1.0 Threats, Attacks and Vulnerabilites Flashcards
Phishing
A broad term used to describe the fraudulent acquisition of information like credentials
Smishing
Phishing via SMS or text messages
Vishing
Phishing via the physical phone
Spam
This is a social engineering technique used to get users to open a message in an email/text to exploit malware.
Spam over instant messaging (SPIM)
This is spam that happens over email
Spear Phishing
Phishing while focusing on a particular group of people
Dumpster Diving
This is where people retrieve information by looking for it in the trash.
Shoulder Surfing
This is a technique used by gaining credentials by looking over someones shoulder in order to retrieve their information
Pharming
This redirects traffic away from legitimate websites to malicious versions.
Tailgating
This is a physical entry attack while following behind someone to gain access to a building/room.
Eliciting Information
a technique used to gather information without targets realizing they are providing it; examples of this include flattery
Whaling
This is phishing a specific person in an organization that is either an admin or someone high up.
Prepending
- Adding in a phrase such as safe to a set of email headers to attempt to fool someone into thinking the email is indeed safe.
- Adding information as part of another attack to manipulate the outcome
- Suggesting topics via a social engineering conversation to lead toward related information the social engineer is looking for.
Identity Fraud
This is the use of someone else’s identity
Invoice scams
This involves sending fake invoices to organizations in the hopes of receiving payment.
Credential harvesting
This is the process of gathering credentials like usernames and passwords. Multifactor authentication is a great way to stop credential harvesting from continuing.
Reconnaissance
This is the gathering of information about a target, whether it is an organization, individual or something else.
Hoax
These are intentional falsehoods that come in a variety of forms such as virus hoaxes to fake news.
Impersonation
A person acting like someone they are not
Watering Hole Attack
This uses websites that targets use to attack the victim, the attackers can compromise the site that the victims are using.
Typosquatting
Attackers using similar legit URL’s to direct victims to the attackers fake URL that houses malware.
pretexting
This is the process of using a made-up scenario to justify why you are approaching an individual
Influence Campaigns
Individuals and organizations conduct influence campaigns to turn public opinion in directions of their choosing.
Principles