CYB401
CYB401
CYB401
ID: 2306000672
REFERENCES………………………………………………………………………………………12
1
CHAPTER 1: COMPLEX BUSINESS CYBER SECURITY THREATS AND RISKS.
2
1.1 MAJOR CYBER BREACHES AND METHODS OF ATTACK THAT HAVE SEVERELY
IMPACTED BUSINESSES AND PUBLIC ORGANISATIONS
Due to the adoption of cloud technology, most businesses prefer to save their data in the
cloud. This development has made them vulnerable to cybercriminals. Due to this
development, businesses may need to spend more money on cyber security, which may
trickle down to the increase in cost for customers. Businesses that cyber attackers have
successfully attacked have lost billions of dollars. Around 30,000 Americans have been
duped, and the government has lost up to $60 million," claimed East Java police head Nico
Afinta (CBS News, 2021). According to business insurer Hiscox, companies lost 1.8 billion
dollars to cybercrime in 2019, with heavy targets on energy, financial services, technology,
and manufacturing. Cyber threats have damaged the reputation of many companies and
affected the integrity of their product in the market. It has caused a lack of trust among
shareholders and reduced the stock value of most companies. Cybercriminals are swiftly
enlisting Internet of Things (IoT) devices (Abiodun et al., 2021a, Abiodun et al., 2021b) into
their botnet forces, according to the current threat intelligence discoveries from A10
Networks' cybersecurity researchers, boosted by Mozi malware spreading throughout the
world. Some businesses store their intellectual documents in the cloud for easy accessibility
from anywhere. It increases the risk of cybercrime from any unauthorized access. If a
cybercriminal gains access to such information, they may sell it or exploit it to a competitor of
the company's brand. Criminals can extensively study the organization and its linked
individuals to imitate a believable attack. Information about some organizations is freely
available online (Burns et al., 2019). Below are some of the ways cyber-attacks can severely
impact the business. Payment of ransom to gain access to critical parts of the IT
infrastructure of the organization businesses impacted by cyber-attacks incur more costs on
operational activities and internal business processes.
Some of the effects of cyber threats are consuming business resources and reducing the
operational effectiveness of doing business. It can also cause a downtime in business
processes. It was recorded in 2022 that the audited fees without companies with cyber
breaches were 13 percent higher than companies without data breaches. As more people
are infected with coronavirus, so do dangerous cyber-attacks such as spam emails,
3
phishing, malware, ransomware, and malicious domains that utilize the virus as bait (French
et al., 2021).
For some businesses, cyber-attacks have lower credit ratings, reducing their chances of
securing a loan to finance their business operation. It will automatically increase the financial
risk of such organizations.
Compromising customer information is a major issue that leads a business into litigation and
several court cases. A cyber-attacker can steal customers' important information stored on
the server and sell it for financial gain. Such an organization may have serious legal issues,
which may halt the entire business process or activity.
4
¨ Detection and escalation
¨ Notification of the breach
¨ Response to the issue
The loss derived from the effect
Factor Analysis Information Risk (FAIR): It is the only internationally recognized method for
quantifying cyber risk in an organization. This method is maintained by the Open Group, a
global consortium that enables the achievement of business objectives with IT standards.
This method is an international standard like every other international standard.
5
CHAPTER 2: MEGABREACHES AND EXPLAIN MALWARE AND RANSOMWARE
ATTACKS.
6
2.1 THREAT AND RISK MANAGEMENT CONCEPTS AND MODELS
7
opportunity of web proxies to hide malicious traffic from their application to the network.
Some sophisticated malware can change the underlying code to avoid being detected. In
addition, fileless malware resides on the RAM to avoid being detected. Some of the
examples of malware are
Virus: A virus is a program that replicates itself to another program without interference.
Viruses can spread from any resources used on the network or from an email attachment. If
a virus can infect the host in a network environment, it can easily spread to other endpoint
users and disable or infect important resources within the network. Some viruses are event-
triggered, while some replicate by themselves.
Ransomware: Ransomware is a form of malware that locks the information or data of the
computer until a ransom is paid. Ransomware hackers always demand payment, unlike
other forms of malware. They often contact the owner of the file or data after the action is
implemented. Ransomware kits can be generated from the deep web and used to distribute
ransom applications. The cybercriminal can now demand ransom in bitcoin, which keeps
their identity anonymous.
Trojan Horse: A trojan horse is an application developed to imitate legitimate software to
fool a click to launch it within the network. This application can spread to other users within
the network once clicked. A Trojan horse can not launch itself on a system. The victim must
download and launch it before it can infect the system.
Spyware: Spyware is a form of malware developed to exploit information from users or
observe their network activity unknowingly.
8
CHAPTER 3: HOW THREATS AND MALICIOUS HACKERS ARE ADVANCING AND
DEVELOPING CUSTOMIZED INTRUSION TOOLS.
9
3.1 THE DEVELOPMENT OF CUSTOMISED INTRUSION TOOLS AND THEIR USE BY
MALICIOUS HACKERS.
Intrusion tools are software or programs or API developed by intruders to gain access to a
network or host within a network infrastructure to cause harm or steal valuable information
from the network. Some of these tools are
JBiFrost RAT: It is a software developed in Java programming language that helps cyber
criminals to penetrate different operating systems, including Windows, Linux, MacOS, and
Android. Once this RAT program is installed on a victim's computer, it automatically enables
administrative control to the attacker. It can disable the task manager and hide itself from the
start-up program(Danny Palmer, 2018). It can install back-loggers, take screenshots, and
exfiltrate data on victim computers. It. is mostly sent to the victim's computer through email
attachment. Other abilities of JBifrost include:
• Opening a window registry.
• Restarting the computer in safe mode.
• Creating new files.
• Increasing disk activity or network activity.
• Connecting with malicious IP addresses.
Web Shells: Web Shells are scripts that cybercriminals upload to target after an initial
compromise to gain remote access to the computer so the attacker can have administrative
access and access other resources within the network.
One of the commonly used examples of web shells is China Chopper. It has been widely
used to access servers and compromise files. When an attacker installs a China chopper on
a system, it can be accessed from anywhere to rename, delete, copy, or change the time
stamp on files(CBR Staff Writer 2018).
Mimikatz: This application was developed to collect users' login credentials to a victim's
Windows computer using the Local Security Authority Subsystem Service(LSASS). This
application is an open-source application, thereby giving the attackers the privilege of
developing custom plugins.
PowerShell Empire Framework: The PowerShell was developed as a legitimate
penetration testing tool but provides the privilege to escalate privilege, harvest credentials,
exfiltrate information, and move across a network. If an attacker has access to this
application, they can operate the entire memory because it is built on a legitimate
application.
HTran: In penetrating their victim, cybercriminals hide their identity and locations when
compromising a target. They may use TOR or proxy tools like HUC packet transmitter
(HTran), which can be used to intercept and redirect TCP from host to remote host. It has
been available on the internet since 2009.
10
3.2 HOW AN INTRUSION OCCURS CAN CAUSE A MEGA DATA BREACH.
A hacker behind an intrusion can cause a data breach to the organization's reputation and
financial reputation. Data breach has caused a lot of reputation damage to the image of most
company's brand and has reduced their acceptance in the market. Organizations like Yahoo
and Target have been victims of such occurrences by losing millions of dollars in revenue.
The intrusion of cybercriminals into a company's infrastructure can expose sensitive
information into the public domain, which may cause mega damage to the company's
reputation. Cybercriminals can have access from banking information to social security
numbers (SSNs) when data intrusion occurs(Paul Sparrow 2022). In 2019, Facebook
suffered a mega data breach that affected not fewer than 500 million users. It generates a
fine of $277 from the Irish Data Protection Commission. In 2013, 3 billion accounts were
breached in Yahoo. In early 2018, news broke that cybercriminal actors had infiltrated the
world's largest ID database, Aadhaar, exposing information on more than 1.1 billion Indian
citizens. Professional networking site LinkedIn saw data associated with 700 million users
posted on dark web forums in July 2021, impacting more than 90 percent of its users(Ani
Petrosyan, 2023). Most of these attacks have led to serious lawsuits, which have caused
huge financial implications for most of the organization.
Data breach for businesses has direct and indirect expenses on the organizations. Some of
the direct expenses include forensic experts, hotline support, credit monitoring subscriptions,
and potential settlement. Indirect cost includes:
• In-house investigation and communication.
• Customer turnover.
• Diminished rate to the organization.
Another implication of data intrusion is fraud. A criminal can penetrate the network
infrastructure to commit fraud with the identity of the organization's customers. It can cause
mega damage to the organization's reputation, thereby causing them to lose revenue. It can
also affect the trust of shareholders in the business, which may lead to a drop in the
organization's financial investment.
11
REFERENCES
Abiodun O.I., Abiodun E.O., Alawida M., Alkhawaldeh R.S., Arshad H. A review on the
security of the internet of things: challenges and solutions. Wireless Pers.
Commun. 2021;119(3):2603–2637. [Google Scholar] [Ref list]
Burns A.J., Johnson M.E., Caputo D.D. Spear phishing in a barrel: Insights from a targeted
phishing campaign. J. Organiz. Comp. Electr. Commerce. 2019;29(1):24–39. [Google
Scholar] [Ref list]
French G., Hulse M., Nguyen D., Sobotka K., Webster K., Corman J., Ewing M. Impact of
hospital strain on excess deaths during the COVID-19 pandemic—United States, July 2020–
July 2021. Morb. Mortal. Wkly Rep. 2021;70(46):1613. [PMC free article] [PubMed] [Google
Scholar] [Ref list]
Measuring Security and the Financial Impact of Data Breaches by Advisors Team, May 23,
2017 – Focal Point
Kesavulu, Manoj, et al. "An Overview of User-level Usage Monitoring in Cloud Environment."
2018, https://core.ac.uk/download/155660114.pdf.
CBR Staff Writer 2018 The 5 Most Commonly Used Hacking Tools – and How to Defend
Against Them - https://techmonitor.ai/technology/cybersecurity/hacking-tools-ncsc
12
13