CRIM 380 Study Guide - Midterm Guide: Homograph, Indictable Offence, Script Kiddie
Document Summary
Advanced persistent threat: group/foreign government, persistent, over long ime, target speciic. Malware writen for stealth: responsible for 80% of cybercrime. Credit card: method, hacker in crime unit enters target, goes unil skills allow, pass to next person with specialty/experise, repeat, top hacker steals wanted into and covers track, organizaion. Group disband or reform ater crime for next one. Organized cybercrime business: to meet goals, create library of sotware and diy malware, need: Malware distribuion: zeus ater it was leaked, it was modiied by various groups, creaing new botnets and variants, and botnet kits = started innovaion race, koobface infrastructure. Monitor links to ensure not lagged as malicious. Maintain banlist of ip addresses forbidden from accessing servers: specializaions. Botnets: want something simple so he can have a central system to control all of them at once: Defraud people: command and control computer is vulnerable. Law enforcement can allow computer to be infected with botnet on purpose: honeypot computer.