Inception Attacks: A Case Study

Improved Essays
Researchers from Blue Coat Labs have identified the emergence of a previously undocumented attack framework that is being used to launch highly targeted attacks in order to gain access to, and extract confidential information from, victims’ computers. Because of the many layers used in the design of the malware, we’ve named it Inception—a reference to the 2010 movie “Inception” about a thief who entered peoples’ dreams and stole secrets from their subconscious. Targets include individuals in strategic positions: Executives in important businesses such as oil, finance and engineering, military officers, embassy personnel and government officials. The Inception attacks began by focusing on targets primarily located in Russia or related to Russian

Related Documents

  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Target Breach Case Study

    • 675 Words
    • 3 Pages

    Our group decided to discuss the Target breach. This breach occurred in 2013 when they stated hackers broke into the retailer’s network using login credentials stolen from a heating, ventilation and air conditioning company that does work for Target at a number of locations. This company called Fazio had access rights to Target’s network for carrying out tasks like remotely monitoring energy consumption and temperatures at various stores. The attackers leveraged the access provided by the Fazio credentials to move around undetected on Target’s network and upload malware programs on the company’s point of sale systems. The hackers first tested the date-stealing malware on a small number of cash registers.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Question #1: What would be your response to the order? Explain in detail. My first response towards the operation order is to question the necessity of forcefully removing local evacuee from their homes and destroying their property if they refuse to evacuate. Then explain to the commander that this type of action is prohibited and in clear violation of the Law of War. My second response will be to advice that the operation order be revised before the execution of the order because the destruction of civilian property unnecessary and cannot be justified under military necessity.…

    • 686 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Albert Gonzalez is an American hacker and computer criminal who is included in the charge card robbery and exchanging of more than 170 million cards and ATM numbers from 2005 through 2007. He is otherwise called "Segvec," "Soupnazi" and "J4guar" among Internet circles. Gonzalez and his group utilized Wardriving and SQL infusion to send auxiliary sections on a couple of corporate structures to dispatch bundle sniffing (especially, ARP Spoofing) ambushes which allowed him to take PC data from inward corporate frameworks. Gonzalez had three government indictments: 1. May 2008 in New York for the Dave and Buster's case 2.…

    • 910 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Opm Hack

    • 896 Words
    • 4 Pages

    With the expansion of technology and the Internet, people fiercely protect their online identity to include regularly changing and safeguarding online passwords, upgrading security scans to keeps computers protected from viruses. However, personal and sensitive information exists online, and it is vulnerable even when safety measures are in place. This vulnerability led to a compromise of the Office of Personnel Management (OPM) database and sensitive information was obtained by unauthorized sources. Living in the information age is exciting and convenient. People can sit at their computers and conduct research without ever having to consult a print-version encyclopedia, shop without ever having to leave the comforts of their…

    • 896 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In the film Inception, the question that is raised is, is Dominic Cobb dreaming or is he awake. After watching the film multiple times, the answer is never really clear. You just have to pick a side, and believe what you would like. Throughout the film, we are deceived by the totem, the children, the overpowering subconscious, the jumping around of the movie, the fighting that is always happening, and Mal, which leads us to believe that Dominic is still dreaming.…

    • 2607 Words
    • 11 Pages
    Improved Essays
  • Improved Essays

    Zero Day Economy Essay

    • 620 Words
    • 3 Pages

    An Overview of the Zero Day Economy: Classification, Longevity, and Costs of Zero Day Exploits Offensive cyber security hinges on exploiting vulnerabilities in order to create effects on adversaries’ cyber systems. A commonly shared belief in the field is that an attacker has more of an advantage if the effect uses an unknown vulnerability, also known as a zero day. Given this shared belief, the discovery of zero days, the process of turning them into reliable effects, and their eventual sale and use to either nation-state actors or criminal organizations is the foundation of offensive cyber security operations. Despite this importance, the world surrounding zero days, primarily their development and their sale, has not garnered much formal research.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    A program called X-KEYSCORE was developed and used by the NSA that provides the “widest reaching” access of information about individual’s online activity. (Regan 36). These certain type of practices could be happening to anyone at any time. The U.S. government justifies these practices by searching for “act of terrorism”. Terrorist organizations wanting to make arrangements by means of email could be easily exploited as well.…

    • 1122 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Summary Of Blue Pill

    • 826 Words
    • 4 Pages

    This abstract is a summary of research into malware called ‘Blue Pill’. It was developed by a security researcher named Joanna Rutkowska, a low-level security and stealth malware researcher. Her intention was to show that a prototype malware, code-named Blue Pill, could "100 percent undetectable” (Vaas, 2007). She created it as part of a research project. It worked by bypassing Microsoft 's digital signature protection for kernel mode drivers.…

    • 826 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Inception, directed by Christopher Nolan, is by far my favorite movie of all time. From top shelf actors, to the unbelievably intricate script, it is simply a production masterpiece through and through. From start to finish, Nolan uses the depth and complexity of the plot to have the audience asking questions that can only truly be answered based off each person’s own opinion about what they saw in the movie. As well as second to none visuals and crisp execution of every single scene. From the incredible work the climax is comprised of, to dialogue between two characters late at night in a quiet warehouse.…

    • 1663 Words
    • 7 Pages
    Great Essays
  • Great Essays

    Ransomware Essay

    • 1262 Words
    • 6 Pages

    Information systems and the data they produce and store can save lives and start wars, among a multitude of other things. Because of this, information systems present a tempting target for attackers wishing to use them for personal gain, either through hacking or malicious software. One particular type of malicious software has been on the rise in recent years: ransomware. This paper will examine what ransomware is, how it has developed over the years, the effects it has, and how it can be prevented and dealt with.…

    • 1262 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Inception director Christopher Nolan created a psychological sci-fi action film about a thief Dom Cobb who has the ability to enter into the dreams of others thereby learning their secrets. When given a proposition by Japanese businessman Mr. Saito Cobb cannot resist he assembles a team together, the plan to plant an idea in Mr. Saito’s opposition Robert Fischer Sr mind by creating dreams with dreams so in the end Robert Fischer Sr would think he came up with the idea himself. However the plan is a lot more difficult and complex. This scene is centred on the character Arthur, played by Joseph Gordon-Levitt.…

    • 1559 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    Inception Analysis

    • 800 Words
    • 4 Pages

    Christopher Nolan’s Inception has an ending that will make any viewer want to become a mathematician and try to solve the equation of the ending. If the spinning top fall or not. Now after we finished the film we were angry at the ending but amazed at the same time. If his in dream state or in reality, now this film make you have sleep-less nights thinking if the spinning top falls. Now the idea about the ending is that we were the audience to the whole dream and the end was a kick back to reality.…

    • 800 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Picture this: Townsville, Australia in the year 1971. A screaming infant is born with the name of Julian Assange. This baby is too young to have any friends, or enemies. All the child is born with is his mother and a world ahead of him. Skip ahead sixteen years; little Julian receives his first computer.…

    • 1215 Words
    • 5 Pages
    Great Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays