2 Flashcards
Supply chain attacks
Involves a threat actor seeking methods to infiltrate a company in its supply chain
Cloud-based attacks
Involves a threat actor compromising one account with access to cloud resources to compromise other cloud assets further
Birthday attack
Brute force attack aimed at exploiting collisions in hash function
Universal Serial Bus (USB) cable attack
Involves accessing unsuspecting user after they try to plug their devices into malicious usb cables or plus, similar to card skimmers
Watering hole attack
A social engineering technique where the attacker identifies a popular and frequently visited website used by the target group and compromises the website with exploit code.
Pharming
Involves redirecting users from legitimate websites to malicious ones by corrupting the victim’s computer’s name resolution process. Not specific to targeting group of individuals
Spear phishing
Highly targeted social engineering attack focusing on a specific individual within a company
Impersonation
Pretending to be someone else to deceive the target
A threat actor gains physical access to an organization’s premises and attempts to perpetrate an attack on the wired network. What specific threat vectors associated with unsecured networks are likely used by the threat actor in this scenario?
Direct Access Threat Vector as it involves using physical access to perpetrate an attack, such as accessing an unlocked workstation or stealing a PC
Remote and Wireless Network threat vector
Involves obtaining credentials for remote access or wireless connection to the network or spoofing a trusted resource like an access point
Bluetooth network threat vector
Involves exploiting vulnerabilities or misconfigurations in bluetooth devices
Default credentials threat vector
Refer to gaining control of a network device or app due to default passwords.
SMIShing
Social engineering attack that uses text messages to trick ppl into sharing sensitive information
Vishing
Type of phishing attack conducted through a voice channel
Phishing
Social engineering technique that tricks the target into interacting with malicious resource disguised as a trusted one, often using email as the vector