Lajeen BLOG
  • Home
  • Download
  • Social
  • Features
    • Lifestyle
    • Sports Group
      • Category 1
      • Category 2
      • Category 3
      • Category 4
      • Category 5
    • Sub Menu 3
    • Sub Menu 4
  • Contact Us


 

(Knopp,2017)



What is a worm attack? 

A computer worm is a sort of malware that spreads duplicates of itself from one PC to another A worm can repeat itself with no human interaction, and it doesn't have to append itself to a software program to cause damage (NortonLifeLock employee,2019).





How does a worm attack work?

(Cimpanu,2016)

The demonstrated diagram shows the process of the worm cycle.






What are the types of computer worms?

There is no all-inclusive grouping of PC worms, however, they can be organized into types depending on how they are appropriated between PCs. The five common sorts are as the following:

1- Internet Worms: As they do with PC networks, PC worms likewise target popular sites with inadequate security.  At the point when they figure out how to infect the webpage, webworms can reproduce themselves onto any PC being utilized to get to the site being referred to. From that point, webworms are distributed to other associated PCs through the web and local area network connections (Moes, 2014).

2-Email Worms: Email worms are frequently circulated by means of email attachments.  They ordinarily have double extensions (for instance, .mp4.exe or .avi.exe) so the recipient would believe that they are media files and not malicious PC programs.  At the point when the victims click on the attachment, duplicates of a similar infected file will consequently be sent to addresses from their contacts list (Moes, 2014).

3-  Instant Messaging Worms: Instant messaging worms are actually similar to email worms, the only difference being their method of distribution.  Once again, they are masked as attachments or clickable links to websites. They are regularly accompanied by short messages like "Haha" or "You need to see this!" to fool the victim into believing that their companion is sending them an entertaining video to take a look at (Moes, 2014).

4- File-Sharing Worms: Although illegal file-sharing and peer-to-peer file moves are still used by many individuals all throughout the planet.  Doing as such, they are accidentally presenting their PCs to the threat of file-sharing worms. Like email and instant messaging worms, these programs are veiled as media files with double expansions. When the victim opens the downloaded file to view it or listen to it, they will download the worm to their computer (Moes, 2014).

5-  IRC Worms: Web Relay Chat (IRC) is an informing application that is mostly outdated nowadays but was all the rage at the turn of the century. Same as with today’s instant messaging platforms, computer worms were distributed via messages containing links and attachments. The latter was less effective due to an extra layer of protection that prompted users to accept incoming files before any transfer could take place (Moes, 2014).




How to avoid Worm Attack?

(brighthub,2010)

This diagram displays some tips that may help to avoid being exposed to worm attack.



Reference: 

MOES, T (2019) What is a Computer Worm? [Online] SOFTWARELAB. Available from: What is a Computer Worm? The Top 5 Examples You Need to Know (softwarelab.org) [Accessed 06/06/21].

CIMPANU, C (2016) PhotoMiner Worm Spreads via Vulnerable FTP Servers, Mines for Crypto-Currency [Online] SOFTPEDIA. Available from: PhotoMiner Worm Spreads via Vulnerable FTP Servers, Mines for Crypto-Currency (softpedia.com) [Accessed 06/06/21].

BRIGHTHUB (2010) Computer Worms: How to Avoid Them? [Online] BRIGHTHUB. Available from: Computer Worms: How to Avoid Them? - Bright Hub [Accessed 06/06/21].

KNOPP, T (2017) Worm cyber attack symbol with laptop and red worm, isolated on blue background [Online] DREAMSTIME. Available from: Worm Cyber Attack Symbol With Laptop And Red Worm, Isolated On Blue Background Stock Illustration - Illustration of icon, presentation: 161890485 (dreamstime.com) [Accessed 06/06/21].

 

(KALOLA and BUCH, 2018)




This academic paper is written by Rachna Buch, Dhatri Ganda, Pooja Kalola and Nirali Borad. It talks about the risks of cybercrime that is done by a computer expert. In this paper, it is mentioned the consequences of cybercrime and the needs of cybersecurity. cybersecurity is to give prevention against cybercrime, while cybercrime is that several of acts made by individuals by making unsettling influence in-network, stealing others significant and private information, documents, hack bank details and accounts and moving money to their own. This paper gives itemized data regarding cybersecurity and cybercrime. It incorporates sorts of cybersecurity which are Communication Security, Network Security and Operational Security. Besides, it discusses the importance of cybersecurity when cybercrime occurs. In addition to mentioning the major problems in cybersecurity, such as virus, worms, hacker, malware, trojan horses and password cracking. Furthermore, advantages of cybersecurity which are improved security of cyberspace, increase in cyber defense, increase in cyber speed, protecting company data and information, protect systems and computers against virus, worms, malware and spyware, etc. and protects individual private information. While the disadvantages are it will be costly for average users, firewalls can be difficult to configure correctly, needing to keep updating the new software in order to keep security up to date and make the system slower than before. Moreover, the history of cybercrime as is mentioned in some important events, such as the first recorded cybercrime was recorded in the year 1820. Finally, the sorts of cybercrime, such as phishing, denial-of-service attack, slicing attack and bombing and spamming (Buch and Kalola, 2018).










Reference:

BUCH, R AND KALOLA, P (2018) World of Cyber Security and Cybercrime. [Online] RESEARCHGATE. Available from: Cyber Security : (PDF) World of Cyber Security and Cybercrime (researchgate.net) [Accessed 06/06/21].



 

(Author's Work)



The steps included primary ideas behind Man In The Middle Attack (MITM) are, to block traffic, break the validation chain, and impersonate the hacked endpoints consistently. The principle objective is to steal the session, and consequently the data being sent over the wire. This handshake builds up a connection between two distinctive network interface cards, which at that point use the bundle sequencing and information affirmations to send or get data. The information flows from the physical layer all the way up to the application layer.  At layer-2 and layer-3, an Ethernet and IP parcel datagram are framed, though at the show layer the cryptographic SSL session is established assuming that the application is intending to utilize it. It is imperative to note here, that every one of these layers can possibly take part in the MITM attack (VALENCYNETWORKS,2019).






Reference:

VALENCYNETWORKS (2019) Cyber Attacks Explained Man In The Middle Attack. [Online] VALENCYNETWORKS. Available from: Cyber Security : Man In The Middle Attack Explained | Pune Mumbai Hyderabad Delhi Bangalore India | Valency Networks [Accessed 06/06/21].

Bricata’s platform makes it easy to get direct answers for alerts and protect network environments in real-time (bricata,2021).


(Author's Screenshot)




(Author's Screenshot)


I the shown picture, I demonstrated the explanation of each main tab in Bricata Software.


(Author's Screenshot)

   The Hunt button gives us immediately the hunt for other events tied to this source. As shown in the picture below:

(Author's Screenshot)

After clicking Hunt button it will permit us to instantly see everything the affected host has been doing. This host is producing countless alerts. As well as the different networks that are communicating with. In addition, it will let you know if you have to be careful about lateral movement or malware propagation from this host. 




(Author's Screenshot)



Furthermore, applying Groups to the view allows us rapidly to bunch huge volumes of metadata.




(Author's Screenshot)


The Resp IP and Services utilized in communication with the suspect network that gives us no motivation to think this host is proliferating malware along the side.







(Author's Screenshot)

Moreover, in Tags, you can customise tags for alerts to indicates these alerts need attention. And that could be by choosing between Authorities, expire- cert and IR target.





Reference:

BRICATA (2021) BRICATA PRODUCT TOUR. [Online] BRICATA. Available from:Tour the Dashboard - Bricata Network Detection & Response Platform [Accessed 05/06/21].


 


(Author's Screenshot)

In this post, I will explain how the software works. As it is displayed above, the search firstly identifies two clusters of alerting that contain malware. Then, choosing the lower alert group that shows an outer source (Germany) gives more details to see (bricata,2021).




(Author's Screenshot)


Then it will be shown a Summary Timeline of all alerts in the cluster. We can look at those individual alerts by clicking See Group Alerts (bricata,2021).







(bricata,2021).

As you can see here, these shown alerts tell a pretty clear story of a potentially malicious file being downloaded from an external website. Signatures identifying the suspicious download have alerted 3 times. Subsequently, Bricata has caught the file and specified it as ‘Suspected Malware’ We can see the individual alert by clicking Suspected Malware (bricata,2021).






Reference:

BRICATA (2021) BRICATA PRODUCT . [Online] BRICATA. Available from:Tour the Dashboard - Bricata Network Detection & Response Platform [Accessed 05/06/21].


 Bricata Software:

It is the leader in complete organization assurance. The Bricata solution gives unmatched network permeability, full-range threat identification, threat chasing, and post-location reaction capacities in a natural, firmly coordinated, and self-overseeing system. Its automated detection, productive GUIs, and expert system workflows make it easy-to-use for novices, while granular control of its engines, access to rich network metadata and PCAPs, and threat hunting capabilities give experts the power and control they demand. Bricata has been demonstrated to speed incident resolution by up to eight times by dependably recognizing threats and giving the setting important to get to truth rapidly and act(garlandtechnology,2021).



(Graner ,2019)





Benefits:

1-ML-Based Malware Conviction: automated analysis performed instantly by statically analyzing each item, identifying malicious behaviour and prioritizing analyst workflow (bricata,2021).

2-Speed of Response: with Bricata, analysts can close the gap between detection and response faster than ever and accelerate incident response(bricata,2021).

3-Smart PCAP: quickly access relevant data during an investigation with reduced storage requirements from Smart PCAP (bricata,2021).

4-Customizable & Flexible: bricata’s powerful platform is flexible and can be customized to create the workflows, use cases and integrations to meet your specific needs. (bricata,2021).







Who uses Bricata?

1-Companies: can quickly eliminate blind spots in their environment in the data center or the cloud and easily scale(bricata,2021).

2-Security Teams: can maximize talent and be more efficient and effective(bricata,2021).

3-Analyst: can see real-time metadata, tune detections and get direct answers quickly(bricata,2021).








(Waitt,2020)



One of the most remarkable feature is that Alert Grouping. Bricata currently upholds the grouping of alarms dependent on type. This altogether diminishes the volume of cautions an investigator needs to parse and accelerates alert investigations(Waitt,2020). The above picture summarises the details.










References:


BRICATA (2021) BRICATA PRODUCT TOUR. [Online] BRICATA. Available from:Bricata - Network Detection & Response. Analytics. Threat Hunting [Accessed 05/06/21].

WAITT, T (2020) Bricata Network Security Offers Support for MITRE ATT&CK® [Online] AMERICANSECURITYTODAY. Available from: Bricata Network Security Offers Support for MITRE ATT&CK® - American Security Today [Accessed 06/06/21].

GRANER , A (2019) ZeekWeek Q&A with the Community: Bricata [Online] ZEEK. Available from: Zeek: ZeekWeek Q&A with the Community: Bricata [Accessed 06/06/21].

GARLANDTECHNOLOGY (2021) Bricata Detect and Defend With AI-Based Malware Conviction and Anomaly Detection [Online] GARLANDTECHNOLOGY. Available from: Garland Technology Partner | Bricata [Accessed 06/06/21].


 Kevin Mitnick the most dangerous hacker, besides one of the FBI's most wanted, his biography began when he found himself in hacking in his childhood. At age 16, he accessed the organization of DEC and penetrated to some files which led him to be sentenced to prison to 1 year in jail in 1988. Then he escaped from jail, yet the FBI found him in 1995. However, he admitted that his ingenuity is caused by his social engineering skill. Despite all his trials, he is now a confided in a security consultant to the Fortune 500 and governments around the world.  



(CLARA,2016)





Reference:

CLARA, S (2016) Kevin Mitnick, "The World's Most Famous Hacker," to Give Closing Keynote at Bloxfest, the Infoblox Customer Conference. [Online] GLOBENEWSWIRE. Available from:Kevin Mitnick, "The World's Most Famous Hacker," to Give (globenewswire.com)[Accessed 04/06/21].

Older Posts Home

ABOUT ME



I could look back at my life and get a good story out of it. It's a picture of somebody trying to figure things out.

POPULAR POSTS

Contact Form

Name

Email *

Message *

Lajeen BLOG
Powered by Blogger.


CYBER SECURITY




Report Abuse

  • Home
  • Features
  • _post format
  • _error page
  • Beauty
  • Fashion
  • Lifestyle
  • Contact
  • Buy now

Search This Blog

Blog Archive

  • June 2021 (8)
  • May 2021 (10)
  • April 2021 (12)
  • Home
  • Features
  • _DropDown
  • __DropDown 1
  • __DropDown 2
  • __DropDown 3
  • _ShortCodes
  • _SiteMap
  • _Error Page
  • Learn Blogging
  • Documentation
  • Video Documentation
  • Download This Template
  • Download This Template

Footer Menu Widget

  • Home
  • About
  • Contact Us

Social Plugin

Workspace

Instagram


Contact




About Me

Lajeen saleh
View my complete profile
  • Home
  • About
  • Contact

Slider

5/random/slider

A Team Of Awesome People

We are a creative web design agency who makes beautiful websites for thousands of peoples.

Advertisement

Main Ad

Subscribe Us

Popular Posts

  • Academic Paper Summary - World of Cyber Security and Cybercrime
  • Kevin Mitnick - Method

Designed by OddThemes | Distributed By Gooyaabi Template