2.2 Explain common threat vector and attacks surfaces/ social engineering Flashcards

2.0 Threats, Vulnerabilities, and Mitigations

1
Q

Different Threat Vectors

A

■ Message-based : email, SMS, phishing

■ Image-based : embedding of malicious code inside of an image file

■ File-based : disguised as legitimate documents or software, can be
transferred as email attachments, through file-sharing services, or hosted
on a malicious website

■ Voice Calls : Vhishing

■ Removable Devices : Baiting : Attacker might leave a malware-infected USB drive in a location where their target might find it.

■ Unsecured Networks : wireless, wired, and Bluetooth networks that
lack the appropriate security measures to protect these networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

BlueBorne or BlueSmack
exploits

A

BlueBorne
■ Set of vulnerabilities in Bluetooth technology that can
allow an attacker to take over devices, spread malware, or
even establish an on-path attack to intercept
communications without any user interaction

BlueSmack
■ Type of Denial of Service attack that targets
Bluetooth-enabled devices by sending a specially crafted
Logical Link Control and Adaptation Protocol packet to a
target device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Vector

A

how is the attack
- Means or pathway by which an attacker can gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attack Surface

A

where is the attack
- various points where an unauthorized user can try to enter
data to or extract data from an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack Surface Can be minimized by

A

Restricting Access
Removing unnecessary software
Disabling unused protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Human vectors/social engineering Techniques

A
  • Phishing
  • Vishing
  • Smishing
  • Misinformation/disinformation
  • Impersonation
  • Business email compromise
  • Pretexting
  • Watering hole
  • Brand impersonation
  • Typosquatting
  • Frauds and Scams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Social Engineering

A

Manipulative strategy exploiting human psychology for unauthorized access to
systems, data, or physical spaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

○ Motivational Triggers Used by Social Engineer

A
  • Familiarity and Likability
    ● Consensus and Social Proof
    ● Authority and Intimidation
    ● Scarcity and Urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Phishing
A

Sending fraudulent emails that appear to be from reputable sources to reveal personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Vishing
A

Voice Phishing, tricks their victims into sharing personal or financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • Smishing
A

text messages to trick individuals into providing their
personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Misinformation/disinformation
A

Misinformation
■ False or inaccurate information shared without harmful intent

○ Disinformation
■ Involves the deliberate creation and sharing of false information with the intent to deceive or mislead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Impersonation
A

Attackers provide details to help make the lies and the impersonation
more believable to a potential victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Business email compromise
A

targets businesses by
using one of their internal email accounts to get other employees to
perform some kind of malicious actions on behalf of the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Pretexting
A

Creating a fabricated scenario to manipulate targets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Watering hole
A

compromise a specific
website or service that their target is known to use

17
Q
  • Brand impersonation
A

Attackers use the brand’s logos, language, and information to create
deceptive communications or website.

attacker pretends to
represent a legitimate company or brand

18
Q
  • Typosquatting
A

Also known as URL hijacking or cybersquatting.
attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors

19
Q

Frauds and Scams

A

Deceptive practices to deceive people into parting with money or valuable
information

20
Q

Consequences of Impersonation

A

○ Unauthorized access
○ Disruption of services
○ Complete system takeover

21
Q

Four main forms of impersonation used by attackers

A
  1. Brand Impersonation
  2. Typosquatting
  3. Watering Hole Attacks
  4. Impersonation : assumes the identity of another person to gain
    unauthorized access
22
Q

To protect against brand impersonation

A

Educate their users
Use secure email gateways
Regularly monitor their brand’s online presence

23
Q

To combat typosquatting

A

○ Register common misspellings of their own domain names
○ Use services that monitor for similar domain registrations
○ Conduct user security awareness training to educate users about
the risks of typosquatting

24
Q

To mitigate watering hole attacks, organizations should do the following

A
  • Keep their systems and software updated
    ○ Use threat intelligence services to stay informed about new
    threats
    ○ Employ advanced malware detection and prevention tools
25
Q

Mitigation for Pretexting

A

training the employees not to fall for pretext and not to fill in the
gaps for people when they are calling

26
Q

Spear Phishing

A

More targeted form of phishing,
more tightly focused on a specific group of individuals or organizations

27
Q

Whaling

A

Form of spear phishing that targets high-profile individuals, like CEOs or
CFOs

28
Q

Fraud

A

Wrongful or criminal deception that is intended to result in financial or personal
gain for the attacker

29
Q

■ One of the most common types of fraud that you will see online is known as

A

Identity Fraud and Identity Theft
○ Involves the use of another person’s personal information without their authorization to commit a crime or to deceive or defraud
that other person or some other third party

30
Q

Difference between identity fraud and identity theft

A

In identity fraud, the attacker takes the victim’s credit card
number and charges items to the card
○ In identity theft, the attacker tries to fully assume the identity of
their victim

31
Q

Scams

A

Fraudulent or deceptive act or operation

32
Q

Most common scam is called the invoice scam

A

● Invoice Scam
○ In which a person is tricked into paying for a fake invoice for a
product or service that they did not actually order

33
Q

Influence Campaigns

A

affect public perception or behavior towards a particular
cause, individual, or group

■ Are a powerful tool for shaping public opinion and behavior

■ Foster misinformation and disinformation

34
Q

■ Diversion Theft

A

Involves manipulating a situation or creating a distraction to steal
valuable items or information

35
Q

Hoaxes

A

● Malicious deception that is often spread through social media, email, or
other communication channels
● Often paired with phishing attacks and impersonation attacks
● To prevent hoaxes people must fact check and use good critical thinking
skills

36
Q

Shoulder Surfing

A

● Involves looking over someone’s shoulder to gather personal information
● Includes the use of high powered cameras or closed-circuit television
cameras to steal information from a distance
● To prevent shoulder surfing, users must be aware of their surroundings
when providing any sensitive information

37
Q

Dumpster Diving

A

Involves searching through trash to find valuable information
● Commonly used to find discarded documents containing personal or
corporate information

38
Q

Eavesdropping

A

● Involves the process of secretly listening to private conversations

39
Q

Baiting

A

Attacker might leave a malware-infected USB drive in a location where their target might find it.