Computer System Vulnerabilities Exploited by Hackers
Dr. Lucky Ogoo
Cyber Security Analyst specialising in Ethical Hacking and Network Security | Data Analytics | Security & Defence | Cloud Security & Management | Cyber Intelligence Gathering
As technology evolves, so do the methods of those looking to exploit it. Hackers, equipped with an ever-expanding toolkit of techniques, continually find new vulnerabilities in computer systems. Understanding these vulnerabilities and how they are exploited is crucial for anyone involved in cybersecurity. This newsletter delves into the top vulnerabilities commonly exploited by hackers, shedding light on the tactics used and how organisations can protect themselves.
1. Phishing Attacks
Phishing remains one of the most prevalent methods hackers use to exploit computer systems. Phishing involves tricking individuals into providing sensitive information, such as usernames, passwords, and credit card details, by masquerading as a trustworthy entity.
How Phishing Works
Notable Phishing Exploits
·? United States Marshals Service: This federal law enforcement agency experienced a major ransomware attack compromising sensitive law enforcement data and personal information of individuals associated with USMS investigations.
·? 3CX Supply Chain Attack: In March, North Korean actors compromised the 3CX Private Automatic Branch Exchange platform. This supply chain attack affected a VoIP software development company used by over 600,000 organizations globally. The attackers inserted malicious code into the 3CX endpoint clients, which were downloaded as updates by the users.
·? Mailchimp Breach: In January, Mailchimp suffered a breach through a social engineering attack that allowed hackers to access 133 customer accounts. The data exposed included names, emails, and web addresses, affecting customers such as WooCommerce and FanDuel?
·? Twitter Data Leak: A dataset containing information on 200 million Twitter users, including email addresses and usernames, was found circulating on criminal forums. This exposed the identities of users who may have wished to remain anonymous, raising concerns about targeted phishing and doxxing attacks?
·? Deezer Data Breach: A hacker posted data on over 200 million Deezer users, including personal information such as full names, dates of birth, and location data. Although passwords were not included, this information could be exploited for phishing and identity theft?
The RSA Attack (2011): A spear-phishing email with a malicious Excel attachment led to the compromise of RSA Security’s systems. This attack ultimately allowed hackers to steal data related to RSA’s SecurID two-factor authentication products, impacting numerous clients worldwide.
Google and Facebook (2013-2015): A Lithuanian hacker tricked employees of these tech giants into wiring over $100 million by posing as a legitimate supplier.
Preventing Phishing Attacks
2. SQL Injection
SQL Injection (SQLi) is a type of cyber-attack where hackers exploit vulnerabilities in an application’s software by injecting malicious SQL statements into entry fields for execution.
How SQL Injection Works
Notable SQL Injection Exploits
·? MOVEit Transfer SQL Injection Vulnerability (CVE-2023-34362): The MOVEit Transfer software, used for managed file transfers, was hit by a zero-day SQL injection vulnerability. This flaw was actively exploited by the CL0P ransomware group to exfiltrate sensitive data from vulnerable servers. The exploit involved deploying a custom ASP.NET web shell to maintain persistence on compromised networks.
·? WP Fastest Cache Plugin (CVE-2023-6063): A critical SQL injection vulnerability was discovered in the WP Fastest Cache plugin, affecting over 600,000 WordPress websites. The vulnerability allowed attackers to exploit unsensitised user input, specifically the 'username' value extracted from cookies, leading to unauthorised access to sensitive database information?
·? LayerSlider WordPress Plugin: The LayerSlider plugin, used on over one million WordPress sites, was found to have an unauthenticated SQL injection vulnerability. This critical flaw necessitated urgent updates from site administrators to prevent potential exploitation?
·? Moodle Platform (CVE-2023-30944): Moodle, a popular learning management system, was affected by an SQL injection vulnerability due to insufficient sanitisation of user-supplied data in its Wiki module. This allowed remote attackers to execute limited SQL commands within the application database
Sony Pictures (2014): SQL Injection was used as one of the attack vectors in the infamous breach that led to the leak of unreleased movies and personal information of employees.
Heartland Payment Systems (2008): A major payment processor was breached via SQL injection, compromising over 130 million credit card numbers.
Preventing SQL Injection
3. Cross-Site Scripting (XSS)
Cross-Site Scripting (XSS) attacks occur when an attacker injects malicious scripts into content from otherwise trusted websites. These scripts can then be executed in the browsers of users who visit the compromised sites.
How XSS Works
Notable XSS Exploits
Preventing XSS
4. Malware
Malware, short for malicious software, encompasses various harmful programs like viruses, worms, Trojans, ransomware, and spyware. Hackers use malware to damage or disrupt systems, steal data, or gain unauthorised access.
Types of Malware
Notable Malware Exploits
·? BlackCat/ALPHV Ransomware Attacks:
·? MOVEit Transfer Vulnerability Exploits by Clop Group:
·? NCR Aloha POS Attack by BlackCat/ALPHV:
·? QakBot Disruption and Successor Malware:
·? Prospect Medical Holdings Attack by Rhysida:
·? University of Hawaii Ransomware Incident:
·? 3CX Supply Chain Attack:
Preventing Malware
5. Zero-Day Exploits
Zero-day exploits involve vulnerabilities that are unknown to the software vendor and have no patch available. Hackers exploit these vulnerabilities before they can be addressed, making them particularly dangerous.
领英推荐
How Zero-Day Exploits Work
Notable Zero-Day Exploits
Preventing Zero-Day Exploits
6. Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks
DoS and DDoS attacks aim to make a service unavailable by overwhelming it with traffic. DoS attacks come from a single source, while DDoS attacks involve multiple systems.
How DoS and DDoS Attacks Work
Notable DoS and DDoS Exploits
·? HTTP/2 Rapid Reset Attack: One of the most significant attacks in 2023 targeted AWS, Google, and Cloudflare using a novel method involving the rapid reset of HTTP/2 streams. This attack exploited a feature that allows rapid request cancellations, overwhelming servers by continuously opening and closing streams, leading to resource exhaustion. This attack was concerning because it used a smaller botnet than usual, indicating more efficient attack techniques (A10 Networks).
·? Akamai's Mitigation of a Massive Attack: On September 5, 2023, Akamai's Prolexic platform successfully defended against the largest DDoS attack directed at a major U.S. financial institution. The attack peaked at 633.7 Gbps and involved a combination of ACK, PUSH, RESET, and SYN flood vectors. Despite the attack's intensity, it lasted less than two minutes due to proactive defence measures (Akamai).
·? Cloudflare DDoS Insights: Throughout 2023, Cloudflare observed significant DDoS activity, particularly in regions like Israel and Palestine, where up to 17% of traffic was DDoS-related. The United States and China were major sources of these attacks, targeting industries such as cryptocurrency and gaming. Cloudflare's data also highlighted an increase in attacks on retail companies, correlating with high shopping periods like Black Friday (Cloudflare).
·? Trends in Attack Origins and Targets: According to multiple sources, DDoS attacks in 2023 were increasingly launched from smaller nations when normalized for traffic, with places like Saint Helena and Zimbabwe seeing disproportionate attack traffic. The most targeted industries included Information Technology, Financial Services, and Gaming, with significant attacks also noted against public relations and communications sectors (Cloudflare, A10 Networks).
Preventing DoS and DDoS Attacks
7. Man-in-the-Middle (MitM) Attacks
MitM attacks involve intercepting and altering communication between two parties without their knowledge. This can lead to data theft, unauthorised access, and other malicious activities.
How MitM Attacks Work
Notable MitM Exploits
1.???? Credential Phishing Campaigns: A significant rise in MitM phishing attacks targeting users' credentials was observed. These attacks involved setting up a MitM server that intercepted communication between the user and legitimate services like Microsoft Office 365 or Outlook. The server would capture login credentials and even handle multi-factor authentication (MFA) requests, allowing attackers to gain full access to user accounts?
2.???? BLUFFS Bluetooth Attacks: Researchers unveiled a series of vulnerabilities in Bluetooth technology, named BLUFFS (Bluetooth Forward and Future Secrecy). These attacks compromised session keys, enabling MitM attacks that could decrypt past and future Bluetooth communications. The vulnerabilities were found across multiple Bluetooth chips and affected a wide range of devices, highlighting a significant security flaw in the Bluetooth protocol.
3.???? SSL Stripping and Network Sniffing: Traditional MitM techniques such as SSL stripping and network sniffing remained prevalent. Attackers would downgrade HTTPS connections to HTTP, making it easier to intercept and manipulate the data being transmitted. Network sniffing tools were used to capture sensitive information passing over unsecured networks, particularly in public Wi-Fi environments.
4.???? DNS Spoofing: This technique saw increased use in 2023, where attackers would manipulate DNS responses to redirect users to malicious websites instead of legitimate ones. This method allowed attackers to intercept and alter communications, leading to the theft of sensitive data such as login credentials and financial information.
5.???? Wi-Fi Eavesdropping: By setting up rogue Wi-Fi hotspots, attackers intercepted communications between users and legitimate networks. This allowed them to capture unencrypted data or manipulate the traffic to launch further attacks
6.???? NSA PRISM Program (Revealed 2013): Involved extensive use of MitM techniques to eavesdrop on communication.
Preventing MitM Attacks
8. Insider Threats
Insider threats come from individuals within an organisation who have access to sensitive information. These threats can be malicious or accidental, resulting in data breaches, intellectual property theft, and other security incidents.
Types of Insider Threats
Notable Insider Threat Exploits
Preventing Insider Threats
9. Password Attacks
Password attacks involve attempting to obtain or guess a user's password. These attacks can be carried out using various methods, such as brute force, dictionary attacks, and credential stuffing.
How Password Attacks Work
Notable Password Attacks
Preventing Password Attacks
10. Advanced Persistent Threats (APTs)
APTs are prolonged and targeted cyber-attacks where an intruder gains access to a network and remains undetected for an extended period. These attacks are often carried out by nation-states or well-funded groups with specific objectives.
How APTs Work
Notable APT Exploits
Preventing APTs
United Kingdom and Global cyber-attack methods in 2023 involves aggregating data to understand the most common attack vectors used. This helps in identifying trends and threats.
The landscape of computer system vulnerabilities is vast and constantly evolving. Hackers employ a variety of methods to exploit these vulnerabilities, causing significant damage to organisations and individuals. By understanding the tactics used and implementing robust security measures, organisations can better protect themselves against these threats. Continuous vigilance, regular updates, and comprehensive security strategies are essential in the ongoing battle against cyber threats.