CompTIA Security+: Social Engineering Techniques & Other Attack Types Flashcards
What is Phishing?
- Cyber attack that uses disguised email as a vector - Goal is to trick recipient into believing that the message is legit
What s one of the most common exploits vectors?
Phishing
What are the 4different types of Phishing?
1) Spear phishing 2) Whaling 3) Vishing 4) Smishing
What is spear phishing?
Targets certain employees
What is whaling?
Targets high level employees or senior management
What is vishing?
Targets cell phones, telephones, or VoIP systems
What is smishing?
Uses SMS texting as the attach vector
What are common phishing indicators?
1) Vague salutations 2) Suspicious domains 3) URL Paths 4) Wrong hypertext 5) Awkward grammar 6) Urgency in text (“you must act immediately”) 7) Lack of contact info 8) Spoofed headers/logos
What is Business Email Compromise (BEC)?
- Form of attack that targets companies who outsource, conduct wire transfers, and have suppliers abroad
- Corporate email accounts of high level employees are either spoofed or compromised through keyloggers or phishing attacks, often to perform fraud transfers
Common BEC Schemes
1) Phony invoices or transfers 2) C-Suite (C-Team) fraud 3) Email or webmail account compromise 4) Attorney impersonation or hoaxing 5) Data theft of personal identifiable information (PII) or other personal information (health)
What is pharming?
A blending of “phishing” and “farming” - A site’s traffic is manipulated or spoofed and confidential info is stolen - Attackers may install a virus or trojan on target that changes the computer’s host file to direct traffic away from its intended target and toward a fake web site - Crackers may also poison a DNS server to re-direct multiple users to unintentionally go to the fake site, which in turn can be used to install malware on the victim’s computer
What is spam?
What are common categories for spam?
What is spim?
What is typosquatting?
What is tailgating/piggybacking?
What is dumpster diving?
What is shoulder surfing?
What is a watering hole?
What is the process for scams and fraud?
1) Impersonation is attempted remotely through IP soofing
2) The next vecotrs use phones, email, SMS, and IM
3) The next level involves masquerading as a legitimate entity
4) The goal is typically theft of financials, IP, PII, or PHI
What are scams and fraud?
Attackers go through great lengths to conduct their advance persistent threat against your organization including long-term hoaxes and scams
What types of scams and fraud are there?
- Elicit information and reconnaissance
- Hoaxing
- Identity fraid
- Impersonation and pretending
- Invoice scams
- Credential harvesting
How should employees react to hoaxes and masquerading?
What are influence campaigns?
These campaigns are also called misinformation operations and influencer operations
Goal is in red
Wht are the 6 reasons for Social Engineering Effectiveness? (Why is it so effective)
- Lack of proper security and awareness training
- Inadequate acceptable use policy (AUP)
- No buy-in from management and employees for prevention measures
- No enforcement of policies
- Outdated anti-vrus, DLP, and mobile device and application management tools
- Poor perimeter security controls for email,message, telephony, and web activities
Common Malware Attacks
All malware are exploits but not all exploits involve malicious code
What are Potentially Unwanted Programs?
Unwanted programs.
What is ransomware?
What are the steps of a ransomware campaign?