Your grandmother called you in the middle of the night very upset and worried. H
ID: 3705809 • Letter: Y
Question
Your grandmother called you in the middle of the night very upset and worried. Her computer screen is frozen and she cannot do anything in her computer unless she pays some money to someone. You easily figured it out and fix the problem. A week later grandmother called you again and more upset and worried this time than last. She gave someone her social security number since the email came from her bank! You can’t blame her, can you? So now you trace back the DNS of the email account and retrieve the IP address of the adversary. This is PAYBACK time! You send 1 million spoof TCP request to teach that adversary a lesson.
How many different types of attacks took place in the above scenario? Name them all and explain in your words.
Explanation / Answer
Answer)
Firstly, when grandmother's machine was frozen and she cannot do anything in her computer unless she pays some money to someone, these kinds of issues occur when somebody has installed ransomware on the system. Ransomware is a type of infection or malicious code executed on the target system, to lock the PC down so that user's cannot access the data or account like they should be able to. Ransomware blocks the user access to the computer system until a ransom or some money is paid to the attacker upon which he may unblock access to the system. So this was a ransomware attack on the system which you fixed.
In the second scenario, grandmother called you to say that She gave someone her social security number since the email came from her bank. This is called a phishing attack since in the phishing the attacker poses as the original website to collect sensitive private and personal information such as SSN, username, password, credit card details for malicious intentions and inflicting damage to the person hence. Thus here the attacker drafted a mail posing as from the bank and got your grandmother's SSN.
In the third scenario, You send 1 million spoof TCP request to teach that adversary a lesson. So this is a DOS attack. You attacked the website or the IP address, by sending a million spoof TCP requests. Denial of Service floods server, systems and networks with requests. Now the web server cannot service so many requests and ultimately crashes. Thus the services or the machine of the IP address are disrupted.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.