

{"id":848,"date":"2017-07-25T13:05:31","date_gmt":"2017-07-25T13:05:31","guid":{"rendered":"https:\/\/warp.lacnic.net\/?page_id=848\/"},"modified":"2020-09-15T18:03:35","modified_gmt":"2020-09-15T15:03:35","slug":"glossary","status":"publish","type":"page","link":"https:\/\/csirt.lacnic.net\/en\/glossary","title":{"rendered":"Glossary"},"content":{"rendered":"<h3>Beta Bot (Neurevt)<\/h3>\n<p>Neurevt is a Trojan that affects computers running the Windows operating system. This trojan has been designed to steal sensitive information such as login credentials to certain services and operating system data from the user\u2019s computer, among others.<\/p>\n<h3 id=\"botnet_cec\">CeC<\/h3>\n<p>Malware Command and Control unit. They are used by an attacker to control the victim&#8217;s devices, both to send as well as to receive information.<\/p>\n<h3>Conficker<\/h3>\n<p>Conficker is a malware in the form of a computer worm targeting the Windows operating system. Once infected, a computer becomes part of a botnet in which each computer is controlled remotely by a central node. This malware can be used to perform multiple crimes and has mainly been used to steal information from infected systems and to send spam.<\/p>\n<h3>Cutwail (Pushdo)<\/h3>\n<p>Cutwail is a malware in the form of a Trojan that infects computers running the Windows operating system, which then become part of a botnet. It is basically used for spamming and downloading files containing malware onto the infected computer, where they are later executed.<\/p>\n<h3 id=\"fake-coupon\">Fake Coupon<\/h3>\n<p>Discount coupons or vouchers used as bait to obtain users\u2019 personal information. They are usually shared via WhatsApp.<\/p>\n<h3 id=\"dns-poisoning\">DNS Poisoning<\/h3>\n<p>Malicious DNS server that redirects users attempting to reach a legitimate site to a fake site for the purpose of stealing their personal information.<\/p>\n<h3>DoS (Denial of Service)<\/h3>\n<p>A Denial of Service (DoS) attack consist of carrying out certain actions in order to make a machine or network resource unavailable to its intended users. Examples: ping of death, SYN Flood, etc.<\/p>\n<h3>Dyre<\/h3>\n<p>Dyre is a malware in the form of a Trojan that infects computers running the Windows operating system, which then become part of a botnet. Its most common applications include stealing credentials, spamming and downloading and installing other files containing malware.<\/p>\n<h3>E-mail Abuse<\/h3>\n<p>An attack executed through an e-mail message or a file attachment containing some type of malware.<\/p>\n<h3>Brute Force<\/h3>\n<p>Trial and error method. This is typically carried out with software that uses a dictionary containing the most commonly used passwords in order to decrypt the victim\u2019s password by systematically checking all possible passwords and passphrases until the correct one is found.<\/p>\n<h3>Gamut<\/h3>\n<p>Gamut is a malware in the form of a Trojan that affects computers running the Windows operating system. Infected computers become part of a botnet and are controlled remotely for criminal activities. The main goal of this botnet has been the distribution of spam.<\/p>\n<h3>Intrusion Attempt<\/h3>\n<p>Unauthorized login attempt. A brute force attack seeking to obtain the login credentials to a system. The most commonly reported protocol for this type of attacks is SSH.<\/p>\n<h3>Kelihos<\/h3>\n<p>Kelihos is the name of a botnet that uses P2P communications, which makes it difficult to detect the control centers. Some of the uses of the botnet include DoS attacks, spam, stealing Bitcoin wallets and Bitcoin mining.<\/p>\n<h3>Malware<\/h3>\n<p>Malicious code typically used to steal information, destroy systems totally or partially, or hijack information. Malware may be implanted through e-mail attachments, by downloading applications and by exploiting operating system vulnerabilities.<\/p>\n<h3>Mirai (iotmirai)<\/h3>\n<p>MIRAI is a botnet that affects the Internet of Things (IoT). This malware exploits the vulnerabilities of various devices, such as routers, digital video recorders and IP surveillance cameras. This botnet has mainly been used to carry out Denial-of-Service (DoS) attacks.<\/p>\n<h3><strong>Open DNS Resolver<\/strong><\/h3>\n<p>An open DNS resolver is a server that responds to any recursive domain name query without limiting query requests to local devices and\/or authorized clients.<\/p>\n<h3>Open Relay<\/h3>\n<p>Open Relay is an SMTP server configured in such a way that it allows anyone on the internet to send e-mail through it.<\/p>\n<h3>Other<\/h3>\n<p>Any other reported security incident that does not belong to the other categories.<\/p>\n<h3>PAC (Proxy auto-config)<\/h3>\n<p>A PAC attack redirects the victim\u2019s browser traffic to a fraudulent proxy server. This allows the attacker to see all of the victim\u2019s traffic and capture confidential information such as a usernames and passwords, or to hijack authentication sessions by stealing the victim\u2019s cookies.<\/p>\n<h3>Pharming (Rogue DNS)<\/h3>\n<p>A form of exploiting a vulnerability in the DNS server software or in the users\u2019 own devices that allows an attacker to redirect a website\u2019s traffic to another, fake site.<\/p>\n<h3>Phishing<\/h3>\n<p>A fraudulent attempt to obtain sensitive information by disguising a fraudulent site as a legitimate resource. These attacks are generally aimed at stealing users\u2019 login credentials in order to carry out financial fraud. Phishing can infect systems through fake e-mails or when a user visits a website with a questionable reputation.<\/p>\n<h3>Proxy<\/h3>\n<p>An intermediary server between a client and a destination server. Connection requests from the users of a network are sent to the desired destination through the proxy. This mechanism may allow the information that passes through it to be displayed, such as, for example, usernames\/passwords or other sensitive information.<\/p>\n<h3 id=\"proxy-poisoning\">Proxy Poisoning<\/h3>\n<p>Servers hosting fake sites to which the victims of pharming attacks are redirected.<\/p>\n<h3>Ransomware<\/h3>\n<p>A malicious application that infects a computer and encrypts certain files. Ransomware restricts the user\u2019s access to their files until a ransom is paid in exchange for the password to decrypt them.<\/p>\n<h3>Redirect<\/h3>\n<p>Attack used to redirect users from one site to another, even by creating redirect chains. Users are generally redirected to a fraudulent site.<\/p>\n<h3>Unauthorized Prefix Advertising<\/h3>\n<p>Route advertisements from unauthorized origins. Route hijacking occurs when a device advertises a prefix that it is not authorized to announce. This can be intentional or due to an operational error.<\/p>\n<h3><strong>Web Skimming<\/strong><\/h3>\n<p>Web skimming is a form of attack whereby an attacker compromises a website in order to steal users\u2019 payment information.<\/p>\n<h3>ZeroAccess<\/h3>\n<p>ZeroAccess is a malware in the form of a Trojan that infects computers running the Windows operating system, which then become part of a botnet. These botnets are controlled remotely by a central node and can be used for multiple malicious purposes. In addition to being controlled by a central unit, infected computers are mainly targeted for Bitcoin mining or for creating fraudulent online advertising campaigns.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Beta Bot (Neurevt) Neurevt is a Trojan that affects computers running the Windows operating system. This trojan has been designed to steal sensitive information such as login credentials to certain services and operating system data from the user\u2019s computer, among others. CeC Malware Command and Control unit. They are used by an attacker to control [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-848","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC CSIRT - Glossary<\/title>\n<meta name=\"description\" content=\"This page explains some of the technical terms used when talking about computer security and its potential threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csirt.lacnic.net\/en\/glossary\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC CSIRT - Glossary\" \/>\n<meta property=\"og:description\" content=\"This page explains some of the technical terms used when talking about computer security and its potential threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csirt.lacnic.net\/en\/glossary\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC CSIRT\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-15T15:03:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic_csirt\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/glossary\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/glossary\",\"name\":\"LACNIC CSIRT - Glossary\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\"},\"datePublished\":\"2017-07-25T13:05:31+00:00\",\"dateModified\":\"2020-09-15T15:03:35+00:00\",\"description\":\"This page explains some of the technical terms used when talking about computer security and its potential threats.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/glossary#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/glossary\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/glossary#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"name\":\"LACNIC CSIRT\",\"description\":\"Incident Response Center - LACNIC CSIRT\",\"publisher\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#organization\",\"name\":\"LACNIC CSIRT\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"contentUrl\":\"https:\\\/\\\/csirt.lacnic.net\\\/wp-content\\\/uploads\\\/lacnic-csirt-2020.png\",\"width\":680,\"height\":330,\"caption\":\"LACNIC CSIRT\"},\"image\":{\"@id\":\"https:\\\/\\\/csirt.lacnic.net\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/lacnic_csirt\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC CSIRT - Glossary","description":"This page explains some of the technical terms used when talking about computer security and its potential threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csirt.lacnic.net\/en\/glossary","og_locale":"en_US","og_type":"article","og_title":"LACNIC CSIRT - Glossary","og_description":"This page explains some of the technical terms used when talking about computer security and its potential threats.","og_url":"https:\/\/csirt.lacnic.net\/en\/glossary","og_site_name":"LACNIC CSIRT","article_modified_time":"2020-09-15T15:03:35+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@lacnic_csirt","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/csirt.lacnic.net\/en\/glossary","url":"https:\/\/csirt.lacnic.net\/en\/glossary","name":"LACNIC CSIRT - Glossary","isPartOf":{"@id":"https:\/\/csirt.lacnic.net\/en\/#website"},"datePublished":"2017-07-25T13:05:31+00:00","dateModified":"2020-09-15T15:03:35+00:00","description":"This page explains some of the technical terms used when talking about computer security and its potential threats.","breadcrumb":{"@id":"https:\/\/csirt.lacnic.net\/en\/glossary#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csirt.lacnic.net\/en\/glossary"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/csirt.lacnic.net\/en\/glossary#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csirt.lacnic.net\/en"},{"@type":"ListItem","position":2,"name":"Glossary"}]},{"@type":"WebSite","@id":"https:\/\/csirt.lacnic.net\/en\/#website","url":"https:\/\/csirt.lacnic.net\/en\/","name":"LACNIC CSIRT","description":"Incident Response Center - LACNIC CSIRT","publisher":{"@id":"https:\/\/csirt.lacnic.net\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csirt.lacnic.net\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/csirt.lacnic.net\/en\/#organization","name":"LACNIC CSIRT","url":"https:\/\/csirt.lacnic.net\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/","url":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","contentUrl":"https:\/\/csirt.lacnic.net\/wp-content\/uploads\/lacnic-csirt-2020.png","width":680,"height":330,"caption":"LACNIC CSIRT"},"image":{"@id":"https:\/\/csirt.lacnic.net\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/lacnic_csirt"]}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/pages\/848","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=848"}],"version-history":[{"count":0,"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/pages\/848\/revisions"}],"wp:attachment":[{"href":"https:\/\/csirt.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=848"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}