Cyber Crime - Unit II
Cyber Crime - Unit II
Cyber Crime - Unit II
Engineering – Cyberstalking – Cybercafe and Cybercrimes – Botnets: The fuel for Cybercrime – Attack vector.
Cybercrime: Mobile and Wireless Devices:Security Challenges posed by Mobile Devices- Authentication
Service Security – Attacks on Mobile/ Cellphones – Organizational Security Policies and measures in Mobile
Computing Era.
CYBER OFFENSES
Cracker tools: These are programs used to break into computers. Cracker tools are widely
distributed on the Internet. They include password crackers, Trojans, viruses, war dialers and
worms.
Phreaking: This is the notorious art of breaking into phone or other communication
systems.Phreaking sites on the Internet are popular among crackers and other criminals.
War dialer: Program automatically dials phone numbers looking for computers on the other
end. It catalogs numbers so that the hackers can call back and try to break in. An attacker would
look to exploit the vulnerabilities in the networks, most often so because the networks are not
adequately protected.
The categories of vulnerabilities that hackers typically search for are the following:
o Inadequate border protection (border as in the sense of network periphery);
o remote access servers (RASs) with weak access controls;
o application servers with well-known exploits;
o misconfigured systems and systems with default configurations.
To help the reader understand the network attack scenario, Fig. 2.2 illustrates a smallnetwork highlighting
specific occurrences of several vulnerabilities described above.
A white hat hacker is considered an ethical hacker. In the realm of IT, a “white hat hacker”
is a person who is ethically opposed to the abuse of computer systems. It is said that the term is
derived from American western movies, where the protagonist typically wore a white cowboy
hat and the antagonist typically wore a black one. As a simplified explanation, a “white hat”
generally focuses on securing IT systems, whereas a “black hat” (the opposite) would like to
break into them, so this sounds like an age-old game of a thief and a police.
A brown hat hacker is one who thinks before acting or committing a malice or non-malice
deed. A grey hat commonly refers to a hacker who releases information about any exploits or
security holes he/she finds openly to the public. He/she does so without concern for how the
information is used in the end (whether for patching or exploiting).
Categories of Cybercrime
Cybercrime can be categorized based on the following:
1. The target of the crime and
2. whether the crime occurs as a single event or as a series of events.
Cybercrime can be targeted against individuals (persons), assets (property) and/or
organizations (government, business and social).
1. Crimes targeted at individuals: The goal is to exploit human weakness such as greed and naivety. These
crimes include financial frauds, sale of non-existent or stolen items, child pornography (explained in Section
1.5.13, Chapter 1), copyright violation, harassment, etc. with the development in the IT and the Internet; thus,
criminals have a new tool that allows them to expand the pool of potential victims. However, this also makes
difficult to trace and apprehend the criminals.
2. Crimes targeted at property: This includes stealing mobile devices such as cell phone, laptops, personal
digital assistant (PDAs), and removable medias (CDs and pen drives); transmitting harmful programs that can
disrupt functions of the systems and/or can wipe out data from hard disk, and can create the malfunctioning of
the attached devices in the system such as modem, CD drive, etc.
3. Crimes targeted at organizations: Cyber terrorism is one of the distinct crimes against organizations/
governments. Attackers (individuals or groups of individuals) use computer tools and the Internet to usually
terrorize the citizens of a particular country by stealing the private information, and also to damage the
programs and fi les or plant programs to get control of the network and/or system (see Box 2.3).
4. Single event of cybercrime: It is the single event from the perspective of the victim. For example,
unknowingly open an attachment that may contain virus that will infect the system (PC/laptop). This is known
as hacking or fraud.
5. Series of events: This involves attacker interacting with the victims repetitively. For example, attacker interacts
with the victim on the phone and/or via chat rooms to establish relationship first and then they exploit that
relationship to commit the sexual assault.
Box 2.3 | Patriot Hacking
Patriot hacking[1] also known as Digital Warfare, is a form of vigilante computer systems‟
cracking done by individuals or groups (usually citizens or supports of a country) against a
real or perceived threat. Traditionally, Western countries, that is, developing countries, attempts
to launch attacks on their perceived enemies.
Although patriot hacking is declared as illegal in the US, however, it is reserved only for
government agencies [i.e., Central Intelligence Agency (CIA) and National Security Agency
(NSA)] as a legitimate form of attack and defense. Federal Bureau of Investigation (FBI) raised
the concern about rise in cyber attacks like website defacements (explained in Box 1.4,
Chapter1) and denial-of-service attacks (DoS – refer to Section 4.9, Chapter 4), which adds as
fuel into increase in international tension and gets mirrored it into the online world.
After the war in Iraq in 2003, it is getting popular in the North America, Western Europe and
Israel. These are countries that have the greatest threat to Islamic terrorism and its
aforementioned digital version.
The People‟s Republic of China is allegedly making attacks upon the computer networks of the
US and the UK. Refer to Box 5.15 in Chapter 5. For detailed information visit
www.patriothacking.com
Passive Attacks
A passive attack involves gathering information about a target without his/her (individual‟s or company‟s)
knowledge. It can be as simple as watching a building to identify what time employees enter the building
premises. However, it is usually done using Internet searches or by Googling (i.e., searching the required
information with the help of search engine Google) an individual or company to gain information.
1. Google or Yahoo search: People search to locate information about employees.
2. Surfing online community groups like Orkut/Facebook will prove useful to gain the information about an
individual.
3. Organization‟s website may provide a personnel directory or information about key employees, for example,
contact details, E-Mail address, etc. These can be used in a social engineering attack to reach the target (see
Section 2.3).
4. Blogs, newsgroups, press releases, etc. are generally used as the mediums to gain information about the
company or employees.
5. Going through the job postings in particular job profiles for technical persons can provide information about
type of technology, that is, servers or infrastructure devices a company maybe using on its network.
Active Attacks
An active attack involves probing the network to discover individual hosts to confirm the information
(IP addresses, operating system type and version, and services on the network) gathered in the passive attack
phase. It involves the risk of detection and is also called “Rattling the doorknobs” or “Active reconnaissance.”
Active reconnaissance can provide confirmation to an attacker about security measures in place (e.g., whether
the front door is locked?), but the process can also increase the chance of being caught or raise a suspicion.
SOCIAL ENGINEERING
Social engineering is the “technique to influence” and “persuasion to deceive” people to obtain the information
or perform some action.
Social engineers exploit the natural tendency of a person to trust social engineers‟ word, rather than exploiting
computer security holes.
It is generally agreed that people are the weak link in security and this principle makes social engineering
possible.
A social engineer usually uses telecommunication (i.e., telephone and/or cell phone) or Internet to get them to
do something that is against the security practices and/or policiesof the organization.
Social engineering involves gaining sensitive information or unauthorized access privileges by building
inappropriate trust relationships with insiders.
It is an art of exploiting the trust of people, which is not doubted while speaking in a normal manner.
The goal of a social engineer is to fool someone into providing valuable information or access to that
information.
Social engineer studies the human behavior so that people will help because of the desire to be helpful, the
attitude to trust people, and the fear of getting into trouble.
The sign of truly successful social engineers is that they receive information without any suspicion.
A simple example is calling a user and pretending to be someone from the service desk working on a network
issue; the attacker then proceeds to ask questions about what the user is working on, what file shares he/she
uses, what his/her password is, and so on… (see Box 2.6).
CYBERSTALKING
The dictionary meaning of “stalking” is an “act or process of following prey stealthily – trying to approach
somebody or something.”
Cyberstalking has been defined as the use of information and communications technology, particularly the
Internet, by an individual or group of individuals to harass another individual, group of individuals, or
organization.
The behavior includes false accusations, monitoring, transmission of threats, ID theft, damage to data or
equipment, solicitation of minors for sexual purposes, and gathering information for harassment purposes.
Cyberstalking refers to the use of Internet and/or other electronic communications devices to stalk another
person.
It involves harassing or threatening behavior that an individual will conduct repeatedly, for example,
following a person, visiting a person‟s home and/or at business place, making phone calls, leaving written
messages, or vandalizing against the person‟s property. As the Internet has become an integral part of our
personal and professional
lives, cyberstalkers take advantage of ease of communication and an increased access topersonal information
available with a few mouse clicks or keystrokes.
Types of Stalkers
There are primarily two types of stalkers.
1. Online stalkers:
They aim to start the interaction with the victim directly with the help of the Internet.
E-Mail and chat rooms are the most popular communication medium to get connected with the victim, rather
than using traditional instrumentation like telephone/cell phone.
The stalker makes sure that the victim recognizes the attack attempted on him/her.
The stalker can make use of a third party to harass the victim.
2. Offline stalkers:
The stalker may begin the attack using traditional methods such as following the victim, watching the daily
routine of the victim, etc.
Searching on message boards/newsgroups, personal websites, and people finding services or websites are most
common ways to gather information about the victim using the Internet.
The victim is not aware that the Internet has been used to perpetuate an attack against them.
The majority of cyberstalkers are men and the majority of their victims are women.
Some cases also have been reported where women act as cyberstalkers and men as the victims as well as cases
of same-sex cyberstalking.
In many cases, the cyberstalker and the victim hold a prior relationship, and the cyberstalking begins when the
victim attempts to break off the relationship, for example, ex-lover, ex-spouse, boss/subordinate, and neighbor.
However, there also have been many instances of cyberstalking by strangers.
In February 2009, Nielsen survey on the profile of cybercafes users in India, it was found that 90% of the
audience, across eight cities and 3,500 cafes, were male and in the age group of 15–35 years; 52% were
graduates and postgraduates, though almost over 50% were students.
Hence, it is extremely important to understand the IT security and governance practiced in the cybercafes.
In the past several years, many instances have been reported in India, where cybercafes are known to be used
for either real or false terrorist communication.
Cybercrimes such as stealing of bank passwords and subsequent fraudulent withdrawal of money have also
happened through cybercafes.
Cybercafes have also been used regularly for sending obscene mails to harass people.
Public computers, usually referred to the systems, available in cybercafes, hold two typesof risks.
First, we do not know what programs are installed on the computer – that is, risk of malicious programs such
as keyloggers or Spyware, which maybe running at the background that can capture the keystrokes to know the
passwords and other confidential information and/or monitor the browsing behavior.
Second, over-the-shoulder surfing can enable others to find out your passwords. Therefore, one has to be
extremely careful about protecting his/her privacy on such systems, as one does not know who will use the
computer after him/her.
Indian Information Technology Act (ITA) 2000, does not define cybercafes and interprets cybercafes as
“network service providers” referred to under the Section 79, which imposed on them a responsibility for “due
diligence” failing which they would be liable for the offenses committed in their network.
Cybercriminals prefer cybercafes to carry out their activities.
The criminals tend to identify one particular personal computer (PC) to prepare it fortheir use.
Cybercriminals can either install malicious programs such as keyloggers and/or Spywareor launch an attack
on the target.
Cybercriminals will visit these cafes at a particular time and on the prescribed frequency, maybe alternate day
or twice a week.
A recent survey conducted in one of the metropolitan cities in India reveals the following facts:
1. Pirated software(s) such as OS, browser, office automation software(s) (e.g., Microsoft Office) are installed in
all the computers.
2. Antivirus software is found to be not updated to the latest patch and/or antivirus signature.
3. Several cybercafes had installed the software called “Deep Freeze” for protecting the computers from
prospective malware attacks. Deep Freeze can wipe out the details of all activities carried out on the computer
when one clicks on the “restart” button. Such practices present challenges to the police or crime investigators
when they visit the cybercafes to pick up clues after the Interet Service Provider (ISP) points to a particular IP
address from where a threat mail was probably sent or an online Phishing attack was carried out, to retrieve
logged files.
4. Annual maintenance contract (AMC) found to be not in a place for servicing the computers; hence, hard disks
for all the computers are not formatted unless the computer is down. Not having the AMC is a risk from
cybercrime perspective because a cybercriminal can install a Malicious Code on a computer and conduct
criminal activities without any interruption.
5. Pornographic websites and other similar websites with indecent contents are not blocked.
6. Cybercafe owners have very less awareness about IT Security and IT Governance.
7. Government/ISPs/State Police (cyber cell wing) do not seem to provide IT Governance guidelines to cybercafe
owners.
8. Cybercafe association or State Police (cyber cell wing) do not seem to conduct periodic visits to cybercafes –
one of the cybercafe owners whom we interviewed expressed a view that the police will not visit a cybercafe
unless criminal activity is registered by filing an First Information Report (FIR). Cybercafe owners feel that
police either have a very little knowledge about the technical aspects involved in cybercrimes and/or about
conceptual understanding of IT security. There are thousands of cybercafes across India.
In the event that a central agency takes up the responsibility for monitoring cybercafes, an individual should
take care while visiting and/or operating from cybercafe. Here are a few tips for safety and security while using
the computer in a cybercafe:
1. Always logout:
2. Stay with the computer:
3. Clear history and temporary files:
4. Be alert:
5. Avoid online financial transactions:
6. Change passwords:
7. Use Virtual keyboard:
8. Security warnings:
The dictionary meaning of Bot is “(computing) an automated program for doing some particular task, often
over a network.”
Botnet is a term used for collection of software robots, or Bots, that run autonomously and automatically.
The term is often associated with malicious software but can also refer to the network of computers using
distributed computing software.
In simple terms, a Bot is simply an automated computer program One can gain the control of computer by
infecting them with a virus or other Malicious Code that gives the access.
Computer system maybe a part of a Botnet even though it appears to be operating normally.
Botnets are often used to conduct a range of activities, from distributing Spam and viruses to conducting
denial-of-service (DoS) attacks.
A Botnet (also called as zombie network) is a network of computers infected with a malicious program that
allows cybercriminals to control the infected machines remotely without the users‟ knowledge.
“Zombie networks” have become a source of income for entire groups of cybercriminals. The invariably low
cost of maintaining a Botnet and the ever diminishing degree of knowledge required to manage one are
conducive to the growth in popularity and, consequently, the number of Botnets.
If someone wants to start a “business” and has no programming skills, there are plenty of “Bot for sale” offers
on forums.
„encryption of these programs‟ code can also be ordered in the same way to protect them from detection by
antivirus tools.
Another option is to steal an existing Botnet. Figure 2.8 explains how Botnets create business.
One can reduce the chances of becoming part of a Bot by limiting access into the system.
Leaving your Internet connection ON and unprotected is just like leaving the front door of the house wide
open.
1. Attack by E-Mail: The content is either embedded in the message or linked to by the message. Sometimes
attacks combine the two vectors, so that if the message does not get you, the attachment will. Spam is almost
always carrier for scams, fraud, dirty tricks, or malicious action of some kind. Any link that offers something
“free” or tempting is a suspect.
2. Attachments (and other files): Malicious attachments install malicious computer code. The code could be a
virus, Trojan Horse, Spyware, or any other kind of malware. Attachments attempt to install their payload as
soon as you open them.
3. Attack by deception: Deception is aimed at the user/operator as a vulnerable entry point. It is not just
malicious computer code that one needs to monitor. Fraud, scams, and to some extent Spam, not to mention
viruses, worms and such require the unwitting cooperation of the computer‟s operator to succeed. Social
engineering are other forms of deception that are often an attack vector too.
4. Hackers: Hackers/crackers are a formidable attack vector because, unlike ordinary Malicious Code, people are
flexible and they can improvise. Hackers/crackers use variety of hacking tools, heuristics, Cyberoffenses: How
and social engineering to gain access to computers and online accounts. They often install a Trojan Horse to
commandeer the computer for their own use.
5. Heedless guests (attack by webpage): Counterfeit websites are used to extract personal information. Such
websites look very much like the genuine websites they imitate. One may think he/she is doing business with
someone you trust. However, he/she is really giving their personal information, like address, credit card
number, and expiration date. They are often used in conjunction with Spam, which gets you there in the first
place. Pop-up webpages may install Spyware, Adware or Trojans.
6. Attack of the worms: Many worms are delivered as E-Mail attachments, but network worms use holes in
network protocols directly. Any remote access service, like file sharing, is likely to be vulnerable to this sort of
worm. In most cases, a firewall will block system worms. Many of these system worms install Trojan Horses.
7. Malicious macros: Microsoft Word and Microsoft Excel are some of the examples that allow macros. A macro
does something like automating a spreadsheet, for example. Macros can also be used for malicious purposes.
All Internet services like instant messaging, Internet Relay Chart(IRC), and P2P fi le-sharing networks rely on
cozy connections between the computer and the other computers on the Internet. If one is using P2P software
then his/her system is more vulnerable to hostile exploits.
8. Foistware (sneakware): Foistware is the software that adds hidden components to the system with cunning
nature. Spyware is the most common form of foistware. Foistware is partial- legal software bundled with some
attractive software. Sneak software often hijacks your browser and diverts you to some “revenue
opportunity” that the foistware has set up.
9. Viruses: These are malicious computer codes that hitch a ride and make the payload. Nowadays, virus vectors
include E-Mail attachments, downloaded files, worms, etc.
Sometimes software vendors discover the vulnerability but developing a patch can take time.
Alternatively, software vendors can also hold releasing the patch reason to avoid the flooding
the customers with numerous individual updates. A “zero-day” attack is launched just on or
before the first or “zeroth” day of vendor awareness, reason being the vendor should not get any
opportunity to communicate/distribute a security fix to users of such software. If the
vulnerability is not particularly dangerous, software vendors prefer to hold until multiple updates
(i.e., security fixes commonly known as patches) are collected and then release them together
as a package. Malware writers are able to exploit zero-day vulnerabilities through several
different attack vectors.
Zero-day emergency response team (ZERT): This is a group of software engineers who
work to release non-vendor patches for zero-day exploits. Nevada is attempting to provide
support with the Zeroday Project at www.zerodayproject.com, which purports to provide
information on upcoming attacks and provide support to vulnerable systems. Also, visit the
weblink http://www.isotf.org/zert to get more information about it.
Cloud Computing
The growing popularity of cloud computing and virtualization among organizations have made it possible, the
next target of cybercriminals.
Cloud computing services, while offering considerable benefits and cost savings, move servers outside the
organizations security perimeter, which make it easier for cybercriminals to attack these systems.
Cloud computing is Internet (“cloud”)-based development and use of computer technology (“computing”).
The term cloud is used as a metaphor for the Internet, based on the cloud drawing used to depict the Internet in
computer networks.
Cloud computing is a term used for hosted services delivered over the Internet.
A cloud service has three distinct characteristics which differentiate it from traditional hosting:
Types of Services
Services provided by cloud computing are as follows:
6. Infrastructure-as-a-service (IaaS): It is like Amazon Web Services that provide virtual servers with unique
IP addresses and blocks of storage on demand. Customers benefit from an Application Programmable
Interface (API) from which they can control their
servers. As customers can pay for exactly the amount of service they use, like for electricity or water, this
service is also called utility computing.
7. Platform-as-a-service (PaaS): It is a set of software and development tools hosted on the provider‟s
servers. Developers can create applications using the provider‟s APIs. Google Apps is one of the most famous
PaaS providers. Developers should take notice that there are not any interoperability standards; therefore, some
providers may not allow you to take your application and put it on another platform.
8. Software-as-a-service (SaaS): It is the broadest market. In this case, the provider allows the customer only to
use its applications. The software interacts with the user through a user interface. These applications can
be anything from Web-based E-Mail to applications such as Twitter or Last.fm.
Nowadays, prime area of the risk in cloud computing is protection of user data. Althoughcloud computing is
an emerging field, the idea has been evolved over few years.
Risks associated with cloud computing environment are as follows
9. Elevated user access-Any data processed outside the organization brings with itan inherent level of risk
10. Regulatory compliance-Cloud computing service providers are not able and/or notwilling to undergo external
assessments.
11. Location of the data-User doesn‟t know where the data is stored or in whichcountry it is hosted.
12. Segregation of data-Data of one organization is scattered in different locations
13. Recovery of the data-In case of any disaster, availability of the services and datais critical.
14. Information security- violation reports Due to complex IT environment and several customers logging in and
logging out of the hosts, it becomes difficult to trace inappropriate and/or illegal activity
15. Long-term viability- In case of any major change in the cloud computing service provider (e.g., acquisition and
merger, partnership breakage), the service provided is at the stake.
CYBERCRIME: MOBILE & WIRELESS
DEVICES SECURITY CHALLENGES POSED BY
MOBILE DEVICES
Mobility brings two main challenges to cybersecurity:
1. on the hand-held devices, information is being taken outside the physically controlled environment
and
2. remote access back to the protected environment is being granted
Perceptions of the organizations to these cybersecurity challenges are important in devising
appropriatesecurity operating procedure. As the number of mobile device users increases, two
challenges are presented:
1. at the device level called “microchallenges” and
2. at the organizational level called
“macrochallenges”Some well-known technical
challenges in mobile security are:
Managing the registry settings and configurations, authentication service security
Cryptography security
Lightweight Directory Access Protocol (LDAP) security
Remote Access Server (RAS) security
Media player control security
Networking application program interface (API) security, etc.
Figure: Push attack on mobile devices. DDoS implies distributed denial-of-service attack
Figure: Pull attack on mobile devices
First, attackers use a domain name system (DNS) server to locate the IP address of a
connected computer.A domain is a collection of sites that are related in some sense.
Second, they scan the ports on this known IP address, working their way through its
Transmission Control Protocol (TCP)/User Datagram Protocol (UDP) stack to see what
communication ports are unprotected by firewalls.
For instance, File Transfer Protocol (FTP) transmissions are typically assigned to port 21. If
this port is left unprotected, it can be misused by the attackers.
Protecting against port scanning requires software that can trap unauthorized incoming data
packets and prevent a mobile device from revealing its existence and ID.
A personal firewall on a pocket PC or Smartphone device can be an effective protective
screen against this form of attack for the users connecting through a direct Internet or RAS
connection.
2. Mobile Viruses:
A mobile virus is similar to a computer virus that targets mobile
phone data orapplications/software installed in it.
Virus attacks on mobile devices are no longer an exception or proof-of-concept nowadays.
In total, 40 mobile virus families and more than 300(+) mobile viruses have been identified.
First mobile virus was identified in 2004 and it was the beginning to understand that
mobile devicescan act as vectors to enter the computer network.
Mobile viruses get spread through two dominant communication protocols – Bluetooth and
MMS.
Bluetooth virus can easily spread within a distance of 10–30 m, through Bluetooth-activated
phones
MMS virus can send a copy of itself to all mobile users whose numbers are available
in the infectedmobile phone‟s address book.
Following are some tips to protect mobile from mobile malware attacks:
1. Download or accept programs and content (including ring tones, games, video
clips and photos)only from a trusted source.
2. If a mobile is equipped with Bluetooth, turn it OFF or set it to non-discoverable
mode when it isnot in use and/or not required to use.
3. If a mobile is equipped with beam (i.e., IR), allow it to receive incoming beams,
only from thetrusted source.
4. Download and install antivirus software for mobile devices.
3. Mishing: Mishing is a combination of mobile and Phishing. Mishing attacks are attempted
using mobilephone technology.
M-Commerce is fast becoming a part of everyday life. If you use your mobile phone
for purchasinggoods/services and for banking, you could be more vulnerable to a
Mishing scam.
A typical Mishing attacker uses call termed as Vishing or message (SMS) known as Smishing.
Attacker will pretend to be an employee from your bank or another organization
and will claim aneed for your personal details.
Attackers are very creative and they would try to convince you with different reasons
why they needthis information from you.
4. Vishing: Vishing is the criminal practice of using social engineering over the telephone
system, most often using features facilitated by VoIP, to gain access to personal and
financial information from the public for the purpose of financial reward. The term is a
combination of V – Voice and Phishing. Vishing is usually used to steal credit card
numbers or other related data used in ID theft schemes from individuals. The most
profitable uses of the information gained through a Vishing attack include:
ID theft
Purchasing luxury goods and services
Transferring money/funds
Monitoring the victims‟ bank accounts
Making applications for loans and credit cards
At this stage, the phone call gets disconnected, and the victim thinks there was something
wrong with the telephone line; or visher may redirect the victim to the real customer
service line, and the victim will not be able to know at all that his authentication was
appropriated by the visher.
3. Never click on a hot link received through message on your Smartphone or PDA. Hot
links are links that you can click, which will take you directly to the Internet sites.
Smishing messages may have hot links, wherein you click on the link and download
Spyware to your phone without knowing. Once this software has been downloaded,
criminals can easily steal any information that is available on your cell phone and have
access to everything that you do on your cell phone.
3. BlueBugger The buggers exploit the vulnerability of the device and access the
images, phonebook, messages and other personal information
Bluejacking, Bluesnarfing, Bluebugging and Car Whisperer are common attacks that have
emerged as Bluetooth-specific security issues.
Bluejacking: It means Bluetooth + Jacking where Jacking is short name for hijack – act of
taking over something. Bluejacking is sending unsolicited messages over Bluetooth to
Bluetooth-enabled devices such as mobile phones, PDAs or computers (within 10-m
radius), Bluejacking is harmless, as bluejacked users generally do not understand what has
happened and hence they may think that their phone is malfunctioning.
Bluesnarfing: It is the unauthorized access from a wireless device through a Bluetooth
connection between cell phones, PDAs and computers. This enables the attacker to access
a calendar, contact list, SMS and E-Mails as well as enable attackers to copy pictures and
private videos.
Bluebugging: It allows attackers to remotely access a user‟s phone and use its features without
user‟s attention.
Car Whisperer: It is a piece of software that allows attackers to send audio to and receive
audio from a Bluetooth-enabled car stereo.
Among the four above-mentioned attacks, Bluesnarfing is claimed to be much more serious
thanBluejacking.
Growth of mobile devices used makes the cybersecurity issue harder than what we would tend to
think.
People (especially, the youth) have grown so used to their mobiles that they are treating
them like wallets!
For example, people are storing more types of confidential information on mobile
computing devices than their employers or they themselves know; they listen to music
using their hand-held devices
One should think about not to keep credit card and bank account numbers, passwords,
confidential E- Mails and strategic information about organization & also other valuable
information that could impact stock values in the mobile devices.
Imagine the business impact if an employee‟s USB, pluggable drive or laptop was lost or
stolen, revealing the sensitive customer data such as credit reports, Social Security
Numbers (SSNs) & contact information.
This not only the Public Relations (PR) disaster, but it could also violate laws & regulations.
When controls cannot be implemented to protect data in the event they are stolen, the
simplest solution is to prevent users from storing proprietary information on platforms
deemed to be insufficiently secure.
Registering the laptop with the laptop manufacturer to track down the laptop in case of theft
Disabling unnecessary user accounts and renaming the administrator account
Backing up data on
a regular basisA few logical
access controls are as follows:
Protecting from malicious programs/attackers/social engineering
Avoiding weak passwords/open access
Monitoring application security and scanning for vulnerabilities
Ensuring that unencrypted data/unprotected fi le systems do not pose threats
Proper handling of removable drives/storage mediums/unnecessary ports
Password protection through appropriate passwords rules and use of strong passwords
Locking down unwanted ports/devices
Regularly installing security patches and updates
Installing antivirus software/firewalls/intrusion detection system (IDSs)
Encrypting critical file systems
Other countermeasures:
Choosing a secure OS that has been tested & has high security incorporated into it
Registering the laptop with the laptop manufacturer to track down the laptop in case of
theft
Disabling unnecessary user accounts & renaming the administrator account
Disabling display of the last logged in username in the login dialog box
Backing up data on a regular basis