Attacks Flashcards
Social Engineering
An attack against a user, and typically involves some form of social interaction.
Phishing
A type of social engineering in which an attacker attempts to obtain sensitive information from users by masquerading as a trusted entity in an e-mail or instant message sent to a large group of often random users.
Spear phishing
The term that has been created to refer to a phishing attack that targets a specific group with something in common.
Whaling
An attack where a target is a high-value person, such as a CEO or CFO.
Vishing
A variation of phishing that uses voice communication technology to obtain the information the attacker is seeking.
Users are unaware that attackers can spoof (simulate) calls from legitimate entities using Voice over IP (VoIP) technology.
Tailgating
When an unauthorized person follows closely behind an authorized person into a restricted area without permission.
Piggybacking
When an unauthorized person follows an authorized person into a restricted area with permission.
Mantrap
A more sophisticated countermeasure to piggybacking, which utilizes two doors to gain access to the facility. The second door does not open until the first one is closed, and the doors are closely spaced so that an enclosure is formed that only allows one individual through at a time.
Impersonation
A common social engineering technique and can be employed in many ways. It can occur in person, over a phone, or online.
Impersonations can occur in a variety of manners, from third parties, to help desk operators, to vendors, or even online sources.
Third-party authorization
Using previously obtained information about a project, deadlines, bosses, and so on, the attacker arrives with 1) something the victim is quasi-expecting or would see as normal, 2) uses the guise of a project in trouble or some other situation where the attacker will be viewed as helpful or as someone not to upset, and 3) they name-drop “Mr. Big,” who happens to be out of the office and unreachable at the moment, avoiding the reference check.
These actions can create the appearance fo a third-party authorization, when in fact there is none.
Help desk/Tech support
Calls to or from help desk and tech support units can be used to elicit information.
Contractors/Outside parties
When a social engineer dresses up as a contractor.
Online attacks
Some older forms, such as pop-up windows, tend to be less effective today because users are wary of them. Yet phishing attempts via e-mail and social media scams abound.
Defenses
In all of the cases of impersonation, the best defense is simple–have processes in place that require employees to ask to see a person’s ID before engaging with them if employees do not personally know them.
Dumpster diving
The process of going through a target’s trash in hopes of finding valuable information that might be used in a penetration attempt.