In: Computer Science
An advisory practice was the target of an attack, whereby the malware allowed the fraudster to gain access to an adviser’s login details for all systems he had used recently. The fraudster now had access to every website or account that required a login. This included personal banking, platform desktop software, Xplan software and Facebook. The next time the adviser tried to log in to his platform desktop software, he was locked out. He rang our account executive team to report his access was locked. He couldn’t login, even though he was using his correct user name and password. The platform reset his password. The next day when the adviser tried again to login, he was locked out of the system again. It became obvious that the adviser’s user ID had been compromised. At this point, the user ID was deleted.
1. Identify and explain the malware attack experienced in the above scenario [5 Marks]
2. What recommendations would you provide for preventing such type of attacks? The recommendations should be discussed individually for the scenario and should not be a general list of recommendations [5 Marks]
1.
Keylogger malware is the malware attack technique that can be used to steal login passwords and other confidential or personal data from system.
This malware technical specially used for stealing user's id and password as this method works by tracking the user's keyboard stroke.So,this malware monitors your keystroke and store it ,then hacker or sender can retrieve the keystroke data and do various things with your data.
A keylogger monitors each keystroke of the user. The malware keeps track of the keystroke and saves the user's information locally – later the hacker requires physical access to retriever the stored user information
2. PREVENTIONS:-