6.10 Exploit Delivery Methods Explained
Key Concepts
1. Phishing
Phishing is a method of exploit delivery where attackers send fraudulent communications that appear to come from a reputable source. These communications often include malicious links or attachments that, when clicked or opened, deliver the exploit to the target system.
2. Watering Hole Attack
A Watering Hole Attack involves compromising a website frequently visited by the target group. The attacker injects malicious code into the website, which is then executed by the target's browser when they visit the site, delivering the exploit.
3. Drive-By Download
Drive-By Download is a method where the exploit is automatically downloaded and executed on the target's system when they visit a compromised website. The exploit is often embedded in the website's code, and the user does not need to take any action for the exploit to be delivered.
4. Social Engineering
Social Engineering involves manipulating individuals into performing actions or divulging confidential information. This method can be used to trick users into downloading and executing malicious files, thereby delivering the exploit.
5. Supply Chain Attack
A Supply Chain Attack targets the software supply chain to deliver exploits. This can involve compromising third-party software or updates that are trusted by the target organization, allowing the exploit to be delivered through seemingly legitimate channels.
6. Exploit Kits
Exploit Kits are automated tools that scan for vulnerabilities in the target's system and deliver the appropriate exploit. These kits are often used in conjunction with other delivery methods, such as compromised websites or phishing emails, to increase the likelihood of successful exploitation.
Explanation of Concepts
Phishing
Phishing attacks often involve emails that appear to be from a trusted source, such as a bank or a colleague. The email may contain a link to a malicious website or an attachment that, when clicked or opened, delivers the exploit to the target's system.
Watering Hole Attack
In a Watering Hole Attack, the attacker identifies a website frequently visited by the target group, such as a company's internal portal or a popular industry forum. The attacker then compromises the website and injects malicious code that delivers the exploit when the target visits the site.
Drive-By Download
Drive-By Download attacks occur when a user visits a compromised website. The website's code contains malicious scripts that exploit vulnerabilities in the user's browser or plugins. The exploit is automatically downloaded and executed without the user's knowledge or interaction.
Social Engineering
Social Engineering attacks often involve convincing the target to perform an action that delivers the exploit. For example, an attacker might call an employee and impersonate a technical support representative, asking them to download and run a "fix" that actually contains the exploit.
Supply Chain Attack
In a Supply Chain Attack, the attacker compromises a third-party software provider or distributor. The compromised software or updates are then delivered to the target organization, allowing the exploit to be installed on the target's systems through trusted channels.
Exploit Kits
Exploit Kits are automated tools that scan the target's system for vulnerabilities and deliver the appropriate exploit. These kits are often used in conjunction with other delivery methods, such as compromised websites or phishing emails, to increase the likelihood of successful exploitation.
Examples and Analogies
Phishing
Consider a phishing email that appears to be from a bank, asking the user to click a link to verify their account. The link leads to a malicious website that delivers the exploit when the user enters their credentials.
Watering Hole Attack
Think of a Watering Hole Attack as a hunter setting a trap near a watering hole frequented by a specific animal. The animal (target) is likely to fall into the trap (exploit) when it visits the watering hole.
Drive-By Download
Imagine visiting a website that automatically downloads a file to your computer without your knowledge. This file contains the exploit, which is executed as soon as it is downloaded.
Social Engineering
Consider a scenario where an attacker calls an employee and convinces them to download a "security update" that actually contains the exploit. The employee, believing the call is legitimate, installs the malicious software.
Supply Chain Attack
Think of a Supply Chain Attack as a manufacturer unknowingly using compromised parts in their products. When the products are delivered to customers, the compromised parts deliver the exploit.
Exploit Kits
Consider an Exploit Kit as a tool that automatically scans a house for unlocked doors and windows. Once it finds an entry point, it delivers the exploit, much like a burglar entering through an unlocked door.