https://github.com/compcode1/incident-report-3
PROJECT INTRODUCTION I am are a cybersecurity analyst for yummyrecipesforme.com, a website that sells recipes and cookbooks. A former employee has decided to lure users to a fake website with malware.
https://github.com/compcode1/incident-report-3
Last synced: 10 months ago
JSON representation
PROJECT INTRODUCTION I am are a cybersecurity analyst for yummyrecipesforme.com, a website that sells recipes and cookbooks. A former employee has decided to lure users to a fake website with malware.
- Host: GitHub
- URL: https://github.com/compcode1/incident-report-3
- Owner: Compcode1
- License: gpl-3.0
- Created: 2024-11-20T21:59:34.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-11-20T23:58:02.000Z (about 1 year ago)
- Last Synced: 2024-11-21T00:27:50.676Z (about 1 year ago)
- Language: Jupyter Notebook
- Homepage:
- Size: 0 Bytes
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
PROJECT INTRODUCTION
I am are a cybersecurity analyst for yummyrecipesforme.com, a website that sells recipes and cookbooks. A former employee has decided to lure users to a fake website with malware.
The former employee/ hacker executed a **brute force attack** to gain access to the web host. They repeatedly entered several known default passwords for the **administrative account** until they correctly guessed the right one. After they obtained the **login credentials**, they were able to access the **admin panel** and **change the website’s source code**. They embedded a **javascript function** in the source code that prompted visitors to download and run a file upon visiting the website. After embedding the malware, the hacker changed the password to the administrative account. When customers download the file, they are redirected to a fake version of the website that contains the **malware**.
Several hours after the attack, multiple customers emailed yummyrecipesforme’s helpdesk. They complained that the company’s website had prompted them to download a file to access free recipes. The customers claimed that, after running the file, the address of the website changed and their personal computers began running more slowly.
In response to this incident, the website owner tries to log in to the admin panel but is unable to, so they reach out to the website hosting provider. You and other cybersecurity analysts are tasked with investigating this security event.
To address the incident, you create a **sandbox environment** to observe the suspicious website behavior. You run the **network protocol analyzer tcpdump**, then type in the URL for the website, yummyrecipesforme.com. As soon as the website loads, you are prompted to download an executable file to update your browser. You accept the download and allow the file to run. You then observe that your browser redirects you to a different URL, greatrecipesforme.com, which contains the malware.
The logs show the following process:
The browser initiates a **DNS request**: It requests the **IP address** of the yummyrecipesforme.com URL from the **DNS server**.
The **DNS** replies with the correct IP address.
The browser initiates an **HTTP request**: It requests the yummyrecipesforme.com webpage using the **IP address** sent by the DNS server.
The browser initiates the download of the **malware**.
The browser initiates a **DNS request** for greatrecipesforme.com.
The DNS server responds with the **IP address** for greatrecipesforme.com.
The browser initiates an **HTTP** request to the IP address for greatrecipesforme.com.
**A senior analyst confirms that the website was compromised. The analyst checks the source code for the website. They notice that javascript code had been added to prompt website visitors to download an executable file. Analysis of the downloaded file found a script that redirects the visitors’ browsers from yummyrecipesforme.com to greatrecipesforme.com.**
The cybersecurity team reports that the web server was impacted by a **brute force attack**. The disgruntled hacker was able to guess the password easily because the admin password was still set to the default password. Additionally, there were no controls in place to prevent a brute force attack.
Your job is to document the incident in detail, including identifying the network protocols used to establish the connection between the user and the website. You should also recommend a security action to take to prevent brute force attacks in the future.