Social Engineering Flashcards
Phishing - combination of social engineering and spoofing
Spoofing - (disguising one computer resource as another)
Attacker sets up spoof website to imitate target bank or eCommerce provider secure website.Attacker emails users of genuine site informing them their account must be updated, supplying a desguised link that actually lads to spoofed site. When user authenticates with the spoofed site, their log on details are captured
Spawn a pop-up window to enter user credentials.
Spear Phishing and Whaling
Spear Phishing is the attacker has some information that makes the target more likely to be fooled by the attack.
Attacker might know a document with users name
Whaling is a spear phishing attack aimed at upper levels of management (CEOs and other “big beasts”.
Senior managers are more vulnerable because of their reluctance to learn basic security procedures.
Vishing - Phishing conducted through a voice channel (Telephone or VOIP)
Tailgating (Piggybacking) - entering secure area without authorization
Someone fraudulently representing bank calls a user to verify bank account information.
It is difficult to refuse a call from someone rather than an email.
SMiShing refers to fraudulent SMS texts
Tailgating - performed by following closely behind someone at a checkpoint.
Can be performed as an insider allowing access without recording entry in building’s entry log.
Impersonation - Pretending to be someone else
Dumpster diving-combing through organization’s and individual’s refuse to find useful documents.
Impersonation is one of basic social engineering techniques.
Classic is someone phoning into a department claiming to adjust someting on users system remotely and get user to reveal password.
Attacker must be convincing and persuasive.
Shoulder Surfing
Hoax-
Watering Holes
Shoulder surfing is stealing a password by watching user type it. Attacker does not have to be in close proximity, use high-powered binoculars or CCTV to directly observe target remotely.
Hoax - email that states some sort of security problem and offer tool to fix it. The tool is a Trojan horse.
Criminals use sophisticated scams to trick users to reveal log-in credentials or financial account details.
Watering Holes - directed social engineering attack, group uses an unsecured 3rd party website.
Example: attacker compromises retail website, install malware on retail employee’s computers and penetrate their systems.
Principles of Social Engineering
Authority Intimidation Consensus Scarcity Familiarity Trust Urgency