- Go to system and install a malicious piece of code (Rarely heard of it or very few cases),
- Supply malware in USB drives with autorun (pretty common and still effective, spreading malware enormously)
- Distribute malware as an email attachment (pretty common and still effective unfortunately)
- Convincing users to download legitimate looking software but actually MALWARE (providing direct link in email, chat or other mechanism)
Drive-by-download. Drive-by-download is working covertly, which make it difficult to suspect or detect. Since last 3-4 years, awareness in web administrators and security professionals regarding server side vulnerabilities has increased. Eventually, they are doing their job quite nicely, securing all six OSI layers except the last and most vulnerable layer- "Application layer".
Motive of malware authors:
- Access on the infected computer
- Steal user credentials, banking or other passwords
- Use as a launching pad for further attacks
- Install more sophisticated malwares/viruses
- Gain chain of access to corporate networks via VPN etc for which user or user's system is allowed for.
Details may be find in presentations.
1. WCMP-Web2.0 Attacks.pdf
2. Tweet for DDoS.pdf
To know more, follow:
http://www.cert-in.org.in/s2cMainServlet?pageid=PRSTNVIEW03&reCode=CIWS-2011-1910
http://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2011-0066.0%20Attacks.pdf
http://www.cert-in.org.in/Downloader?pageid=5&type=2&fileName=CIPS-2011-0067.pdf
#@v3 #@f3 8r0w$!n9 . . .
nj0y !!!