Threat Actor Techniques
Presented by Jeremy Junginger at FIRST security conference 2014
This demo presents a realistic attack scenario exhibiting some of the methods and techniques used by threat actors to compromise an internal network, from the Internet.
Found Scareware being served on ESPN website. So, did a quick, short analysis.
Twitter is again in news (surprise!, anyone).
Another XSS worm hit Twitter creating (good, eh!) publicity of another portal – StalkDaily.
One of the most prevalent mode of infection is headed through malicious web-sites. An attacker may chose to host his own site & use it for malware propagation. Or better still, exploit vulnerabilities in other web site(s) & host his malware code on them.
There are different ways to verify if a site is hosting malicious script(s) – varying from tedious manual inspection of code, to using tools such as Malzilla (http://malzilla.sourceforge.net/) & several others, or verifying with Google Safe Browsing.