Section 5.38 Impersonation Flashcards

Objectives 2.2 Explain common threat vectors and attack surfaces Objectives 5.6 Given a scenario, implement security awareness practices

1
Q

4 main Social Engineering technique

Social Engineering techniques

IBTW

A
  1. Impersonation
  2. Brand Impersonation
  3. Typosquatting
  4. Watering Hole Attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering technique

Impersonation

A
  • Assume identity of another person to gain unauthorised access to resources or steal sensitive data.
  • Threat actor collects information about the organisation so that they can more easily earn the trust of their targeted users
  • Attackers provide details to help make the lies and the impersonation more believable to a potential victim

Consequences of Impersonation:

○ Unauthorised access
○ Disruption of services
○ Complete system takeover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering technique

Brand Impersonation

A
  • More specific form of impersonation where an attacker pretends to represent a legitimate company or brand
  • Attackers use the brand’s logos, language, and information to create deceptive communications or website

To protect against brand impersonation - organisations should do the following…

○ Educate their users about these types of threats

○ Use secure email gateways to filter out phishing emails

○ Regularly monitor their brands online presence to detect any fraudulent activities as soon as they occur

e.g Novemeber 2020 Elli Lilly brand impersonation attack: Social engineer tweeted insulin would be free for all its customers - ended up losing 4% of stock in 24hrs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Social Engineering technique

Typosquatting

A

Form of cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors

e.g mispell gmail.com vs gnail.com

To combat typosquatting - organizations will often do the following

○ Register common misspellings of their own domain names

○ Use services that monitor for similar domain registrations

○ Security awareness training to educate users about the risks of typosquatting

Also known as URL hijacking or cybersquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering technique

Watering Hole Attacks

A

Targeted form of cyber attack where attackers compromise a specific trusted website or service that their target is known to use so that they can gain access to the network. Involves targeting other organisations in order to gain access to the primary victims network

To mitigate watering hole attacks, organizations should do the following…

○ Keep their systems and software updated

○ Use threat intelligence services to stay informed about new
threats

○ Employ advanced malware detection and prevention tools

The term is a metaphor for a naturally occurring phenomenon where crocodiles wait at watering holes to attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly