Social Engineering Flashcards
Objectives 2.2 and 5.6
Define / Explain
Social Engineering
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Manipulative strategy exploiting human psychology for unauthorized access to systems, data, or physical spaces
Social Engineering
Define / Explain
Informational / List
Motivational Triggers
(used by social engineers)
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Familiarity and Likability
- Consensus and Social Proof
- Authority and Intimidation
- Scarcity and Urgency
Social Engineering
Informational / List
Define / Explain
Impersonation
Social Engineering - Techniques
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Pretending to be someone else
- Includes brand impersonation, typo-squatting, and watering hole attacks
Social Engineering - Techniques
Define / Explain
Define / Explain
Pretexting
Social Engineering - Techniques
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Creating a fabricated scenario to manipulate targets
- Impersonating trusted figures to gain trust
Social Engineering - Techniques
Define / Explain
List
Types of Phishing Attacks
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Phishing
- Vishing
- Smishing
- Spear Phishing
- Whaling
- Business Email Compromise
Social Engineering
List
Define / Explain
Frauds and Scams
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Deceptive practices to deceive people into parting with money or valuable information
Social Engineering
Define / Explain
Define / Explain
Influence Campaigns
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Spreading misinformation and disinformation, impacting politics, economics, etc.
Social Engineering
Define / Explain
Informational / List
Other Social Engineering Attacks
Social Engineering
Obj. 2.2 - Explain common threat vectors and attack surfaces
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Diversion Theft
- Hoaxes
- Shoulder Surfing
- Dumpster Diving
- Eavesdropping
- Baiting
- Piggybacking
- Tailgating
Social Engineering
Informational / List
Informational / List
Six main types of motivational triggers that social engineers use…
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Authority
- Urgency
- Social Proof
- Scarcity
- Likeability
- Fear
Motivational Triggers
Informational / List
Define / Explain
Authority
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Most people are willing to comply and do what you tell them to do if they believe it is coming from somebody who is in a position of authority to make that request
Motivational Triggers
Define / Explain
Define / Explain
Urgency
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Compelling sense of immediacy or time-sensitivity that drives individuals to act swiftly or prioritize certain actions
Motivational Triggers
Define / Explain
Define / Explain
Social Proof
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Psychological phenomenon where individuals look to the behaviors and actions of others to determine their own decisions or actions in similar situations
Motivational Triggers
Define / Explain
Define / Explain
Scarcity
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Psychological pressure people feel when they believe a product, opportunity, or resource is limited or in short supply
Motivational Triggers
Define / Explain
Define / Explain
Likeability
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Most people want to interact with people they like, and social engineers realize this.
Can be…
* Sexual attraction
* Pretending to be a friend
* Common interest
Motivational Triggers
Define / Explain
Define / Explain
Fear
Motivational Triggers
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
These types of attacks generally are focused on “if you don’t do what I tell you, then this bad thing is going to happen to you”
Motivational Triggers
Define / Explain
List
Four main forms of impersonation used by attackers…
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Impersonation
- Brand Impersonation
- Typosquatting
- Watering Hole Attacks
Impersonation
List
Define / Explain
Impersonation
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
Attack where an adversary assumes the identity of another person to gain unauthroized access to resources or steal sensitive data
Impersonation
Define / Explain
Informational
Impersonation requires…
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
the attacker to collect information about the organization so that they can more easily earn the trust of their targeted users
Impersonation
Informational
Informational
Impersonation attackers…
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
provide details to help make the lies and the impersonation more believable to a potential victim
Impersonation
Informational
List
Impersonation consequences…
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Unauthorized access
- Disruption of services
- Complete system takeover
Impersonation
List
Informational
Impersonation…
Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
To mitigate against these types of attacks, organizations must provide security awareness training to their employees on a regular basis so that they remain vigilant against future attacks
Impersonation
Informational
Define / Explain
Brand Impersonation
Impersonation - Brand Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
More specific form of impersonation where an attacker pretends to represent a legitimate company or brand
Impersonation - Brand Impersonation
Define / Explain
Informational
Brand Impersonation…
Impersonation - Brand Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
Attackers use the brand’s logos, language, and information to create deceptive communications or website
Impersonation - Brand Impersonation
Informational
Informational
To protect against brand impersonation, organizations should do the following…
Impersonation - Brand Impersonation
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Educate their useres about these types of attacks
- Use secure email gateways to filter out phishing emails
- Regularly monitor their brand’s online presence to detect any fradulent activities as soon as they occur
Impersonation - Brand Impersonation
Informational
Define / Explain
Typosquatting
Impersonation - Typosquatting
Obj. 2.2 - Explain common threat vectors and attack surfaces
Form of cyber attack where an attacker will register a domain name that is similar to a popular website but contain some kind of common typographical errors
Impersonation - Typosquatting
Define / Explain
Define / Explain
Typosquatting is also known as…
Impersonation - Typosquatting
Obj. 2.2 - Explain common threat vectors and attack surfaces
URL hijacking or cybersquatting
Impersonation - Typosquatting
Define / Explain
Informational
To combat typosquatting, organizations will often do the following…
Impersonation - Typosquatting
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Register common misspellings of their own domain names
- Use services that monitor for similar domain registrations
- Conduct user security awareness training to educate users about the risks of typosquatting
Impersonation - Typosquatting
Informational
Define / Explain
Watering Hole Attacks
Impersonation - Watering Hole Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use
Impersonation - Watering Hole Attacks
Define / Explain
Informational
The term is a metaphor for a naturally occuring phenomenon…
Impersonation - Watering Hole Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
In the world of cybersecurity, the “watering hole” the attacker chooses to utilize will usually be a trusted website or online service
Impersonation - Watering Hole Attacks
Informational
Informational
To mitigate watering hole attacks, organizations should do the following…
Impersonation - Watering Hole Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Keep their systems and software updated
- Use threat intelligence services to stay informed about new threats
- Employ advanced malware detection and prevention tools
Impersonation - Watering Hole Attacks
Informational
Define / Explain
Pretexting
Pretexting
Obj. 2.2 - Explain common threat vectors and attack surfaces
Gives some amount of information that seems true so that the victim will give more information
Pretexting
Define / Explain
Informational
Pretexting…
Pretexting
Obj. 2.2 - Explain common threat vectors and attack surfaces
Mitigation involves training the employees not to fall for pretext and not to fill in the gaps for people when they are calling
Pretexting
Informational
List
Different Types of Phishing Attacks
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Phishing
- Spear Phishing
- Whaling
- Business Email Compromise (BEC)
- Vishing (Voice Phishing)
- Smishing (SMS Phishing)
Phishing Attacks
List
Define / Explain
Phishing
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Sending fradulent emails that appear to be from reputable sources with the aim of convincing individuals to reveal personal information, such as passwords and credit card numbers
Phishing Attacks
Define / Explain
Define / Explain
Spear Phishing
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- More targeted form of phishing that is used by cybercriminals who are more tightly focused on a specific group of individuals or organizations
- Has a higher success rate
Phishing Attacks
Define / Explain
Define / Explain
Whaling
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Form of spear phishing that targets high-profile individuals, like CEOs or CFOs
Phishing Attacks
Define / Explain
Informational
Whaling…
Phishing Attacks - Whaling
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Attacker isn’t trying to catch the little fish in an organization, but instead they want to catch one of the executives, board members, or higher level managers in the company since the rewards are potentially much greater
- Often used as an initial step to compromise an executive’s account for subsequent attacks within their organization
Phishing Attacks - Whaling
Informational
Define / Explain
Business Email Compromise
(BEC)
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Sophisticated type of phishing attack that usually targets businesses by using one of their internal email accounts to get other employees to perform some kind of malicious actions on behalf of the attacker
- Taking over a legitimate business email account through social engineering or cyber intrusion techniques to conduct unauthorized fund transfers, redirect payments, or steal sensitive information
Phishing Attacks
Define / Explain
Define / Explain
Vishing
(Voice Phishing)
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Attacker tricks their victims into sharing personal or financial information over the phone
Phishing Attacks
Define / Explain
Define / Explain
Smishing
(SMS Phishing)
Phishing Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves the use of text messages to trick individuals into providing their personal information
Phishing Attacks
Define / Explain
Informational
Preventing Phishing Attacks
Preventing Phishing Attacks
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
By implementing the right strategies and providing user security awareness training, the threat of a successful phishing campaign against your organization can be mitigated effectively
Preventing Phishing Attacks
Informational
Define / Explain
Anti-phishing Campaign
Preventing Phishing Attacks
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Essential user security awareness training tool that can be used to educate individuals about the risks of phishing and how to best identify potential phishing attempts
- Should offer remedial training for users who fell victim to simulated phishing emails
Preventing Phishing Attacks
Define / Explain
Informational / List
To help prevent phishing your organization should regularly conduct user security awareness training that contains coverage of the various phishing techniques…
Preventing Phishing Attacks
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Phishing
- Spear Phishing
- Whaling
- Business Email Compromise
- Vishing
- Smishing
- Along with other relevant cyber threats and attacks that may affect your organization
Preventing Phishing Attacks
Informational / List
List
There are some commonly used key indicators that are associated with phishing attacks…
Preventing Phishing Attacks
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Urgency
- Unusual Requests
- Mismatched URLs
- Strange Email Addresses
- Poor Spelling or Grammar
Preventing Phishing Attacks
List
Define / Explain
Urgency
Preventing Phishing Attacks - Key Indicators
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
Phishing emails often create a sense of urgency by prompting the recipient to act immediately
Preventing Phishing Attacks - Key Indicators
Define / Explain
Define / Explain
Unusual Requests
Preventing Phishing Attacks - Key Indicators
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
If you receive an email requesting sensitive information, such as passwords or credit card numbers, you should treat these emails with a lot of suspicion
Preventing Phishing Attacks - Key Indicators
Define / Explain
Define / Explain
Mismatched URLs
Preventing Phishing Attacks - Key Indicators
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- When you are looking at an HTML-based email, the words you are reading are called the display text, but the underlying URL of the weblink could be set to anything you want
- To check if the text-based link matches the underlying URL, you should always hover your mouse over the link in the email for a few seconds and this will reveal the actual URL that the link is connected to
Preventing Phishing Attacks - Key Indicators
Define / Explain
Define / Explain
Strange Email Addresses
Preventing Phishing Attacks - Key Indicators
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
If the real email address and the displayed email address don’t match, then the email should be treated as suspicious and possibly part of a phishing campaign
Preventing Phishing Attacks - Key Indicators
Define / Explain
Define / Explain
Poor Spelling or Grammar
Preventing Phishing Attacks - Key Indicators
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
If an email has a lot of “broken English”, poor grammar, or numerous spelling errors, it is likely to be part of a phishing campaign
Preventing Phishing Attacks - Key Indicators
Define / Explain
Informational
Mitigation…
Preventing Phishing Attacks
Obj. 5.6 - Given a scenario, you must be able to implement security awareness practices
- Training
- Report suspicious messages to protect your organization from potential phishing attacks
- Analyze the threat
- Inform all users about the threat
- If the phishing email was opened, conduct a quick investigation and triage the user’s system
- An organization should revise its security measures for every successful phishing attack
Preventing Phishing Attacks
Informational
Define / Explain
Fraud
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
Wrongful or criminal deception that is intended to result in financial or personal gain for the attacker
Frauds and Scams
Define / Explain
Informational
One of the most common types of fraud that you will see online is known as…
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
Identity fraud or identity theft
Frauds and Scams
Informational
Define / Explain
Identity Fraud / Theft
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves the use of another person’s personal information without their authorization to commit a crime or to deceive or defraud that other person or some other third party
Frauds and Scams
Define / Explain
Define / Explain
The difference between identity fraud and identity theft…
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
- In identity fraud, the attacker takes the victim’s credit card number and charges items to the card
- In identity theft, the attacker tries to fully assume the identity of their victim
Frauds and Scams
Define / Explain
Define / Explain
Scams
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
Fradulent or deceptive act or operation
Frauds and Scams
Define / Explain
Define / Explain
Most common scam is called the…
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
invoice scam
Frauds and Scams
Define / Explain
Define / Explain
Invoice Scam
Frauds and Scams
Obj. 2.2 - Explain common threat vectors and attack surfaces
A person is tricked into paying for a fake invoice for a product or service that they did not actually order
Frauds and Scams
Define / Explain
Define / Explain
Influence Campaigns
Influence Campaigns
Obj. 2.2 - Explain common threat vectors and attack surfaces
Coordinated efforts to affect public perception or behavior towards a particular cause, individual, or group
Influence Campaigns
Define / Explain
Informational
Influence Campaigns…
Influence Campaigns
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Are a powerful tool for shaping public opinion and behavior
- Foster misinformation and disinformation
Influence Campaigns
Informational
Define / Explain
Misinformation
Influence Campaigns
Obj. 2.2 - Explain common threat vectors and attack surfaces
False or inaccurate information shared without harmful intent
Influence Campaigns
Define / Explain
Define / Explain
Disinformation
Influence Campaigns
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves the deliberate creation and sharing of false information with the intent to deceive or mislead
Influence Campaigns
Define / Explain
Informational
Remember, misinformation and disinformation…
Influence Campaigns
Obj. 2.2 - Explain common threat vectors and attack surfaces
can have serious consequences because they undermine public trust in institutions, fuel social divisions, and even influence the outcomes of elections
Influence Campaigns
Informational
List
Other common social engineering attacks include…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Diversion Theft
- Hoaxes
- Shoulder Surfing
- Dumpster Diving
- Eavesdropping
- Baiting
- Piggybacking / Tailgating
Other Social Engineering Attacks
List
Define / Explain
Diversion Theft
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves manipulating a situation or creating a distraction to steal valuable items or information
Other Social Engineering Attacks
Define / Explain
Define / Explain
Hoaxes
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Malicious deception that is often spread through social media, email, or other communication channels
Other Social Engineering Attacks
Define / Explain
Informational
Hoaxes…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Often paired with phishing attacks and impersonation attacks
- To prevent hoaxes people must fact check and use good critical thinking skills
Other Social Engineering Attacks
Informational
Define / Explain
Shoulder Surfing
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves looking over someone’s shoulder to gather personal information
Other Social Engineering Attacks
Define / Explain
Informational
Shoulder Surfing…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Includes the use of high powered cameras or closed-circuit television cameras to steal information from a distance
- To prevent shoulder surfing, users must be aware of their surroundings when providing any sensitive information
Other Social Engineering Attacks
Informational
Define / Explain
Dumpster Diving
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves searching through trash to find valuable information
Other Social Engineering Attacks
Define / Explain
Informational
Dumpster Diving…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Commonly used to find discarded documents containing personal or corporate information
- Use clean desk and clean desktop policies
Other Social Engineering Attacks
Informational
Define / Explain
Eavesdropping
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves the process of secretly listening to private conversations
Other Social Engineering Attacks
Define / Explain
Informational
Eavesdropping…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
- Perpetrator intercepts the communication of parties without their knowledge
- Prevent this by encrypting data in transit
Other Social Engineering Attacks
Informational
Define / Explain
Baiting
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves leaving a malware-infected physical device, like a USB drive, in a place where it will be found by a victim, who will then hopefully use the device to unknowingly install malware on their organization’s computer system
Other Social Engineering Attacks
Define / Explain
Informational
Baiting…
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
To prevent baiting, train users to not use devices they find
Other Social Engineering Attacks
Informational
Define / Explain
Piggybacking and Tailgating
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves an unauthorized person following an authorized person into a secure area
Other Social Engineering Attacks
Define / Explain
Define / Explain
Tailgating
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Attacker attempts to follow an employee through an access control vestibule or access control point without their knowledge
Other Social Engineering Attacks
Define / Explain
Define / Explain
Piggybacking
Other Social Engineering Attacks
Obj. 2.2 - Explain common threat vectors and attack surfaces
Involves an attacker convincing an authorized employee to let them into the facility by getting the authorized employee to swipe their own access badge and allow the attacker inside the facility
Other Social Engineering Attacks
Define / Explain