Social Engineering Flashcards
Social Engineering
Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces
Motivational triggers
- Familiarity and Likability
- Consensus and social proof
- authority and intimidation
- scarcity and urgency
- Fear
Social Engineering Techniques
- Impersonation (people and brands) - pretend to be someone else
- Pretexting - create a fabricated scenario
Typosquatting (URL Hijacking/Cybersquatting)
Cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors
To combat:
- register common misspellings of their own domain names
- use services that monitor for similar domain registrations
- conduct user security awareness training to educate users
Watering Hole Attacks
Targeted form of cyber attack where attackers compromise a specific website or service that their target is know to use
- the “watering hole” the attacker chooses to use will usually be a trusted website or online service
Mitigation:
- keep systems up to date
- use threat intelligence services to stay informed about new threats
- employ advanced malware detection and prevention tools
Pretexting
Gives some amount of information that seems true so that the victim will give more information
Mitigation: training the employees not to fall for pretext and not to fill in the gaps for people when they are calling
Phishing
Sending fraudulent emails that appear to be from reputable sources with
the aim of convincing individuals to reveal personal information
Spear Phishing
More targeted form of phishing that is used by cybercriminals who are
more tightly focused on a specific group of individuals or organizations
- Has a higher success rate
Whaling
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
- used as an initial step to compromise an executive’s account for subsequent attacks in their organization
Business Email Compromise (BEC)
targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker
Vishing
Attacker tricks their victims into sharing personal or financial information over the phone
Smishing
Involves the use of text messages to trick individuals into providing their personal information
Anti-phishing Campaign
Essential user security awareness training tool that can be used to educate individuals about the risks of phishing and how to best identify potential phishing attempts
- should offer remedial training for users who fell victim to simulated phishing emails
Key indicators of phishing attacks
- Urgency
- Unusual requests
- Mismatched URLs
- Strange email addresses
- Poor spelling or grammar
Mitigation for phishing
- Training
- Report suspicious messages
- analyze the threat
- inform all users about the threat
- Revise security measures for every successful attack