repersperum
la sequi solesequi se debis dici simi
Borehen imolum voluptate laborem sitatia qui
Table of contents
Introduction	2
Attack step 1: Reconnaissance and enumeration	
3
Attack step 2: Intrusion and advanced attacks	
4
Attack step 3: Malware insertion	
5
Malware type 1: Nuisance malware	
6
Malware type 2: Controlling malware	
7
Malware type 3: Destructive malware	
8
Attack step 4: Clean-up	
9
Dell SonicWALL Next-Generation Firewall	
10
Dell SonicWALL comprehensive integrated security solutions	
12

1

2012 Dell SonicWALL. All rights reserved..
Introduction
As the number and severity of cyber-crimes
continues to grow, it’s important to understand the
steps cyber-criminals take to attack your network,
the types of malware they use, and the tools you
need to stop them. The basic steps of a cyber attack
include reconnaissance (finding vulnerabilities);
intrusion (actual penetration of the network);
malware insertion (secretly leaving code behind);
and clean-up (covering tracks).

Malware comes in various forms, some more
nefarious than others, ranging from annoying sales
pitches to potentially business-devastating assaults.
Dell SonicWALL offers comprehensive solutions to
counter every stage of cyber attacks and eliminate
every type of malware from disrupting your business
network.

You need to understand the enemy
before you can defeat them.

2

2012 Dell SonicWALL. All rights reserved..
Attack step 1: Reconnaissance and enumeration
The goal of reconnaissance is to learn about
vulnerabilities in the targeted network and systems,
including credentials, software versions, and
misconfigured settings. One method for gathering
this information is through social engineering cons,
which fool end users into surrendering data. This
is often perpetrated through phishing (fraudulent
email), pharming (fraudulent web sites) and driveby pharming (redirected DNS settings on hijacked
wireless access points).

Enumeration, the second step in any type of cyberattack, surreptitiously expands the knowledge and
data gained during reconnaissance. Service scanning
and war dialing are popular during the enumeration
phase. Service scanning identifies network systems
and correlates known bugs and software weaknesses.
War dialing involves using an automated system to
call each of the telephone numbers owned by a
company in hopes of finding a modem which may
provide direct access to internal company resources.

Cyber-criminals will do anything
to find and exploit your weaknesses.

3

2012 Dell SonicWALL. All rights reserved..
Attack step 2: Intrusion and advanced attacks
Once attackers have identified and correlated
known vulnerabilities, they can exploit them to
penetrate the network. Even more dangerous are
sophisticated “zero-day” attacks, which exploit
software weaknesses that, while not publically
disclosed, may have been distributed on the black
market among attackers ranging from petty criminals
to transnational organized criminal gangs.

Another advanced form of malicious intrusion is the
denial-of-service (DoS) attack, which aims to render
networks inoperable by bombarding them with
external communications requests. Common DoS
attacks include smurf attacks, ping flood attacks,
ping-of-death attacks and SYN flood attacks.

Vulnerabilities
A stealthy intruder can access every
facet of your network systems.

4

2012 Dell SonicWALL. All rights reserved..

A stealthy intruder can access every
facet of your network systems.
Attack step 3: Malware insertion
After infiltrating a network, the next step in an attack
is to secretly insert malware in order to maintain
ongoing remote control over systems, and ultimately,
execute code within the network to achieve a
particular goal.

Inserted malware can be a nuisance (e.g., marketing
driven); controlling (to provide back door access or
remote control), or destructive (to cause intentional
harm or to cover the tracks of the attacker).

Hidden malware gives your attacker
the keys to your network.

5

2012 Dell SonicWALL. All rights reserved..
Malware type 1: Nuisance malware
Some types of malware are not overly malicious in
nature, but can cause annoyance and affect system
performance and productivity. Spyware, used to
collect and relay sensitive information back to its
distributor, also can be a major nuisance, typically
infecting web browsers rendering them nearly
inoperable. Spyware is often used for deceitful
marketing purposes, such as monitoring user activity
without their knowledge.

Adware, as the name implies, is typically used
to spread advertisements, providing some
type of financial benefit to the attacker. After
becoming infected by adware, the victim becomes
bombarded by pop-ups, toolbars and other types of
advertisements when attempting to use the infected
computer.

Nuisance adware can render
a system inoperable if not
removed properly.

6

2012 Dell SonicWALL. All rights reserved..

Vacation
Time Shares
Em re provid earum am saped explit quias enim unt
expe doluptat et occatiusam, que qui dolestion
reicitiisi nectam volupta tiorem. Ut magnis quias
restrun tionet quia auditatibus con nostibero quatiusa
simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam
facea nostem harum aut recus apiende expelit liquae
rera perrovidis alita. turit, aliquid modigni hitiae cones
re everat as as es a volupta speribea dus et ea ne sitat

DISCOUNT

$500 DISCOUNTS
PHARMACEUTICALS
Searching for bargain medication?
re provid earum am saped explit quias
enim unt expe doluptat et occatiusam, que
qui dolestion reicitiisi nectam volupta
tiorem. Ut magnis quias restrun tionet quia
auditatibus con nostibero quatiusa simi, et
magnam et prorepe ristionsecum qui
nonserum ipsa in conse dolupta tibusae est
haribusciam facea nostem harum aut recus

Mortgage AND SAVE!
BUY NOW

Insurance Coverage
Em re provid earum am saped explit quias enim unt expe
doluptat et occatiusam, que qui dolestion reicitiisi nectam
volupta tiorem. Ut magnis quias restrun tionet quia auditatibus
con nostibero quatiusa simi, et magnam et prorepe ristionsecum
qui nonserum ipsa in conse dolupta tibusae est haribusciam
facea nostem harum aut recus apiende expelit liquae rera
perrovidis alita. turit, aliquid modigni hitiae cones re everat as as es

REFINANCE

TODAY

Em re provid earum am saped explit quias
enim unt expe doluptat et occatiusam, que
qui dolestion reicitiisi nectam volupta
tiorem. Ut magnis quias restrun tionet quia
auditatibus con nostibero quatiusa simi, et
magnam et prorepe ristionsecum qui
nonserum ipsa in conse dolupta tibusae est
haribusciam facea nostem harum aut recus
apiende expelit liquae rera perrovidis alita.

NO FEES. NO

TERM LIFE
INSURANCE

Call our offices for a free re provid earum
am saped explit quias enim unt expe
doluptat et occatiusam, que qui dolestion
reicitiisi nectam volupta tiorem. Ut magnis
quias restrun tionet quia auditatibus con
nostibero quatiusa simi, et magnam et
POINTS
prorepe ristionsecum qui nonserum ipsa in
conse dolupta tibusae est haribusciam
Em re provid earum am saped explit quias harum aut recus apiende
facea nostem

Diamond
Jewerly

Price Your
Own Airfare

enim unt expe doluptat et occatiusam, que
qui dolestion reicitiisi nectam volupta
tiorem. Ut magnis quias restrun tionet quia

CALL TODAY FOR RATES

auditatibus
simi,
$500 DISCOUNTS etcon nostibero quatiusaqui et
magnam prorepe ristionsecum

nonserum ipsa in conse dolupta tibusae est

Em re provid earum am saped explit quias
haribusciam facea nostem harum aut recus
enim unt expe doluptat et occatiusam, que expelit liquae rera perrovidis alita.
apiende
qui dolestion reicitiisi nectam volupta
tiorem. Ut magnis quias restrun tionet quia
auditatibus con nostibero quatiusa simi, et
magnam et prorepe ristionsecum qui
nonserum ipsa in conse dolupta tibusae est
haribusciam facea nostem harum aut recus
apiende expelit liquae rera perrovidis alita.

Click here for a

FIRST 10
TRADES FREE

Sing up today re provid earum am saped explit
quias enim unt expe doluptat et occatiusam, que
qui dolestion reicitiisi nectam volupta tiorem. Ut
magnis quias restrun tionet quia auditatibus con

FREE

Em re provid earum am saped
explit quias enim unt expe
doluptat et occatiusam, que
qui dolestion reicitiisi nectam
volupta tiorem. Ut magnis
quias restrun tionet quia
auditatibus con nostibero
quatiusa simi, et magnam et
prorepe ristionsecum qui
nonserum ipsa in conse
dolupta tibusae est haribusciam facea nostem harum aut
recus apiende expelit liquae
rera perrovidis alita. turit,
aliquid modigni hitiae cones
re everat as as es a volupta
speribea dus et ea ne sitat

$100 OFF
YOUR NEXT
VISIT

Visit our website re provid earum am saped
explit quias enim unt expe doluptat et
occatiusam, que qui dolestion reicitiisi
nectam volupta tiorem. Ut magnis quias
restrun tionet quia auditatibus con
nostibero quatiusa simi, et magnam et
prorepe ristionsecum qui nonserum ipsa in
conse dolupta tibusae est haribusciam
facea nostem harum aut recus apiende
Malware type 2: Controlling malware
Other malware hides in wait to issue controls
or execute attacks. Trojans—executable code
embedded into another (typically commonly-used)
application—are often designed to be unknowingly
launched by a trusted user. Remote-access Trojans
(RATs) create back doors for remote control.

Rootkits are even more insidious. They hide in lowlevel, sub-OS system resources to provide attackers
with unrestricted network access, and can even go
undetected by conventional anti-virus solutions.
Trojans and rootkits are often used in creating
zombie systems, from which criminals can launch
outbound botnet attacks.

Hidden malware gives your attacker
the keys to your network.

7

2012 Dell SonicWALL. All rights reserved..
Malware type 3: Destructive malware
Typically designed to inflict damage, computer
viruses can purge an entire hard disk, rendering
data useless in a matter of moments. Commonly
spread through shared files, web downloads or
email attachments, viruses must be executed on
the target system before they actually pose a threat.
Once activated, viruses often replicate themselves
throughout the infected system. Seek-and-destroy
viruses target specific files types or portions of the
hard disk.

Unlike viruses, worms can spread themselves
throughout networks without user activation. Once
infected by a worm, the compromised system will
begin scanning the local network in an attempt
locate additional target systems. After locating a
target, the worm will exploit vulnerabilities in its
operating system, injecting it with malicious code.
While sometimes viewed as a nuisance, worms can
also spread other malware and inflict damage.

Viruses and worms can devastate
your network—and your business.

8

2012 Dell SonicWALL. All rights reserved..
Attack step 4: Clean-up
The final stage of the attack cycle is to rid the
infected system of forensic evidence. A proactive
element to this step is for attackers to be as
inconspicuous as possible in the earlier steps.
For example, an attacker may commandeer the
credentials of a trusted network user that would
not raise alarms by accessing the targeted systems,
or use commonplace applications, such as instant
messaging, to insert malicious files or extract
information.

A primary goal of this step is to erase any traces of
the attack from the system. This can be done by the
manual or automated deletion of command line or
event logs, deactivation of alarms, and the upgrade
or patching of outdated software after the attack has
been accomplished. Additionally, hackers and cyber
thieves often unleash viruses and worms to destroy
potentially incriminating evidence.

A skilled criminal can
compromise your network
without you ever knowing.

9

2012 Dell SonicWALL. All rights reserved..
Dell SonicWALL Next-Generation Firewall
Dell™ SonicWALL™ offers a comprehensive line
of defenses against all forms of cyber attack and
malware.
• Dell SonicWALL Next-Generation Firewalls,
featuring Reassembly-Free Deep Packet
Inspection® (RFDPI) technology and multi-core
parallel architecture, scan and analyze inbound
and outbound traffic to identify multiple threats,
applications and protocols, at wire speed and
without file size limitations.
• Using input from millions of shared touch points
in the Dell SonicWALL Global Response Intelligent
Defense (GRID) Network, the Dell SonicWALL
Threat Center provides continuous communication,
feedback, and analysis on the nature and changing
behavior of threats. Dell SonicWALL Research
Labs continuously processes this information,
proactively delivering countermeasures and
dynamic updates to stop the latest threats.

10

2012 Dell SonicWALL. All rights reserved..

• The Dell SonicWALL SuperMassive E10800 running
SonicOS 6.0 is the highest overall protection NextGeneration Firewall to earn the “Recommend”
rating from NSS Labs, the recognized leader in
independent security product testing. This single
code base for SonicOS is at the core of every Dell
Dell SonicWALL firewall, from the TZ 105 to the
Dell Dell SonicWALL SuperMassive E10800.
Dell SonicWALL Next-Generation Firewall
• The Dell SonicWALL Gateway Anti-Virus, AntiSpyware, Intrusion Prevention, and Application
Intelligence and Control Service delivers
intelligent, real-time network security protection
against the latest blended threats, including viruses,
spyware, worms, Trojans, software vulnerabilities
and other malicious code.
- Intrusion prevention service (IPS) prevents
attackers from exploiting known vulnerabilities
(Step 2 of the attack cycle)
- Gateway anti-virus and anti-spyware prevents
attackers from installing or uploading malware
to a compromised system (Step 3 of the
attack cycle)
- Application intelligence and control prevents
attackers from being able to use commonplace
applications to transmit data to or from the
compromised system (Step 4 of the attack cycle)

11

2012 Dell SonicWALL. All rights reserved..

• Working in conjunction with Dell SonicWALL
firewalls, Dell SonicWALL Enforced Client AntiVirus and Anti Spyware software provides
comprehensive gateway-enforced virus and
spyware protection for desktops and laptops.
Dell SonicWALL firewalls ensure that all of the
computers accessing the network have the latest
version of anti-virus and anti-spyware software
installed and active.
Dell SonicWALL comprehensive integrated security solutions
• Dell SonicWALL Clean Wireless™ integrates Dell
SonicWALL firewalls with universal 802.11 a/b/g/n
wireless access points, to deliver advanced security
features such as WiFiSec, Virtual APs (VAP), and
wireless intrusion detection services (WIDS).
• When combined with Dell SonicWALL Secure
Remote Access (SRA) solutions, Dell SonicWALL
firewalls create a Clean VPN™ that decrypts and
scans all authorized SSL VPN traffic for malware
before it enters the network, and adds enforced
authentication, data encryption, and granular
access policy.

12

2012 Dell SonicWALL. All rights reserved..

• The Dell SonicWALL Email Security Series provides
comprehensive email threat protection for
organizations of all sizes, stopping email-borne
spam, virus, and phishing attacks, while
contributing to internal policy and regulatory
compliance.
• Dell SonicWALL Application Traffic Flow Analytics,
including the Dell SonicWALL Global Management
System 7.0, Scrutinizer and Analyzer solutions,
increases threat awareness through real time and
historical traffic analysis and provides powerful
insight into application traffic, bandwidth utilization
and security threats along with powerful
troubleshooting and forensics capabilities.
How can I learn more?
• Download the whitepaper “The Wild World of Malware: Keeping Your Company Safe”
• View the webinar “Exploring the Digital Underworld: Botnets, Zero Day Threats and Phishing”
• Opt-in to receive Dell SonicWALL newsletters
For feedback on this e-book or other Dell SonicWALL e-books or whitepapers, please send an email to
feedback@sonicwall.com.
About Dell SonicWALL
Dell™ SonicWALL™ provides intelligent network security and data protection solutions that enable customers
and partners to dynamically secure, control, and scale their global networks. Securing any organization with
multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader
by Gartner and NSS Labs. For more information, visit the web site at www.sonicwall.com.

Copyright 2012 Dell, Inc. All rights reserved. Dell SonicWALL is a trademark of Dell, Inc. and all other Dell SonicWALL product and service names and slogans are
trademarks of Dell, Inc. Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective owners.
07/12 DSNWL 0090TM

More Related Content

What's hot

Strategies to Combat New, Innovative Cyber Threats - 2017
Strategies to Combat New, Innovative Cyber Threats - 2017Strategies to Combat New, Innovative Cyber Threats - 2017
Strategies to Combat New, Innovative Cyber Threats - 2017PaladionNetworks01
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks revetonMumbere Joab
 
Malicion software
Malicion softwareMalicion software
Malicion softwareA. Shamel
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attackAmna
 
The need for security
The need for securityThe need for security
The need for securitySaman Sara
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and MitigationNoel Waterman
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - KloudlearnKloudLearn
 
Flashpoint ransomware april2016
Flashpoint ransomware april2016Flashpoint ransomware april2016
Flashpoint ransomware april2016Andrey Apuhtin
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer securityWritingHubUK
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N GHafizra Mas
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftSchipul - The Web Marketing Company
 

What's hot (20)

Strategies to Combat New, Innovative Cyber Threats - 2017
Strategies to Combat New, Innovative Cyber Threats - 2017Strategies to Combat New, Innovative Cyber Threats - 2017
Strategies to Combat New, Innovative Cyber Threats - 2017
 
Security threats
Security threatsSecurity threats
Security threats
 
Ransomware attacks reveton
Ransomware attacks revetonRansomware attacks reveton
Ransomware attacks reveton
 
Malicion software
Malicion softwareMalicion software
Malicion software
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
Ransomware
RansomwareRansomware
Ransomware
 
Ransomware
RansomwareRansomware
Ransomware
 
The need for security
The need for securityThe need for security
The need for security
 
Threat and Mitigation
Threat and MitigationThreat and Mitigation
Threat and Mitigation
 
What is a Malware - Kloudlearn
What is a Malware - KloudlearnWhat is a Malware - Kloudlearn
What is a Malware - Kloudlearn
 
Flashpoint ransomware april2016
Flashpoint ransomware april2016Flashpoint ransomware april2016
Flashpoint ransomware april2016
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
The process of computer security
The process of computer securityThe process of computer security
The process of computer security
 
Ict H A C K I N G
Ict    H A C K I N GIct    H A C K I N G
Ict H A C K I N G
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity TheftWatch Your Back: Let’s Talk Web Safety and Personal Identity Theft
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
 
Web server security challenges
Web server security challengesWeb server security challenges
Web server security challenges
 
Introduction to cyber security i
Introduction to cyber security iIntroduction to cyber security i
Introduction to cyber security i
 

Viewers also liked

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...wajug
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Papitha Velumani
 
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way Javier Tallón
 
Adversarial Pattern Classification
Adversarial Pattern ClassificationAdversarial Pattern Classification
Adversarial Pattern ClassificationPluribus One
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Malachi Jones
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackAujas
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesPriyanka Aash
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSKenny Huang Ph.D.
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Viewers also liked (18)

Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber attack
Cyber attackCyber attack
Cyber attack
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Types of cyber attacks
Types of cyber attacksTypes of cyber attacks
Types of cyber attacks
 
Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack Security evaluation of pattern classifiers under attack
Security evaluation of pattern classifiers under attack
 
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way
Vulnerability Analysis Taxonomy Achieving Completeness In A Systematic Way
 
Adversarial Pattern Classification
Adversarial Pattern ClassificationAdversarial Pattern Classification
Adversarial Pattern Classification
 
Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015Cyber_Attack_Forecasting_Jones_2015
Cyber_Attack_Forecasting_Jones_2015
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Cyber Attack Analysis
Cyber Attack AnalysisCyber Attack Analysis
Cyber Attack Analysis
 
Best!
Best!Best!
Best!
 
Achieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven MethodologiesAchieving Defendable Architectures Via Threat Driven Methodologies
Achieving Defendable Architectures Via Threat Driven Methodologies
 
Cyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoSCyber Attack Analysis : Part I DDoS
Cyber Attack Analysis : Part I DDoS
 
Cybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacksCybersecurity 2 cyber attacks
Cybersecurity 2 cyber attacks
 
Cluster analysis
Cluster analysisCluster analysis
Cluster analysis
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 

Similar to Anatomy of a cyber-attack

Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationJeff Zahn
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchersvicenteDiaz_KL
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersSpouse Ware
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programsAmmar Hasayen
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.Acageron
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette007rgmel
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideSarah Roberts
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.pptAndrew_Braza
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfxererenhosdominaram
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxMichael Montarde
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safetyPatricia bb
 

Similar to Anatomy of a cyber-attack (20)

Anatomy of a Cyber-Attack
Anatomy of a Cyber-AttackAnatomy of a Cyber-Attack
Anatomy of a Cyber-Attack
 
Thane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentationThane Barnier MACE 2016 presentation
Thane Barnier MACE 2016 presentation
 
Opsec for security researchers
Opsec for security researchersOpsec for security researchers
Opsec for security researchers
 
sanfranAIG3
sanfranAIG3sanfranAIG3
sanfranAIG3
 
The Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From HackersThe Best And Easiest Ways To Protect Yourself From Hackers
The Best And Easiest Ways To Protect Yourself From Hackers
 
IT viruses
 IT viruses IT viruses
IT viruses
 
Malware and malicious programs
Malware and malicious programsMalware and malicious programs
Malware and malicious programs
 
How to protect your computer from viruses.
How to protect your computer from viruses.How to protect your computer from viruses.
How to protect your computer from viruses.
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
virus
virusvirus
virus
 
Hacking And Virus.pptx
Hacking And Virus.pptxHacking And Virus.pptx
Hacking And Virus.pptx
 
online safety, security and rules of netiquette
online safety, security and rules of netiquetteonline safety, security and rules of netiquette
online safety, security and rules of netiquette
 
What is Ransomware? A Quick Guide
What is Ransomware? A Quick GuideWhat is Ransomware? A Quick Guide
What is Ransomware? A Quick Guide
 
Major Computer Virus Types to Watch Out
Major Computer Virus Types to Watch OutMajor Computer Virus Types to Watch Out
Major Computer Virus Types to Watch Out
 
Empowerment lesson 2.ppt
Empowerment lesson 2.pptEmpowerment lesson 2.ppt
Empowerment lesson 2.ppt
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdfComputer_Hacking_for_Beginners_Kevin_James_complex.pdf
Computer_Hacking_for_Beginners_Kevin_James_complex.pdf
 
Online Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptxOnline Safety, Security, Ethics and Etiquette Standards.pptx
Online Safety, Security, Ethics and Etiquette Standards.pptx
 
What is malware
What is malwareWhat is malware
What is malware
 
The internet and safety
The internet and safetyThe internet and safety
The internet and safety
 

More from Icomm Technologies

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks Icomm Technologies
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost StuctureIcomm Technologies
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceIcomm Technologies
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveIcomm Technologies
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.Icomm Technologies
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Icomm Technologies
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in TelecommutingIcomm Technologies
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksIcomm Technologies
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it Icomm Technologies
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deckIcomm Technologies
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm Technologies
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machinesIcomm Technologies
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesIcomm Technologies
 

More from Icomm Technologies (20)

The truth behind cyber attacks
The truth behind cyber attacks The truth behind cyber attacks
The truth behind cyber attacks
 
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
10 Key Action to Reduce IT Infrastructure and Operation Cost Stucture
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
Disaster Recovery
Disaster RecoveryDisaster Recovery
Disaster Recovery
 
The sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work forceThe sonic wall clean vpn approach for the mobile work force
The sonic wall clean vpn approach for the mobile work force
 
Mobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to SolveMobility, Security and the Enterprise: The Equation to Solve
Mobility, Security and the Enterprise: The Equation to Solve
 
The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.The only authentication platform you’ll ever need.
The only authentication platform you’ll ever need.
 
Swivel Secure and Office 365
Swivel Secure and Office 365Swivel Secure and Office 365
Swivel Secure and Office 365
 
Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365Swivel Secure, ADFS and Office 365
Swivel Secure, ADFS and Office 365
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Top 10 Trends in Telecommuting
Top 10 Trends in TelecommutingTop 10 Trends in Telecommuting
Top 10 Trends in Telecommuting
 
Controlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate NetworksControlling Laptop and Smartphone Access to Corporate Networks
Controlling Laptop and Smartphone Access to Corporate Networks
 
IT Security Trends in 2012
IT Security Trends in 2012IT Security Trends in 2012
IT Security Trends in 2012
 
Tackling consumerization of it
Tackling consumerization of it Tackling consumerization of it
Tackling consumerization of it
 
Office 365-technical-overview-deck
Office 365-technical-overview-deckOffice 365-technical-overview-deck
Office 365-technical-overview-deck
 
Icomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paperIcomm virtualisation-support-white-paper
Icomm virtualisation-support-white-paper
 
Icomm cloud-backup-overview
Icomm cloud-backup-overviewIcomm cloud-backup-overview
Icomm cloud-backup-overview
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Efficiently protect-virtual-machines
Efficiently protect-virtual-machinesEfficiently protect-virtual-machines
Efficiently protect-virtual-machines
 
Cloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devicesCloud backup-for-endpoint-devices
Cloud backup-for-endpoint-devices
 

Recently uploaded

Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerAggregage
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfJamesConcepcion7
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAScathy664059
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersPeter Horsten
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...ssuserf63bd7
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOne Monitar
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamArik Fletcher
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreNZSG
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...ssuserf63bd7
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingrajputmeenakshi733
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesAurelien Domont, MBA
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifeBhavana Pujan Kendra
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...Hector Del Castillo, CPM, CPMM
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressorselgieurope
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Jiastral oracle
 

Recently uploaded (20)

Driving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon HarmerDriving Business Impact for PMs with Jon Harmer
Driving Business Impact for PMs with Jon Harmer
 
WSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdfWSMM Media and Entertainment Feb_March_Final.pdf
WSMM Media and Entertainment Feb_March_Final.pdf
 
14680-51-4.pdf Good quality CAS Good quality CAS
14680-51-4.pdf  Good  quality CAS Good  quality CAS14680-51-4.pdf  Good  quality CAS Good  quality CAS
14680-51-4.pdf Good quality CAS Good quality CAS
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
EUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exportersEUDR Info Meeting Ethiopian coffee exporters
EUDR Info Meeting Ethiopian coffee exporters
 
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
Horngren’s Financial & Managerial Accounting, 7th edition by Miller-Nobles so...
 
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring CapabilitiesOnemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
Onemonitar Android Spy App Features: Explore Advanced Monitoring Capabilities
 
Technical Leaders - Working with the Management Team
Technical Leaders - Working with the Management TeamTechnical Leaders - Working with the Management Team
Technical Leaders - Working with the Management Team
 
Jewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource CentreJewish Resources in the Family Resource Centre
Jewish Resources in the Family Resource Centre
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
Intermediate Accounting, Volume 2, 13th Canadian Edition by Donald E. Kieso t...
 
digital marketing , introduction of digital marketing
digital marketing , introduction of digital marketingdigital marketing , introduction of digital marketing
digital marketing , introduction of digital marketing
 
Data Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and TemplatesData Analytics Strategy Toolkit and Templates
Data Analytics Strategy Toolkit and Templates
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Planetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in LifePlanetary and Vedic Yagyas Bring Positive Impacts in Life
Planetary and Vedic Yagyas Bring Positive Impacts in Life
 
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
How Generative AI Is Transforming Your Business | Byond Growth Insights | Apr...
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
Environmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw CompressorsEnvironmental Impact Of Rotary Screw Compressors
Environmental Impact Of Rotary Screw Compressors
 
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh JiPsychic Reading | Spiritual Guidance – Astro Ganesh Ji
Psychic Reading | Spiritual Guidance – Astro Ganesh Ji
 

Anatomy of a cyber-attack

  • 1. Page title appears here Anatomy of a cyber-attack This is placeholder body copy. Ebit doloreici te quo invendit maio. Eolesequi se debis dici simi olum volupta denestoria verem del erumquidit, sumquia voluptate laborem sitatia qui invendit maio. Et nulparum num sandites es as exeratur sum aliqui porectiatur, cum evendi dest faceat raest, a poritis doluptionsed ea cum and toolsant cyber-criminals—and how to stop themeicabor umquam ipsanda ntotasi dem quo qui re The strategies quiae et of dis alit, et perum fuga. It pel ipsunt mo quunt. quiae vere adi reces etur suntionsequi repersperum la sequi solesequi se debis dici simi Borehen imolum voluptate laborem sitatia qui
  • 2. Table of contents Introduction 2 Attack step 1: Reconnaissance and enumeration 3 Attack step 2: Intrusion and advanced attacks 4 Attack step 3: Malware insertion 5 Malware type 1: Nuisance malware 6 Malware type 2: Controlling malware 7 Malware type 3: Destructive malware 8 Attack step 4: Clean-up 9 Dell SonicWALL Next-Generation Firewall 10 Dell SonicWALL comprehensive integrated security solutions 12 1 2012 Dell SonicWALL. All rights reserved..
  • 3. Introduction As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them. The basic steps of a cyber attack include reconnaissance (finding vulnerabilities); intrusion (actual penetration of the network); malware insertion (secretly leaving code behind); and clean-up (covering tracks). Malware comes in various forms, some more nefarious than others, ranging from annoying sales pitches to potentially business-devastating assaults. Dell SonicWALL offers comprehensive solutions to counter every stage of cyber attacks and eliminate every type of malware from disrupting your business network. You need to understand the enemy before you can defeat them. 2 2012 Dell SonicWALL. All rights reserved..
  • 4. Attack step 1: Reconnaissance and enumeration The goal of reconnaissance is to learn about vulnerabilities in the targeted network and systems, including credentials, software versions, and misconfigured settings. One method for gathering this information is through social engineering cons, which fool end users into surrendering data. This is often perpetrated through phishing (fraudulent email), pharming (fraudulent web sites) and driveby pharming (redirected DNS settings on hijacked wireless access points). Enumeration, the second step in any type of cyberattack, surreptitiously expands the knowledge and data gained during reconnaissance. Service scanning and war dialing are popular during the enumeration phase. Service scanning identifies network systems and correlates known bugs and software weaknesses. War dialing involves using an automated system to call each of the telephone numbers owned by a company in hopes of finding a modem which may provide direct access to internal company resources. Cyber-criminals will do anything to find and exploit your weaknesses. 3 2012 Dell SonicWALL. All rights reserved..
  • 5. Attack step 2: Intrusion and advanced attacks Once attackers have identified and correlated known vulnerabilities, they can exploit them to penetrate the network. Even more dangerous are sophisticated “zero-day” attacks, which exploit software weaknesses that, while not publically disclosed, may have been distributed on the black market among attackers ranging from petty criminals to transnational organized criminal gangs. Another advanced form of malicious intrusion is the denial-of-service (DoS) attack, which aims to render networks inoperable by bombarding them with external communications requests. Common DoS attacks include smurf attacks, ping flood attacks, ping-of-death attacks and SYN flood attacks. Vulnerabilities A stealthy intruder can access every facet of your network systems. 4 2012 Dell SonicWALL. All rights reserved.. A stealthy intruder can access every facet of your network systems.
  • 6. Attack step 3: Malware insertion After infiltrating a network, the next step in an attack is to secretly insert malware in order to maintain ongoing remote control over systems, and ultimately, execute code within the network to achieve a particular goal. Inserted malware can be a nuisance (e.g., marketing driven); controlling (to provide back door access or remote control), or destructive (to cause intentional harm or to cover the tracks of the attacker). Hidden malware gives your attacker the keys to your network. 5 2012 Dell SonicWALL. All rights reserved..
  • 7. Malware type 1: Nuisance malware Some types of malware are not overly malicious in nature, but can cause annoyance and affect system performance and productivity. Spyware, used to collect and relay sensitive information back to its distributor, also can be a major nuisance, typically infecting web browsers rendering them nearly inoperable. Spyware is often used for deceitful marketing purposes, such as monitoring user activity without their knowledge. Adware, as the name implies, is typically used to spread advertisements, providing some type of financial benefit to the attacker. After becoming infected by adware, the victim becomes bombarded by pop-ups, toolbars and other types of advertisements when attempting to use the infected computer. Nuisance adware can render a system inoperable if not removed properly. 6 2012 Dell SonicWALL. All rights reserved.. Vacation Time Shares Em re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende expelit liquae rera perrovidis alita. turit, aliquid modigni hitiae cones re everat as as es a volupta speribea dus et ea ne sitat DISCOUNT $500 DISCOUNTS PHARMACEUTICALS Searching for bargain medication? re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus Mortgage AND SAVE! BUY NOW Insurance Coverage Em re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende expelit liquae rera perrovidis alita. turit, aliquid modigni hitiae cones re everat as as es REFINANCE TODAY Em re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende expelit liquae rera perrovidis alita. NO FEES. NO TERM LIFE INSURANCE Call our offices for a free re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et POINTS prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam Em re provid earum am saped explit quias harum aut recus apiende facea nostem Diamond Jewerly Price Your Own Airfare enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia CALL TODAY FOR RATES auditatibus simi, $500 DISCOUNTS etcon nostibero quatiusaqui et magnam prorepe ristionsecum nonserum ipsa in conse dolupta tibusae est Em re provid earum am saped explit quias haribusciam facea nostem harum aut recus enim unt expe doluptat et occatiusam, que expelit liquae rera perrovidis alita. apiende qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende expelit liquae rera perrovidis alita. Click here for a FIRST 10 TRADES FREE Sing up today re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con FREE Em re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende expelit liquae rera perrovidis alita. turit, aliquid modigni hitiae cones re everat as as es a volupta speribea dus et ea ne sitat $100 OFF YOUR NEXT VISIT Visit our website re provid earum am saped explit quias enim unt expe doluptat et occatiusam, que qui dolestion reicitiisi nectam volupta tiorem. Ut magnis quias restrun tionet quia auditatibus con nostibero quatiusa simi, et magnam et prorepe ristionsecum qui nonserum ipsa in conse dolupta tibusae est haribusciam facea nostem harum aut recus apiende
  • 8. Malware type 2: Controlling malware Other malware hides in wait to issue controls or execute attacks. Trojans—executable code embedded into another (typically commonly-used) application—are often designed to be unknowingly launched by a trusted user. Remote-access Trojans (RATs) create back doors for remote control. Rootkits are even more insidious. They hide in lowlevel, sub-OS system resources to provide attackers with unrestricted network access, and can even go undetected by conventional anti-virus solutions. Trojans and rootkits are often used in creating zombie systems, from which criminals can launch outbound botnet attacks. Hidden malware gives your attacker the keys to your network. 7 2012 Dell SonicWALL. All rights reserved..
  • 9. Malware type 3: Destructive malware Typically designed to inflict damage, computer viruses can purge an entire hard disk, rendering data useless in a matter of moments. Commonly spread through shared files, web downloads or email attachments, viruses must be executed on the target system before they actually pose a threat. Once activated, viruses often replicate themselves throughout the infected system. Seek-and-destroy viruses target specific files types or portions of the hard disk. Unlike viruses, worms can spread themselves throughout networks without user activation. Once infected by a worm, the compromised system will begin scanning the local network in an attempt locate additional target systems. After locating a target, the worm will exploit vulnerabilities in its operating system, injecting it with malicious code. While sometimes viewed as a nuisance, worms can also spread other malware and inflict damage. Viruses and worms can devastate your network—and your business. 8 2012 Dell SonicWALL. All rights reserved..
  • 10. Attack step 4: Clean-up The final stage of the attack cycle is to rid the infected system of forensic evidence. A proactive element to this step is for attackers to be as inconspicuous as possible in the earlier steps. For example, an attacker may commandeer the credentials of a trusted network user that would not raise alarms by accessing the targeted systems, or use commonplace applications, such as instant messaging, to insert malicious files or extract information. A primary goal of this step is to erase any traces of the attack from the system. This can be done by the manual or automated deletion of command line or event logs, deactivation of alarms, and the upgrade or patching of outdated software after the attack has been accomplished. Additionally, hackers and cyber thieves often unleash viruses and worms to destroy potentially incriminating evidence. A skilled criminal can compromise your network without you ever knowing. 9 2012 Dell SonicWALL. All rights reserved..
  • 11. Dell SonicWALL Next-Generation Firewall Dell™ SonicWALL™ offers a comprehensive line of defenses against all forms of cyber attack and malware. • Dell SonicWALL Next-Generation Firewalls, featuring Reassembly-Free Deep Packet Inspection® (RFDPI) technology and multi-core parallel architecture, scan and analyze inbound and outbound traffic to identify multiple threats, applications and protocols, at wire speed and without file size limitations. • Using input from millions of shared touch points in the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, the Dell SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats. Dell SonicWALL Research Labs continuously processes this information, proactively delivering countermeasures and dynamic updates to stop the latest threats. 10 2012 Dell SonicWALL. All rights reserved.. • The Dell SonicWALL SuperMassive E10800 running SonicOS 6.0 is the highest overall protection NextGeneration Firewall to earn the “Recommend” rating from NSS Labs, the recognized leader in independent security product testing. This single code base for SonicOS is at the core of every Dell Dell SonicWALL firewall, from the TZ 105 to the Dell Dell SonicWALL SuperMassive E10800.
  • 12. Dell SonicWALL Next-Generation Firewall • The Dell SonicWALL Gateway Anti-Virus, AntiSpyware, Intrusion Prevention, and Application Intelligence and Control Service delivers intelligent, real-time network security protection against the latest blended threats, including viruses, spyware, worms, Trojans, software vulnerabilities and other malicious code. - Intrusion prevention service (IPS) prevents attackers from exploiting known vulnerabilities (Step 2 of the attack cycle) - Gateway anti-virus and anti-spyware prevents attackers from installing or uploading malware to a compromised system (Step 3 of the attack cycle) - Application intelligence and control prevents attackers from being able to use commonplace applications to transmit data to or from the compromised system (Step 4 of the attack cycle) 11 2012 Dell SonicWALL. All rights reserved.. • Working in conjunction with Dell SonicWALL firewalls, Dell SonicWALL Enforced Client AntiVirus and Anti Spyware software provides comprehensive gateway-enforced virus and spyware protection for desktops and laptops. Dell SonicWALL firewalls ensure that all of the computers accessing the network have the latest version of anti-virus and anti-spyware software installed and active.
  • 13. Dell SonicWALL comprehensive integrated security solutions • Dell SonicWALL Clean Wireless™ integrates Dell SonicWALL firewalls with universal 802.11 a/b/g/n wireless access points, to deliver advanced security features such as WiFiSec, Virtual APs (VAP), and wireless intrusion detection services (WIDS). • When combined with Dell SonicWALL Secure Remote Access (SRA) solutions, Dell SonicWALL firewalls create a Clean VPN™ that decrypts and scans all authorized SSL VPN traffic for malware before it enters the network, and adds enforced authentication, data encryption, and granular access policy. 12 2012 Dell SonicWALL. All rights reserved.. • The Dell SonicWALL Email Security Series provides comprehensive email threat protection for organizations of all sizes, stopping email-borne spam, virus, and phishing attacks, while contributing to internal policy and regulatory compliance. • Dell SonicWALL Application Traffic Flow Analytics, including the Dell SonicWALL Global Management System 7.0, Scrutinizer and Analyzer solutions, increases threat awareness through real time and historical traffic analysis and provides powerful insight into application traffic, bandwidth utilization and security threats along with powerful troubleshooting and forensics capabilities.
  • 14. How can I learn more? • Download the whitepaper “The Wild World of Malware: Keeping Your Company Safe” • View the webinar “Exploring the Digital Underworld: Botnets, Zero Day Threats and Phishing” • Opt-in to receive Dell SonicWALL newsletters For feedback on this e-book or other Dell SonicWALL e-books or whitepapers, please send an email to feedback@sonicwall.com. About Dell SonicWALL Dell™ SonicWALL™ provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Securing any organization with multi-threat scanning based on global input at wire speed, Dell SonicWALL is recognized as an industry leader by Gartner and NSS Labs. For more information, visit the web site at www.sonicwall.com. Copyright 2012 Dell, Inc. All rights reserved. Dell SonicWALL is a trademark of Dell, Inc. and all other Dell SonicWALL product and service names and slogans are trademarks of Dell, Inc. Other product and company names mentioned herein may be trademarks and/or registered trademarks of their respective owners. 07/12 DSNWL 0090TM