2.2 Explain common threat vector and attacks surfaces/ social engineering Flashcards
2.0 Threats, Vulnerabilities, and Mitigations
Different Threat Vectors
■ Message-based : email, SMS, phishing
■ Image-based : embedding of malicious code inside of an image file
■ File-based : disguised as legitimate documents or software, can be
transferred as email attachments, through file-sharing services, or hosted
on a malicious website
■ Voice Calls : Vhishing
■ Removable Devices : Baiting : Attacker might leave a malware-infected USB drive in a location where their target might find it.
■ Unsecured Networks : wireless, wired, and Bluetooth networks that
lack the appropriate security measures to protect these networks
BlueBorne or BlueSmack
exploits
BlueBorne
■ Set of vulnerabilities in Bluetooth technology that can
allow an attacker to take over devices, spread malware, or
even establish an on-path attack to intercept
communications without any user interaction
BlueSmack
■ Type of Denial of Service attack that targets
Bluetooth-enabled devices by sending a specially crafted
Logical Link Control and Adaptation Protocol packet to a
target device
Threat Vector
how is the attack
- Means or pathway by which an attacker can gain unauthorized access
Attack Surface
where is the attack
- various points where an unauthorized user can try to enter
data to or extract data from an environment
Attack Surface Can be minimized by
Restricting Access
Removing unnecessary software
Disabling unused protocols
Human vectors/social engineering Techniques
- Phishing
- Vishing
- Smishing
- Misinformation/disinformation
- Impersonation
- Business email compromise
- Pretexting
- Watering hole
- Brand impersonation
- Typosquatting
- Frauds and Scams
Social Engineering
Manipulative strategy exploiting human psychology for unauthorized access to
systems, data, or physical spaces
○ Motivational Triggers Used by Social Engineer
- Familiarity and Likability
● Consensus and Social Proof
● Authority and Intimidation
● Scarcity and Urgency
- Phishing
Sending fraudulent emails that appear to be from reputable sources to reveal personal information
- Vishing
Voice Phishing, tricks their victims into sharing personal or financial information
- Smishing
text messages to trick individuals into providing their
personal information
- Misinformation/disinformation
Misinformation
■ False or inaccurate information shared without harmful intent
○ Disinformation
■ Involves the deliberate creation and sharing of false information with the intent to deceive or mislead
- Impersonation
Attackers provide details to help make the lies and the impersonation
more believable to a potential victim.
- Business email compromise
targets businesses by
using one of their internal email accounts to get other employees to
perform some kind of malicious actions on behalf of the attacker
- Pretexting
Creating a fabricated scenario to manipulate targets