Targeted Cyber Attacks
Multi-staged Attacks Driven by Exploits and Malware
- 1st Edition - April 18, 2014
- Authors: Aditya Sood, Richard Enbody
- Language: English
- Paperback ISBN:9 7 8 - 0 - 1 2 - 8 0 0 6 0 4 - 7
- eBook ISBN:9 7 8 - 0 - 1 2 - 8 0 0 6 1 9 - 1
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that ar… Read more
Purchase options
Institutional subscription on ScienceDirect
Request a sales quoteCyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
- A well-structured introduction into the world of targeted cyber-attacks
- Includes analysis of real-world attacks
- Written by cyber-security researchers and experts
information security and information technology professionals, as well as students studying cyber-security
- A Few Words About Targeted Cyber Attacks
- Acknowledgments
- About the Authors
- Overview
- Chapter 1. Introduction
- References
- Chapter 2. Intelligence Gathering
- 2.1 Intelligence Gathering Process
- 2.2 OSINT, CYBINT, and HUMINT
- 2.3 OSNs: A Case Study
- References
- Chapter 3. Infecting the Target
- 3.1 Elements Used in Incursion
- 3.2 Model A: Spear Phishing Attack: Malicious Attachments
- 3.3 Model B: Spear Phishing Attack: Embedded Malicious Links
- 3.4 Model C: Waterholing Attack
- 3.5 Model D: BYOD as Infection Carriers: USB
- 3.6 Model E: Direct Incursion: Network Exploitation
- References
- Chapter 4. System Exploitation
- 4.1 Modeling Exploits in Targeted Attacks
- 4.2 Elements Supporting System Exploitation
- 4.3 Defense Mechanisms and Existing Mitigations
- 4.4 Anatomy of Exploitation Techniques
- 4.5 Browser Exploitation Paradigm
- 4.6 Drive-By Download Attack Model
- 4.7 Stealth Malware Design and Tactics
- References
- Chapter 5. Data Exfiltration Mechanisms
- 5.1 Phase 1: Data Gathering Mechanisms
- 5.2 Phase 2: Data Transmission
- References
- Chapter 6. Maintaining Control and Lateral Movement
- 6.1 Maintaining Control
- 6.2 Lateral Movement and Network Reconnaissance
- References
- Chapter 7. Why Targeted Cyber Attacks Are Easy to Conduct?
- 7.1 Step 1: Building Targeted Attack Infrastructure
- 7.2 Step 2: Exploring or Purchasing Stolen Information About Targets
- 7.3 Step 3: Exploits Selection
- 7.4 Step 4: Malware Selection
- 7.5 Step 5: Initiating the Attack
- 7.6 Role of Freely Available Tools
- References
- Chapter 8. Challenges and Countermeasures
- 8.1 Real-Time Challenges
- 8.2 Countermeasures and Future Developments
- References
- Chapter 9. Conclusion
- References
- Abbreviations
- No. of pages: 158
- Language: English
- Edition: 1
- Published: April 18, 2014
- Imprint: Syngress
- Paperback ISBN: 9780128006047
- eBook ISBN: 9780128006191
AS
Aditya Sood
Company Website: http://www.elastica.net
Personal Website: http://adityaksood.secniche.org
RE